The goal of this repository is to provide a simple, harmless way to check your AV’s protection on ransomware.
This tool simulates typical ransomware behaviour, such as:
- Staging from a Word document macro
- Deleting Volume Shadow Copies
- Encrypting documents (embedded and dropped by the simulator into a new folder)
- Dropping a ransomware note to the user’s desktop