CyberLab: Ransomware Simulation & Defense Mechanism is an educational cybersecurity sandbox designed to simulate ransomware attacks and defense strategies in a controlled, non-malicious environment.
This project does not contain real malware. All encryption and attack simulations are confined to a local sandbox directory.
If you discover a security vulnerability in this project, please report it responsibly.
Please send an email with the following details:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested remediation (if known)
- Screenshots or logs (if applicable)
π Subject Line: CyberLab Security Disclosure
Please do NOT create a public GitHub issue for security vulnerabilities.
| Stage | Timeline |
|---|---|
| Initial acknowledgment | Within 72 hours |
| Triage & assessment | Within 7 days |
| Fix development | Depends on severity |
| Public disclosure | After patch release |
We follow responsible disclosure practices and appreciate ethical reporting.
Currently supported versions for security updates:
| Version | Supported |
|---|---|
| Latest main branch | β Yes |
| Older versions | β No |
Users are strongly encouraged to use the latest version of the project.
- A controlled ransomware simulation
- An educational research tool
- A local sandbox-only encryption engine
- Real ransomware
- A penetration testing framework for unauthorized systems
- A production-ready enterprise security solution
To prevent accidental misuse:
- Always ensure the encryption path points to the internal
/sandboxdirectory. - Never use generated encryption keys on personal or sensitive data.
- Do not modify the encryption engine to operate outside the sandbox.
- Run the application inside a virtual environment.
The following actions are strictly prohibited:
- Using the code or techniques against systems without explicit permission.
- Modifying the project into real malware.
- Deploying any part of this project in production systems as a real defense product.
- Using the encryption engine outside the sandbox environment.
Misuse may violate local and international cybersecurity laws.
This project follows these principles:
- Least privilege (RBAC roles: Admin vs Operator)
- MFA for sensitive operations (TOTP)
- Immutable backup snapshots
- Behavioral anomaly detection
- Local-only file operations
- No network exfiltration capabilities
This project relies on third-party libraries such as:
cryptographyPySide6scikit-learnpyotpwatchdogmatplotlib
Please ensure dependencies are kept up to date to mitigate known vulnerabilities.
You can check for outdated packages using:
pip list --outdatedCyberLab follows a Defense-in-Depth model:
- Detection (Behavior Monitoring + AI Anomaly Engine)
- Prevention (MFA, RBAC)
- Recovery (Immutable Backups)
- Visibility (Audit Logs & Telemetry)
This project is intended strictly for:
- Educational use
- Academic research
- Cybersecurity awareness training
The author is not responsible for misuse, illegal activities, or damages caused by modifying or deploying this project outside its intended scope.
We appreciate responsible security researchers and ethical hackers who help improve this project.
Created for the next generation of defenders. Β© 2026 Syed Shaheer Hussain