Skip to content

dc5411/lockskin

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LockSkin

LockSkin is an educational ransomware specifically designed for NFC bioimplants. The tool allows users to lock bioimplants with a password after leaving a ransom note, simulating the behaviour of ransomware in a controlled environment.

During our talk "Locking Hands: Ransomware Meets Bioimplants", we placed rogue readers on door handles, and other common use surfaces (which didn't quite work out) to trick H+ users into scanning their implants. This was conducted professionally and in a controlled environment for educational purposes. Only use this tool on implants you can afford to lose due to potential lockout.

⚠️ WARNING
This tool is experimental and for educational purposes only. Improper use may render your implant unusable or inaccessible. Use it at your own risk.


System Requirements

  • Operating Systems Supported:
    • macOS
    • *BSD
    • Linux
  • Implant Compatibility:
  • Reader Compatibility:

Usage

# ⚠️ Warning: This tool is experimental. Improper use may render your implant unusable or inaccessible. Use it at your own risk.

#Install dependencies
pip3 install -r requirements.txt

# Compiled version
chmod +x ./dist/lockskin
./dist/lockskin

# Python version
python3 lockskin.py

Once lockskin has started, any implant that touches the concealed reader will be locked in 1 second or less with default settings. Larger payloads (e.g., larger ransom notes) take extra time to process and require longer exposure.

Locking an Implant

LockSkin Encrypting Implant

Reading a Locked Implant

Implant Encrypted

Example Ransom Note

Ransom Note Example


How to Decrypt

LockSkin is reversible by design. You can generate the NFC decode sequences using the following commands:

# ⚠️ Warning: This tool is experimental. Improper use may render your implant unusable or inaccessible. Use it at your own risk.

# Compiled version
chmod +x ./dist/decrypter
./dist/decrypter

# Python version
python3 decrypter.py

Once the commands are generated, you can use any NFC app like NFC Tools by Wakdev to submit them to the implant. This process resets both the password and the protected state (documented in this thread)

Example Using NFC Tools

NFC Tools Example

Command Exchange with Implant

Command Exchange Example

Password Protection Removed

Unlocked Implant


Public presentations

# Date Conference Link to Video Link to Slides
1 August 2025 BSides Las Vegas - -
2 September 2025 DragonJAR 2025 - -
3 September 2025 Nerdearla 2025 - -

Credits

Special thanks to the DC5411 crew for their support while developing this project.

About

Repository for our talk "Locking Hands: Ransomware Meets Bioimplants"

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages