/Powershell-Token-Grabber

discord token grabber in powershell.

Primary LanguagePowerShellMIT LicenseMIT



PowerShell Token Grabber

This tool is made for data exfiltration. All information collected is sent using Discord webhooks.

Usage

  • Create a Webhook on your Discord Server. I recommend creating a new server.
  • After creating a server go to Edit channel > Integrations > Webhooks > Create Webhook
  • Copy the Webhook URL
  • Download main.ps1
  • Open main.ps1 and replace YOUR_WEBHOOK_HERE in line 20 with your webhook or use the builder.

Want to obfuscate the code ?

Use Invoke-Obfuscation.
Or use Somalifuscator for .bat files

Screenshots

🔨 Builder

GUI

Builder Features

  • 🔸 Obfuscation of BAT and PS1 files
  • 💉 Pump/Inject the output exe file with zero-filled bytes

🔷 Webhook Data

screenshot

data

Features

  • GUI Builder
  • Mutex (single instance)
  • Force UAC
  • Anti-Analysis VMWare, VirtualBox, Sandboxes, Emulators, Debuggers, Virustotal, Any.run
  • Persistence via Task Scheduler
  • Extracts WiFi Passwords
  • Files 2fa, backupcodes, seedphrases, passwords, etc.
  • 📷 Webcam & Desktop Screenshots
  • Session Stealers

    Messaging

    Gaming

  • VPN Clients
  • Crypto Wallets

    Armory | Atomic | Bitcoin | Bytecoin | Coinomi | Dash | Electrum | Ethereum | Exodus | Guarda | Jaxx | Litecoin | Monero | Zcash

  • Browsers (Brave, Chrome, Firefox, Microsoft Edge, Thunderbird etc.)
    • 🔑 Passwords
    • 🍪 Cookies
    • 📜 History
  • Extracts Discord Token
  • Get System Information (Version, CPU, DISK, GPU, RAM, IP, Installed Apps etc.)
  • Get System Uptime
  • Get Screen Resolution
  • List of Installed Applications
  • List of Installed Antiviruses
  • List of all Network Adapters
  • List of Apps that Run On Startup
  • List of Running Services & Applications
  • List TCP Connections and Underlying Process
  • Extracts Product Key
  • Self-Destructs After Execution (optional)

Telegram Session Stealer Usage :

After the exfiltrated data is uploaded to your discord webhook, download the compressed file KDOT.zip, extract it on your PC, inside that folder there will also be another subfolder Messaging Sessions , inside this subfolder you will find the Telegram folder. Now, copy the tdata folder from Telegram folder and paste it in the directory below:

%userprofile%\AppData\Roaming\Telegram Desktop

Before pasting the tdata folder, ensure that you have deleted the existing tdata folder on your PC.

image

NOTE

The other session stealers can be utilized by applying the technique above

🗑 Uninstaller (Removes the Scheduled Task, Script Folder and ExclusionPaths)

  • Open a new Elevated Powershell Console and Paste the Contents below
$ErrorActionPreference = "SilentlyContinue"
function Cleanup {
  Unregister-ScheduledTask -TaskName "KDOT" -Confirm:$False
  Remove-Item -Path "$env:appdata\KDOT" -force -recurse
  Remove-MpPreference -ExclusionPath "$env:APPDATA\KDOT"
  Remove-MpPreference -ExclusionPath "$env:LOCALAPPDATA\Temp"
  Write-Host "[~] Successfully Uninstalled !" -ForegroundColor Green
}
Cleanup

Need Help?

Bug Reports & Suggestions

Found a bug? Have an idea? Let me know here, Please provide a detailed explanation of the expected behavior, actual behavior, and steps to reproduce, or what you want to see and how it could be done. You can be a small part of this project!

License

This project is licensed under the MIT License - see the LICENSE file for details

Disclaimer

I, the creator, am not responsible for any actions, and or damages, caused by this software. You bear the full responsibility of your actions and acknowledge that this tool was created for educational purposes only. This tool's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use. By using this software, you automatically agree to the above.

References

YARA Rule Info
Name : SUSP_PS1_PowerShell_Recon_Mar23_1
RULE Hash : eda1df8e3375891644fe9cac90852b0d
Description : Detects suspicious PowerShell code that performs reconnaissance tasks
Rule Link : https://valhalla.nextron-systems.com/info/rule/SUSP_PS1_PowerShell_Recon_Mar23_1
Rule Author : Florian Roth

Credits

Back to Top