chococat.locker
Open in
urlscan Pro
2606:4700:3031::6815:1271
Public Scan
URL:
https://chococat.locker/
Submission: On November 10 via api from US — Scanned from US
Submission: On November 10 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
About Chococat * About * Builds * Credits CHOCOCAT | COCOA KITTEN Ransomware isn’t complete without your game saves ChocoCat is an educational, non-destructive ransomware designed to teach the dangers of this type of malware in a highly hands-on way. Rather than harming or deleting files, ChocoCat focuses on locking the progress of your games. This ransomware only targets gaming consoles, leaving common desktop computers untouched. With ChocoCat, users can safely understand how ransomware operates without real risks to their personal data. -------------------------------------------------------------------------------- BUILDS GAME BOY / GAME BOY COLOR / GAME BOY ADVANCE Nintendo This Game Boy build is a ROM that exclusively runs ChocoCat ransomware. Unlike modern consoles, the Game Boy stores game saves directly on individual cartridges rather than in shared or system memory. The ROM and source code can be embedded in another project to trigger execution under specific conditions. 💾 Coming soon... PLAYSTATION (PSX) Sony Entertainment This PlayStation build of ChocoCat ransomware takes advantage of the memory card’s unrestricted read and write access to memory blocks by any game. This allows ChocoCat to manipulate or lock specific game saves directly on the memory card. Remember when Psycho Mantis in Metal Gear Solid could read your memory card and knew which games you played? ChocoCat uses similar access to demonstrate ransomware behavior within a familiar gaming context. 💾 Coming soon... DS Nintendo With the release of R4 cartridges, it’s possible to run unsigned firmware on the Nintendo DS, allowing ChocoCat to execute natively on the console or even in emulated form (such as in its Game Boy version). 💾 Coming soon... XBOX 360 Microsoft With hacks like LT3.0, RGH, and even their pirated clones, the Xbox 360 can run unsigned code, allowing ChocoCat to operate on this console. The Xbox 360 also supports external storage media and hard drives, making it a more advanced and significant target for ChocoCat’s functionality. 💾 Coming soon... -------------------------------------------------------------------------------- CREDITS ChocoCat Ransomware is an open-source project, owned by DC5411 and released under the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) license, which requires attribution for any use of the code. ChocoCat is solely an educational project and has no capacity to harm systems or be re-purposed as functional ransomware. ChocoCat is a character by Sanrio Co., Ltd., the Japanese company that owns the brand. Sanrio is not affiliated with DC5411 or this project in any way. --------------------------------------------------------------------------------