This repository contains educational simulations of malware behavior developed for learning and awareness purposes only.
The code demonstrates how ransomware and keyloggers operate internally in a controlled and isolated environment.
- No real-world malware deployment is intended or supported;
- Scripts must be executed only on test files and authorized environments;
- This project is not designed for production or operational use.
This repository is not intended to receive vulnerability reports.
If you believe this content is being misused or violates ethical guidelines, please contact the repository owner through GitHub.
By using or studying this repository, you agree to:
- Use the code strictly for educational and defensive learning;
- Never execute it on systems you do not own or have explicit authorization to test;
- Respect local laws, institutional policies, and ethical standards.
The author is not responsible for any misuse of the code contained in this repository.
All responsibility lies with the individual executing or modifying the scripts.
📌 Ethical security research starts with responsibility.