Discord Token Stealer Malware Protection

Overview

TokenGuard

TokenGuard2

TokenGuard, protect your account, prevent token steal. Totally free and open source


Discord Server: https://discord.gg/EmwfaGuBE8

Source Code: https://github.com/ZaikoARG/TokenGuard


TokenGuard is a program written in Python that aims to mitigate almost 100% the theft of Discord Tokens on your computer.

The main features are:

  • Simple GUI: TokenGuard has a graphic interface that is too simple, not very invasive and easy to use, which aims to adapt to all types of users.
  • Constant Protection: The program is in charge of cleaning the traces of the Discord Token constantly, guaranteeing its safety at all times.
  • Low Consumption: Despite the fact that it is constantly running, the consumption of both the CPU and RAM is very low..

Installation

Download: https://github.com/ZaikoARG/TokenGuard/releases

TokenGuard has a simple, multi-language installer for easy installation.

Screenshot_6


Usage

The interface is very simple, it has a Toggle to turn the protection on and off.

The moment you activate the Toggle, the protection will start to work. And when I deactivate it it will stop working.

When you open the program, an icon will be created in the hidden icon bar. This in order to be able to control the program when it is sent to the background

Screenshot_8

Important Things About Usage

  • You should keep in mind that when you activate the protection, discord must be open and logged in.
  • In the event that Discord is not open, the program will wait for you to open it.
  • Just leave the Toggle on if you want and open it to start protection.
  • If the Discord process is closed, the program will report an error and only the protection will be disabled. Turn it back on and open the Discord process.
  • Minimizing the application will automatically send it to the background. To reactivate it, use the open option of the hidden icon at the bottom right of the screen.
  • For added protection, I highly recommend deleting saved Discord sessions in your Browser.
  • When using TokenGuard, you will notice that when you reopen Discord, it will ask you to log in again. This is because my program deletes the databases where discord stores the Login Token

For Developers

How TokenGuard Works

TokenGuard works by trying to clean the absurd and excessive traces of the Token that Discord leaves on your system. This includes Tokens stored in Files, as well as those stored in Memory.

I did this protection scheme based mainly on the operation of Token Stealer Malwares.

My program will take care of cleaning up the Discord LDB files. After this, a loop will begin that will erase the memory addresses that contain the User Token every 5 seconds.

TokenGuard Operation Scheme

Concept Map (2)

About the Code

I made the TokenGuard code as organized as possible, dividing the workflow into several files.

  • files.py: LDB Files Cleanup
  • logs.py: Log Saving
  • memory.py: Classes and Functions for Reading and Writing Memory
  • py_toggle.py: Toggle Button for the GUI
  • shared_variables.py: Definition of Shared Variables
  • systrayicon.py: Systray Icon Classes and Functions
  • TokenGuard.py: Main Program
  • tokenprotection.py: Token Protection Initialization

I tried to add a good amount of annotations so that whoever wants to use parts of the code can understand how each part works.

if "__main__" == __name__:
    # Define SysTrayIcon Thread
    st = systrayicon.SysTrayIcon()
    # Initialize SysTrayIcon
    st.start()
    # Define the App
    app = QApplication(sys.argv)
    # Define the MainWindow
    window = MainWindow()
    # Start App
    sys.exit(app.exec())

I want to clarify that the code was totally made by me and that it possibly contains certain parts where it looks ugly or maybe it could have been done better.

In any case, the tool will have more updates in which I will try to correct the problems that appear.

In the event that you find a bug or any type of bug or code fix, please let me know on my Discord Server.

Gratitude

I want to thank my colleague and friend Mr20 for helping me with the designs, giving me moral support and accompanying me all the way to develop the tool.

License

This project is licensed under the terms of the MIT license.

Buy me a Coffee

If you wish you can support my work by inviting me for a coffee.

With this you will be motivating me to improve this project and to create new projects.

Buy me a Coffee: https://www.buymeacoffee.com/ZaikoARG

You might also like...
This repository is one of a few malware collections on the GitHub.
This repository is one of a few malware collections on the GitHub.

This repository is one of a few malware collections on the GitHub.

An IDA pro python script to decrypt Qbot malware string
An IDA pro python script to decrypt Qbot malware string

Qbot-Strings-Decrypter An IDA pro python script to decrypt Qbot malware strings.

A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance
A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

Android Malware (Analysis | Scoring) System
Android Malware (Analysis | Scoring) System

An Obfuscation-Neglect Android Malware Scoring System Quark-Engine is also bundled with Kali Linux, BlackArch. A trust-worthy, practical tool that's r

A guide to building basic malware in Python by implementing a keylogger application
A guide to building basic malware in Python by implementing a keylogger application

Keylogger-Malware-Project A guide to building basic malware in Python by implementing a keylogger application. If you want even more detail on the Pro

A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms

A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms. Change the Blackgound image of targets' computer. and decrypt the targets' encrypted files in our own computer

Detection tool of malware(s) by checksum (useful for forensic)

🐍 malware_checker.py Detection tool of malware(s) by checksum (useful for forensic) 📦 Dependencies installation $ pip3 install -r requirements.txt

Huskee: Malware made in Python for Educational purposes
Huskee: Malware made in Python for Educational purposes

𝐇𝐔𝐒𝐊𝐄𝐄 Caracteristicas: Discord Token Grabber Wifi Passwords Grabber Googl

A token logger for discord + steals Brave/Chrome passwords and usernames
A token logger for discord + steals Brave/Chrome passwords and usernames

Backdoor Machine - ❗ For educational purposes only ❗ A program made in python for stealing passwords and usernames from Google Chrome/Brave and tokenl

Releases(tokenguard-v1.0.0)
Log4j vuln fuzz/scan with python

Log4jFuzz log4j vuln fuzz/scan USE // it's use localhost udp server to check target vuln. python3 log4jFuzz.py [option] optional arguments: -u URL,

VVzv 3 Dec 22, 2021
Downloads SEP, Baseband and BuildManifest automatically for signed iOS version's for connected iDevice

FutureHelper Supports macOS and Windows Downloads SEP, Baseband and BuildManifest automatically for signed iOS version's (including beta firmwares) fo

Kasim Hussain 7 Jan 05, 2023
Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) using standard Impacket.

PrintNightmare Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) using standard Impacket. Installtion $ pip3 install impacket

Oliver Lyak 140 Dec 27, 2022
Script checks provided domains for log4j vulnerability

log4j Script checks provided domains for log4j vulnerability. A token is created with canarytokens.org and passed as header at request for a single do

Matthias Nehls 2 Dec 12, 2021
A Tool for subdomain scan with other tools

ReconTracer A Tool for subdomain scan with other tools ReconTracer Find subdomains by using another amazing sources!. Obs: In a close future recontrac

15 Dec 18, 2021
IDAPatternSearch adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidra’s function patterns format.

IDA Pattern Search by Argus Cyber Security Ltd. The IDA Pattern Search plugin adds a capability of finding functions according to bit-patterns into th

David Lazar 48 Dec 29, 2022
A simple multi-threaded distributed SSH brute-forcing tool written in Python.

OrbitalDump A simple multi-threaded distributed SSH brute-forcing tool written in Python. How it Works When the script is executed without the --proxi

K4YT3X 408 Jan 03, 2023
Apache OFBiz rmi反序列化EXP(CVE-2021-26295)

Apache OFBiz rmi反序列化EXP(CVE-2021-26295) 目前仅支持nc弹shell 将ysoserial.jar放置在同目录下,py3运行,根据提示输入漏洞url,你的vps地址和端口 第二次使用建议删除exp.ot 本工具仅用于安全测试,禁止未授权非法攻击站点,否则后果自负

15 Nov 09, 2022
Tool To generate Stable Undetected Payload

windowsPayload Tool To generate Stable Undetected Payload Don t Upload to Virus Total :) Follow on Social Media Platforms ScreenShots How to install +

youhacker55 117 Dec 30, 2022
Mips script decompiles MIPS assembly instructions & bot functionality

mips mips is a python-based script that decodes MIPS instructions. Usage cd into mips and run python decode.py command or open decode.py to run the sc

Anthony Tedja 0 Mar 30, 2022
ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software.

ClusterFuzz ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software. Google uses ClusterFuzz to fuzz all

Google 4.9k Jan 08, 2023
Grafana-0Day-Vuln-POC

Grafana V8.0+版本存在未授权任意文件读取 0Day漏洞 - POC 1 漏洞信息 1.1 基本信息 漏洞厂商:Grafana 厂商官网:https://grafana.com/ 1.2 漏洞描述 Grafana是一个跨平台、开源的数据可视化网络应用程序平台。用户配置连接的数据源之后,Gr

mik1th0n 3 Dec 13, 2021
TOOLS CRACK FACEBOOK

Installation $ pkg update && pkg upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Mark-Zuck/zafi $ cd zafi $ pip2 instal

Romi Afrizal 50 Dec 26, 2022
DependConfusion-X Tool is written in Python3 that scans and monitors list of hosts for Dependency Confusion

DependConfusion-X Tool is written in Python3 which allows security researcher/bug bounty hunter to scan and monitor list of hosts for Dependency Confusion.

Ali Fathi Ali Sawehli 4 Dec 21, 2021
Use FOFA automatic vulnerability scanning tool

AutoSRC Use FOFA automatic vulnerability scanning tool Usage python3 autosrc.py -e FOFA EMAIL -k TOKEN Screenshots License MIT Dev 6613GitHub6613

PwnWiki 48 Oct 25, 2022
A Python & JavaScript Obfuscator made in Python 3.

Python Code Obfuscator A script that converts code into full on random numerical expressions. Simple Scripts: Python Mode... Input: Function that deco

Karim 3 Mar 24, 2022
Kriecher is a simple Web Scanner which will run it's own checks for the OWASP

Kriecher is a simple Web Scanner which will run it's own checks for the OWASP top 10 https://owasp.org/www-project-top-ten/# as well as run a

1 Nov 12, 2021
BF-Hash - A Python Tool to decrypt hashes by brute force

BF-Hash Herramienta para descifrar hashes por fuerza bruta Instalación git clone

5 Apr 09, 2022
Cobalt Strike < 4.4 dos CVE-2021-36798

CVE-2021-36798 CVE-2021-36798 Cobalt Strike 4.3 dos 用法 python3 CVE-2021-36798.py BeaconURL 打瘫Cobalt Strike 只需要一个包 已测试 4.3 4.2 参考: https://labs.sent

37 Nov 09, 2022
Scan Site - Tools For Scanning Any Site and Get Site Information

Site Scanner Tools For Scanning Any Site and Get Site Information Example Require - pip install colorama - pip install requests How To Use Download Th

NumeX 5 Mar 19, 2022