I have made numerous updates to the Discord API across various versions, guided by the links provided. One major challenge was linking accounts across platforms like YouTube, Steam, and GitHub, particularly when using the 'get' function. This was due to the complex transformation of data into dictionary formats, which was difficult because the API data was presented as arrays of dictionaries. This task proved to be quite challenging.
Additionally, I have integrated the user's account biography as a footer in the token acquisition interface. A significant breakthrough was accessing user banners in gif or png formats, which differs from the previous method of retrieving avatars. I updated the integration of linked accounts into the token acquisition framework, removing unnecessary characters for better clarity.
I urge that this program be used only for educational purposes. It is designed to help understand how credentials can be acquired and is aimed at assisting malware analysts and non-technical users. The goal is to facilitate learning, analysis, research, reverse engineering, and critical evaluation.
Tool Description
Google Chrome securely protects user data, making it a challenge for the Grabber to access. The tool operates by decrypting stored data, which can give the attacker access to passwords and code clusters.
The tool can detect Roblox cookies in the Windows Registry and can also extract data from Minecraft sessions, Discord tokens, and similar information stored on a user's device.
After generating output, use these tools for further analysis:
- VirtualBox
- VMware
- Process Hacker
- VirusTotal
To verify the legitimacy of .exe files, use these methods:
- Examine the file with VirusTotal.
- Check the file's source and publisher.
- Test the file in a sandboxed environment.
- Monitor the file's network behavior for any unusual patterns.
- For educational purposes only
- Not for resale
- Code source usage allowed with proper credit (embedded + markdown), must remain open-source
- We are not liable for any actions taken with our software if illegal
- Download the project to your computer as zip
- Extract Project to Folder.
- Make Sure You Have Visual Studio Installed on Your Computer
- Click if Visual Studio is Not Installed
- Open the solution file (.sln).
- Select Build Solution from the Build menu or press
Ctrl+Shift+B
to compile the project. - When the build is complete, select Start Without Debugging from the Debug menu or press
Ctrl+F5
to run the project.
QR Code Registrar
- Extract and process QR codes.
Discord Login Data Extractor
- Obtain Discord login details and bypass security.
- User Alias
- Identification
- Authentication Token
- Override Two-Step Verification
- Acquire 5-digit Verification Codes
- Discord Injection
- Disable QR Code
Transport Support
- SMTP Transport
- Telegram API Transport (with Proxy)
Browsing Data Extraction
- Chromium-Based Browsers (Passwords, Credit Cards, Cookies, History, Autofill, Bookmarks)
- Firefox-Based Browsers (Database Files, Cookies, History, Bookmarks)
- Internet Explorer/Edge (Passwords)
System Information Retrieval
- Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen Metrics, Installed Applications
Network Exploration
- Saved Wi-Fi Networks & Nearby Networks (SSID, BSSID)
File Management
- Collect Documents, Images, Source Codes, Databases, USB content
Browser Detection
- Banking & Cryptocurrency Services
Gaming Sessions
- Capture data from Steam, Uplay, Battle.Net, EPIC, Minecraft, Roblox.
Keyloggers & Clippers
- Install for data monitoring.
Multimedia Capture
- Desktop & Webcam Screenshots
VPN Compatibility
- ProtonVPN, OpenVPN, NordVPN, IPVanish, ExpressVPN
Cryptocurrency Wallets
- CoinBase, Zcash, Armory, Bytecoin, Jaxx, Exodus, Ethereum, Electrum, AtomicWallet, Guarda, Coinomi, MetaMask, Binance (Beta)
Messenger Data Capture
- Discord, Telegram, ICQ, Skype, Pidgin, Outlook, Tox, Element, Signal
System Insights
- Process Enumeration, Product Key Extraction, Autorun Module
Security Measures
- Anti-Phishing Detection, Anti-Deletion Measures, Anti-Spam Measures
Educational Focus
This tool is intended to educate on data vulnerabilities in a device. Use it only on your personal machine and avoid malicious use on others. Responsible use of knowledge is crucial.
This source code is for educational purposes only.
This project is licensed under the MIT. For more information, see the License.