Valforst / WebStealerPro

With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

WebStealerPro | Password Cookies Exodus Metamask ALLBrowsers Stealer

GitHub release CodeFactor dev chat Crowdin Renovate enabled license Chat

Understanding the Purpose and Functionality

  • This is a Proof of Concept (P.O.C) tool centered around bitcoin theft, intended exclusively for educational exploration and developed using C# programming language. Its primary goal is to highlight the potential vulnerabilities in the bitcoin wallet system. The tool operates by identifying the user's bitcoin wallet and substituting it with a malicious bitcoin wallet address. It is designed with simplicity in mind, making it suitable for learning purposes, and welcomes engagement from all levels of users.

  • This tool is classified as potentially malicious by Windows Defender. It is important to exercise extreme caution when interacting with it. Do not execute it directly from a storage device on a target system. If you intend to run it in-memory on a target system, ensure that it is done with AMSI (Antimalware Scan Interface) bypassed. Employ obfuscation techniques, such as using tools like ConfuserEx, to add an additional layer of protection.

  • When exporting a certificate with an associated private key in the Personal Information Exchange (PFX) format, it's crucial to note that the default password is left blank. This is not the same as being nonexistent. Optionally, you have the option to define a password using the --password argument.

  • In scenarios where keys are marked as not exportable, modifying the CryptoAPI (CAPI) to allow the export of non-exportable keys within the current process might be necessary. Tools like mimikatz can assist in achieving this via the crypto::capi command. For cases involving exporting non-exportable device certificates, mimikatz can also modify the memory of the running lsass.exe process to bypass protective measures using the crypto::cng command.

  • Alternatively, another method for extracting private keys is through Data Protection Application Programming Interface (DPAPI) operations. This involves utilizing the user's DPAPI master key, or other potential methods such as a password, domain DPAPI private key, or system backup key, to decrypt the user's master key and subsequently decrypt their certificates stored in the registry. This approach can be executed using tools like SharpDPAPI or mimikatz. Additional insights into this process can be found in the THEFT2 and THEFT3 sections of SpecterOps's whitepaper titled "Certified Pre-Owned," which covers this topic comprehensively. Reading the entire paper is highly recommended for a deeper understanding of the subject matter.

Following Guidelines

  • Exclusively for Educational Purposes
  • Prohibition of Resale
  • Permissible Use of Source Code while Maintaining Credits (both embedded and in reductions); Obligatory Open-Source Nature
  • Disclaimer: We bear no liability for any actions conducted with our software, particularly if they breach legal boundaries

Comprehensive Array of Capabilities

๐Ÿš€ Welcome to our feature-rich toolkit designed to enhance your tasks! Here's an overview of what we offer:

Data Extraction and Privacy Analysis

  • ๐Ÿ”‘ QR Code Logger: Seamlessly capture QR codes for data input.
  • ๐Ÿ”’ Discord Login Extraction: Retrieve user login details for Discord.
  • ๐Ÿ†” Username Acquisition: Easily gather usernames from various sources.
  • ๐Ÿ“œ Identification Number (ID): Obtain and manage identification numbers.
  • ๐ŸŒ Token Extraction: Effortlessly extract tokens for various platforms.

Advanced Security Mechanism Handling

  • ๐Ÿ›ก๏ธ Overcoming Novel Security Mechanisms: Stay ahead by bypassing new security features.
  • ๐Ÿ” Circumvention of Two-Step Verification: Gain access even when two-step verification is in place.
  • ๐Ÿšง Overcoming Identity Hurdles: Navigate through inherent identity challenges and 5-digit verification codes.

Communication and Integration

  • ๐Ÿ“ง SMTP Transport Support: Seamless integration with SMTP transport for efficient communication.
  • ๐Ÿ“ž Telegram API Transport Support (with Proxy): Connect through Telegram API with added privacy.
  • ๐Ÿ’ฌ Fake Message Integration: Integrate fake messages for specific scenarios.
  • ๐Ÿ–ผ๏ธ Customizable Icons Support: Personalize icons to suit your preferences.

Cutting-edge Features

  • ๐ŸŒŸ A.V Bypass (Upcoming Feature): Upcoming feature to bypass antivirus detection.
  • ๐Ÿ” Detection of Inspect Element Usage: Identify unauthorized inspect element usage.
  • ๐ŸŽจ Personalized Design: Tailor the design to your liking with aesthetic visuals.
  • ๐Ÿ”’ Anti-Analysis Measures: Stay under the radar with measures against analysis tools.

System Insights and Data Gathering

  • ๐Ÿ’ป System Information Retrieval: Gather system details like version, CPU, GPU, RAM, IPs, and more.
  • ๐ŸŒ Browser Data Extraction: Extract valuable data from Chromium, Firefox, and Internet Explorer/Edge.
  • ๐Ÿ“ถ Network Enumeration: Enumerate saved and nearby WiFi networks for insights.
  • ๐Ÿ“‚ File Acquisition: Acquire a wide range of files, from documents to databases.

Online Services Integration

  • ๐Ÿ’ณ Detection of Banking and Cryptocurrency Services: Identify financial platforms within browsers.
  • ๐ŸŽฎ Session Retrieval for Gaming Platforms: Retrieve sessions for Steam, Uplay, Battle.Net, Minecraft.
  • โŒจ๏ธ Keylogger and Clipboard Manipulator: Deploy keyloggers and manipulate clipboard content.
  • ๐Ÿ“ธ Screenshots and Webcam Capture: Capture desktop and webcam screenshots discreetly.

Enhanced Security and Privacy Support

  • ๐Ÿ” VPN Compatibility: Use with ProtonVPN, OpenVPN, NordVPN for enhanced privacy.
  • ๐Ÿ’ฐ Crypto Wallet Support: Compatible with various crypto wallets and their extensions.
  • ๐Ÿ“ฑ Messenger Capture: Capture sessions, accounts, tokens for Discord, Telegram, ICQ, Skype, and more.
  • ๐Ÿ•ต๏ธโ€โ™€๏ธ Phishing Detection Measures: Implement measures to detect phishing for platforms like Metamask.

User-friendly Interface and Functionality

  • ๐Ÿ“ Display of File Directory Structure: Easily navigate through file directories.
  • ๐Ÿ–ฅ๏ธ Compilation of FileZilla Hosts: Compile a list of FileZilla hosts for efficient access.
  • ๐Ÿ”„ Compilation of Running Processes: Get a comprehensive list of running processes.
  • ๐Ÿ”‘ Retrieval of Product Key: Easily retrieve product keys for software.

Efficient Automation and Customization

  • ๐Ÿค– Authoritative Module for Automatic Execution: Execute tasks authoritatively with automation.
  • โฉ Swift Transactions: Perform tasks quickly and efficiently.
  • โš™๏ธ Contract-Free Usage: Enjoy the toolkit's capabilities without binding contracts.

Seamless Data Retrieval and Integration

  • ๐ŸŒ Browser Integration: Extract passwords, emails, and more from browsers.
  • ๐Ÿ’ณ Payment Information Capture: Capture credit card details, CVC, expiry dates, billing info.
  • ๐ŸŒ IP and Hostname Extraction: Retrieve IP addresses and computer hostnames.
  • ๐Ÿšช Instant Logoff Capability: Log off instantly for added security.
  • ๐Ÿ”’ Quick QR Code Deactivation: Deactivate QR codes swiftly when needed.

Customized User Experience

  • ๐ŸŽจ Tailored Embedding: Embed the toolkit seamlessly into your workflow.
  • ๐Ÿงฉ Ingenious Code Structure: Benefit from a well-structured and efficient codebase.
  • ๐Ÿช Cookie Information Retrieval: Retrieve valuable cookie information.
  • ๐Ÿ” Automatic Cookie Logging: Log cookies automatically for analysis.
  • ๐ŸŒŒ Metamask and Exodus Support: Retrieve information from Metamask and Exodus wallets.

Advanced Security Measures

  • ๐Ÿšซ Anti-Delete and Anti-Spam Measures: Prevent unauthorized deletion and spamming.
  • โšก Evasion of Detections: Remain undetected with a 0/64 detection rate.

Tailored for Windows

  • ๐ŸชŸ Compatibility with Official Telegram Desktop: Compatible with Windows Telegram Desktop.

Secure Information Retrieval

  • ๐Ÿ” Password Extraction: Effortlessly extract passwords, including modifications.
  • ๐Ÿ“ง Email Extraction: Retrieve email addresses for various purposes.
  • ๐Ÿ“› Badge Retrieval: Capture badges for user identification.
  • ๐Ÿ’Ž Nitro Capture: Capture Nitro for premium features.

Sensitive Data Capture

  • ๐Ÿ’ณ Credit Card Information: Capture credit card numbers, CVC, expiry dates, billing info.
  • ๐ŸŒ IP Address Extraction: Extract IP addresses for analysis.
  • ๐Ÿ–ฅ๏ธ Webcam Screenshots: Capture webcam screenshots discreetly.

Efficient Control and Features

  • โœจ Instant Logoff and QR Code Deactivation: Swiftly log off and deactivate QR codes for security.
  • ๐Ÿš€ Mastery of Identity Verification: Expertly handle inherent identity and 5-digit verification codes.

Reliable Integrations

  • ๐Ÿ“ฉ Integration with SMTP Transport: Seamlessly connect with SMTP for reliable communication.
  • ๐Ÿ“ฒ Integration with Telegram API Transport: Connect via Telegram API with added flexibility.

Enhanced Communication

  • ๐Ÿ’ฌ Facilitation of Fake Messages: Easily create and integrate fake messages.
  • ๐ŸŽญ Custom Icon Integration: Personalize icons to enhance user experience.

Cutting-edge Security Measures

  • ๐Ÿ” Phishing Detection Measures for Metamask: Implement measures to detect phishing attempts.
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ Evasion of Detections: Stay undetected with advanced evasion techniques.

Experience Unmatched Capabilities

  • ๐Ÿš€ Contract-Free Usage: Enjoy all features without restrictive contracts.
  • ๐Ÿ’ผ Comprehensive Data Retrieval: Gather data from various sources effectively.

Prerequisites for Building

In order to compile the software from its source code, the following prerequisites need to be in place:

These components are essential for the successful building of the software using its source code.

Runtime Prerequisites

These components are solely necessary if you decide to download the release version from the Releases section (stealerium.zip):

These runtime requirements are crucial if you opt for the downloadable release version of the software.

About

With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria

License:MIT License


Languages

Language:C++ 54.8%Language:C# 43.5%Language:C 1.6%