W4SP-Stealer
Luna-Grabber
W4SP-Stealer | Luna-Grabber | |
---|---|---|
2 | 2 | |
121 | 745 | |
- | - | |
10.0 | 8.4 | |
over 1 year ago | 3 days ago | |
Python | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
W4SP-Stealer
- Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack
-
Dozens of malicious PyPI packages discovered targeting developers
Yep. You can read the source code for it here: https://github.com/loTus04/W4SP-Stealer
Luna-Grabber
-
EMERGENCY~!!!! Have been Doxxed
I believe the program is something called Luna Grabber which has the ability to know if it is being used on a VM or not. However, there isn't much data on how to actually remove it from the computer. https://github.com/Smug246/Luna-Grabber
-
Find someone's ip address/personal info?
This Sub-Reddit is about exploiting, but I'm gonna give you a good grabber if you want to do it yourself. The grabber is called "Luna Grabber" link: Luna Grabber. Just send them a download link and you instantly get all their info.
What are some alternatives?
cargo-vet - supply-chain security for Rust
JPGtoMalware - It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
lunasec - LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
empyrean - Easy to use and open-source stealer that's super effective
security-wg - Node.js Ecosystem Security Working Group
Blank-Grabber - The most powerful stealer written in Python 3 and packed with a lot of features.
wapm-cli - 📦 WebAssembly Package Manager (CLI)
discord-raidkit - An open-source, forever free tool that allows you to raid and destroy Discord servers via Discord bots, compromise Discord accounts, and generate Discord token grabbers.
Contents - Community documentation, code, links to third-party resources, ... See the issues and pull requests for pending content. Contributions are welcome !
Rose-Stealer_old - OUTDATED | Professional & efficient credential stealer written in python.
crev - Socially scalable Code REView and recommendation system that we desperately need. See http://github.com/crev-dev/cargo-crev for real implemenation.
Discord-Token-Grabber - Simple token grabber developped in python.