Skip to content

With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria

License

Notifications You must be signed in to change notification settings

TY-PC/VigilByteStealer-Grabber-Discord-Fud

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VigilByte Stealer ALL Features

vigil

I have made numerous updates to the Discord API across various versions, guided by the links provided. One major challenge was linking accounts across platforms like YouTube, Steam, and GitHub, particularly when using the 'get' function. This was due to the complex transformation of data into dictionary formats, which was difficult because the API data was presented as arrays of dictionaries. This task proved to be quite challenging.

Additionally, I have integrated the user's account biography as a footer in the token acquisition interface. A significant breakthrough was accessing user banners in gif or png formats, which differs from the previous method of retrieving avatars. I updated the integration of linked accounts into the token acquisition framework, removing unnecessary characters for better clarity.

I urge that this program be used only for educational purposes. It is designed to help understand how credentials can be acquired and is aimed at assisting malware analysts and non-technical users. The goal is to facilitate learning, analysis, research, reverse engineering, and critical evaluation.

Tool Description

Google Chrome securely protects user data, making it a challenge for the Grabber to access. The tool operates by decrypting stored data, which can give the attacker access to passwords and code clusters.

The tool can detect Roblox cookies in the Windows Registry and can also extract data from Minecraft sessions, Discord tokens, and similar information stored on a user's device.

Recommended Tools for Investigation

After generating output, use these tools for further analysis:

  • VirtualBox
  • VMware
  • Process Hacker
  • VirusTotal

Evaluating .exe Files

To verify the legitimacy of .exe files, use these methods:

  1. Examine the file with VirusTotal.
  2. Check the file's source and publisher.
  3. Test the file in a sandboxed environment.
  4. Monitor the file's network behavior for any unusual patterns.

Usage Disclaimer and Features

  • For educational purposes only
  • Not for resale
  • Code source usage allowed with proper credit (embedded + markdown), must remain open-source
  • We are not liable for any actions taken with our software if illegal

How to Use

Visual Studio :

  1. Open the solution file (.sln).
  2. Select Build Solution from the Build menu or press Ctrl+Shift+B to compile the project.
  3. When the build is complete, select Start Without Debugging from the Debug menu or press Ctrl+F5 to run the project.

Features

QR Code Registrar

  • Extract and process QR codes.

Discord Login Data Extractor

  • Obtain Discord login details and bypass security.
    • User Alias
    • Identification
    • Authentication Token
    • Override Two-Step Verification
    • Acquire 5-digit Verification Codes
    • Discord Injection
    • Disable QR Code

Transport Support

  • SMTP Transport
  • Telegram API Transport (with Proxy)

Browsing Data Extraction

  • Chromium-Based Browsers (Passwords, Credit Cards, Cookies, History, Autofill, Bookmarks)
  • Firefox-Based Browsers (Database Files, Cookies, History, Bookmarks)
  • Internet Explorer/Edge (Passwords)

System Information Retrieval

  • Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen Metrics, Installed Applications

Network Exploration

  • Saved Wi-Fi Networks & Nearby Networks (SSID, BSSID)

File Management

  • Collect Documents, Images, Source Codes, Databases, USB content

Browser Detection

  • Banking & Cryptocurrency Services

Gaming Sessions

  • Capture data from Steam, Uplay, Battle.Net, EPIC, Minecraft, Roblox.

Keyloggers & Clippers

  • Install for data monitoring.

Multimedia Capture

  • Desktop & Webcam Screenshots

VPN Compatibility

  • ProtonVPN, OpenVPN, NordVPN, IPVanish, ExpressVPN

Cryptocurrency Wallets

  • CoinBase, Zcash, Armory, Bytecoin, Jaxx, Exodus, Ethereum, Electrum, AtomicWallet, Guarda, Coinomi, MetaMask, Binance (Beta)

Messenger Data Capture

  • Discord, Telegram, ICQ, Skype, Pidgin, Outlook, Tox, Element, Signal

System Insights

  • Process Enumeration, Product Key Extraction, Autorun Module

Security Measures

  • Anti-Phishing Detection, Anti-Deletion Measures, Anti-Spam Measures

Educational Focus

This tool is intended to educate on data vulnerabilities in a device. Use it only on your personal machine and avoid malicious use on others. Responsible use of knowledge is crucial.

Disclaimer

This source code is for educational purposes only.

License

This project is licensed under the MIT. For more information, see the License.