Discord Server
Telegram Group
gumbobr0t's Telegram
pierro on GitHub
gumbobr0t on GitHub
killer on GitHub
Feature | Description | Status |
---|---|---|
GUI Builder | Create user-friendly interfaces easily. | Done |
UAC Bypass | Bypass User Account Control for elevated privileges. | Later |
Custom Icon | Set a unique icon for your application. | Done |
Runs On Startup | Automatically start with Windows. | Done |
Disables Windows Defender | Disable built-in antivirus protection. | Later |
Anti-VM | Detect and evade virtual machine environments. | Done |
Blocks AV-Related Sites | Prevent access to antivirus websites. | Later |
Melt Stub | Make the malware difficult to detect by self-destructing. | Done |
Fake Error | Display fake error messages to deceive users. | Done |
EXE Binder | Combine multiple files into a single executable. | Later |
File Pumper | Inflate file sizes to hide malicious content. | Done |
Obfuscated Code | Use code obfuscation techniques for evasion. | Later |
Discord Injection | Inject code into Discord processes. | Done |
Steals Discord Tokens | Extract user tokens from Discord. | Done |
Steals Steam Session | Gather active Steam sessions. | Later |
Steals Epic Session | Gather active Epic Games sessions. | Later |
Steals Uplay Session | Gather active Uplay sessions. | Later |
Steals Battle.Net Session | Gather active Battle.Net sessions. | Later |
Steals Passwords From Many Browsers | Extract stored passwords. | Done |
Steals Cookies From Many Browsers | Collect browser cookies. | Done |
Steals History From Many Browsers | Access browsing history. | Done |
Steals Autofills From Many Browsers | Extract autofill data. | Later |
Steals Minecraft Session Files | Gather Minecraft session information. | Later |
Steals Telegram Session Files | Extract Telegram session data. | Later |
Steals Crypto Wallets | Target cryptocurrency wallets. | Later |
Steals Roblox Cookies | Gather Roblox-related data. | Done |
Steals IP Information | Collect IP addresses. | Done |
Steals System Info | Gather system-specific details. | Done |
Steals Saved Wifi Passwords | Extract saved Wi-Fi passwords. | Done |
Steals Common Files | Collect files commonly used for attacks. | Later |
Captures Screenshot | Take screenshots of the user's desktop. | Done |
Captures Webcam Image | Access and capture webcam images. | Done |
Sends All Data Through Discord Webhook | Send stolen data to specified destinations. | Done |
File Type Selection | Choose between screensaver or executable. | Done |
Trigger BSOD | Cause a Blue Screen of Death. | Later |
Freeze Screen | Freeze the user's screen. | Later |
Spread Malware | Send malicious messages to friends on social media. | Later |
Crypto Miner | Use the victim's computer for cryptocurrency mining. | WIP |
Ransomware | Forces the victim to pay you a specific amount of USD in Monero or they will lose all their data. Decrypter can be found in components/tools. | Done |
This tool is explicitly designed and provided exclusively for educational intentions. Its primary objective is to illuminate the vulnerabilities that files can be susceptible to, highlighting the need for proactive security measures. It is imperative that this tool is never leveraged for any illegal, unauthorized, or malicious undertakings. Under no circumstances will I assume liability for any detrimental consequences inflicted upon your computing infrastructure. I hereby absolve myself from any complicity in activities of an illicit nature. Emphatically, this tool's utility is confined to didactic objectives.
Please be cognizant of the fact that nestled within the intricate architecture of this tool is an elaborate mechanism with latent potential, which, if wielded in an iniquitous manner, could conceivably lead to the illicit acquisition of Discord Nitro privileges through the exploitation of compromised accounts. Nevertheless, I vehemently discourage any endeavor to explore or exploit this covert facet for personal enrichment or unscrupulous exploits. The primary rationale behind divulging this concealed facet is to underscore the paramount importance of fortifying personal data security and adhering to the ethical deployment of technological instruments.
By virtue of our sophisticated installation process, manual installation of Python is rendered unnecessary. Our meticulously designed batch script adeptly manages this procedure on your behalf.
- Download the repository by clicking here.
- Extract the ZIP folder which you just downloaded.
- Run the
install.bat
to install Rose and then open the UI. To start the program later on, you will need to run thestart.bat
.
Working on crypto miner, rose ransomware & spread malware now.
-
1.9 (2023-09-12)
- Rewrote ransomware, changed payment to monero
- Added ransomware decrypter to components/tools
- Fixed startup
- Fixed builder (cleanup, upx, returnzip)
- Rewrote/Fixed install and start script
-
1.8 (2023-09-02)
- Added spread malware on discord feature
- Added additional error handling
- Added other UPX compression
- Added extension spoofer
- Fixed builder not showing compile CMD
-
1.7 (2023-08-14)
- Added ransomware
- Fixed return zip file
-
1.6 (2023-08-14)
- Added Anti-VM
- Added UAC bypass
- Added better icon selection in builder
- Fixed browser stealing
-
1.5 (2023-08-10)
- Improved obfuscation and file type selection
- Added log buttons and file pumper
-
1.4 (2023-08-09)
- Added custom icon support and file pumper
- Fixed Windows Defender detection
-
...
Main Developers:
External Contributions: