Files
phorcy-stealer/elinethingz/README.md

40 lines
1.1 KiB
Markdown

[SECRET//DNR]
Secret//DO NOT RELEASE.
# Documentation of all files found in this folder.
# loader.nim
Takes an input bytearray and writes it to disk as first CLI argument when run.
format:
[seq[byte]](@[0x40,0x80]
# encfile.nim
Has multiple functions to encrypt text and/or files (streams) with AES-256 derived using HMAC (SHA512_256). Max. password size 1024 characters. Tested. Is suitable for sensitive data.
Has a fingerprint/is detectable.
# OFFENSIVEencfile.nim
Very stripped-down encryption tool. Takes a stream and encrypts it (AES256 with HMAC SHA512_256). No max. password size.
Has a fingerprint/is detectable.
# Packer.nim
Ideally a "packer"/loader for the main stage. Still very experimental and needs heavy rework.
# bsod.nim
Serves a BSOD to targets on Windows.
# mic_reg.nim
[Broken]
Checks if Windows OSD is enabled.
# checkfile.nim
Basic program that uses direct syscalls to know if a file exists. Undetectable in normal conditions.
Can be chained with other direct syscalls to copy sensitive files.
# basicadware.nim
Basic adware. At execution, shows a MessageBox with a title and content picked from a random (limited) pool.