Discord Token Stealer Malware Protection

Overview

TokenGuard

TokenGuard2

TokenGuard, protect your account, prevent token steal. Totally free and open source


Discord Server: https://discord.gg/EmwfaGuBE8

Source Code: https://github.com/ZaikoARG/TokenGuard


TokenGuard is a program written in Python that aims to mitigate almost 100% the theft of Discord Tokens on your computer.

The main features are:

  • Simple GUI: TokenGuard has a graphic interface that is too simple, not very invasive and easy to use, which aims to adapt to all types of users.
  • Constant Protection: The program is in charge of cleaning the traces of the Discord Token constantly, guaranteeing its safety at all times.
  • Low Consumption: Despite the fact that it is constantly running, the consumption of both the CPU and RAM is very low..

Installation

Download: https://github.com/ZaikoARG/TokenGuard/releases

TokenGuard has a simple, multi-language installer for easy installation.

Screenshot_6


Usage

The interface is very simple, it has a Toggle to turn the protection on and off.

The moment you activate the Toggle, the protection will start to work. And when I deactivate it it will stop working.

When you open the program, an icon will be created in the hidden icon bar. This in order to be able to control the program when it is sent to the background

Screenshot_8

Important Things About Usage

  • You should keep in mind that when you activate the protection, discord must be open and logged in.
  • In the event that Discord is not open, the program will wait for you to open it.
  • Just leave the Toggle on if you want and open it to start protection.
  • If the Discord process is closed, the program will report an error and only the protection will be disabled. Turn it back on and open the Discord process.
  • Minimizing the application will automatically send it to the background. To reactivate it, use the open option of the hidden icon at the bottom right of the screen.
  • For added protection, I highly recommend deleting saved Discord sessions in your Browser.
  • When using TokenGuard, you will notice that when you reopen Discord, it will ask you to log in again. This is because my program deletes the databases where discord stores the Login Token

For Developers

How TokenGuard Works

TokenGuard works by trying to clean the absurd and excessive traces of the Token that Discord leaves on your system. This includes Tokens stored in Files, as well as those stored in Memory.

I did this protection scheme based mainly on the operation of Token Stealer Malwares.

My program will take care of cleaning up the Discord LDB files. After this, a loop will begin that will erase the memory addresses that contain the User Token every 5 seconds.

TokenGuard Operation Scheme

Concept Map (2)

About the Code

I made the TokenGuard code as organized as possible, dividing the workflow into several files.

  • files.py: LDB Files Cleanup
  • logs.py: Log Saving
  • memory.py: Classes and Functions for Reading and Writing Memory
  • py_toggle.py: Toggle Button for the GUI
  • shared_variables.py: Definition of Shared Variables
  • systrayicon.py: Systray Icon Classes and Functions
  • TokenGuard.py: Main Program
  • tokenprotection.py: Token Protection Initialization

I tried to add a good amount of annotations so that whoever wants to use parts of the code can understand how each part works.

if "__main__" == __name__:
    # Define SysTrayIcon Thread
    st = systrayicon.SysTrayIcon()
    # Initialize SysTrayIcon
    st.start()
    # Define the App
    app = QApplication(sys.argv)
    # Define the MainWindow
    window = MainWindow()
    # Start App
    sys.exit(app.exec())

I want to clarify that the code was totally made by me and that it possibly contains certain parts where it looks ugly or maybe it could have been done better.

In any case, the tool will have more updates in which I will try to correct the problems that appear.

In the event that you find a bug or any type of bug or code fix, please let me know on my Discord Server.

Gratitude

I want to thank my colleague and friend Mr20 for helping me with the designs, giving me moral support and accompanying me all the way to develop the tool.

License

This project is licensed under the terms of the MIT license.

Buy me a Coffee

If you wish you can support my work by inviting me for a coffee.

With this you will be motivating me to improve this project and to create new projects.

Buy me a Coffee: https://www.buymeacoffee.com/ZaikoARG

You might also like...
This repository is one of a few malware collections on the GitHub.
This repository is one of a few malware collections on the GitHub.

This repository is one of a few malware collections on the GitHub.

An IDA pro python script to decrypt Qbot malware string
An IDA pro python script to decrypt Qbot malware string

Qbot-Strings-Decrypter An IDA pro python script to decrypt Qbot malware strings.

A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance
A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

Android Malware (Analysis | Scoring) System
Android Malware (Analysis | Scoring) System

An Obfuscation-Neglect Android Malware Scoring System Quark-Engine is also bundled with Kali Linux, BlackArch. A trust-worthy, practical tool that's r

A guide to building basic malware in Python by implementing a keylogger application
A guide to building basic malware in Python by implementing a keylogger application

Keylogger-Malware-Project A guide to building basic malware in Python by implementing a keylogger application. If you want even more detail on the Pro

A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms

A malware to encrypt all the .txt and .jpg files in target computer using RSA algorithms. Change the Blackgound image of targets' computer. and decrypt the targets' encrypted files in our own computer

Detection tool of malware(s) by checksum (useful for forensic)

🐍 malware_checker.py Detection tool of malware(s) by checksum (useful for forensic) 📦 Dependencies installation $ pip3 install -r requirements.txt

Huskee: Malware made in Python for Educational purposes
Huskee: Malware made in Python for Educational purposes

𝐇𝐔𝐒𝐊𝐄𝐄 Caracteristicas: Discord Token Grabber Wifi Passwords Grabber Googl

A token logger for discord + steals Brave/Chrome passwords and usernames
A token logger for discord + steals Brave/Chrome passwords and usernames

Backdoor Machine - ❗ For educational purposes only ❗ A program made in python for stealing passwords and usernames from Google Chrome/Brave and tokenl

Releases(tokenguard-v1.0.0)
APKLeaks - Scanning APK file for URIs, endpoints & secrets.

APKLeaks - Scanning APK file for URIs, endpoints & secrets.

dw1 3.5k Jan 09, 2023
Obfuscate your Python scripts better, faster.

⚜️ Berserker ⚜️ An unique Python3 obfuscator using Kyrie Eleison's encryption protocol, written in Python3. 📋 Examples 📋 Unobfuscated: input("Hello

Billy 81 Dec 07, 2022
Js File Scanner This is Js File Scanner

Js File Scanner This is Js File Scanner . Which are scan in js file and find juicy information Toke,Password Etc.

122 Dec 12, 2022
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios.

Dr. Johannes Pohl 9k Jan 03, 2023
Proof of concept GnuCash Webinterface

Proof of Concept GnuCash Webinterface This may one day be a something truly great. Milestones [ ] Browse accounts and view transactions [ ] Record sim

Josh 14 Dec 28, 2022
Log4j minecraft with python

Apache-Log4j Apache Log4j 远程代码执行 攻击者可直接构造恶意请求,触发远程代码执行漏洞。漏洞利用无需特殊配置,经阿里云安全团队验证,Apache Struts2、Apache Solr、Apache Druid、Apache Flink等均受影响 Steps 【Import

manmade 57 Oct 03, 2022
A small utility to deal with malware embedded hashes.

Uchihash is a small utility that can save malware analysts the time of dealing with embedded hash values used for various things such as: Dyn

Abdallah Elshinbary 48 Dec 19, 2022
Crypto Meta Extractor

Crypto Meta Extractor This repository contains the code which extracts some metadata of all the cryptocurrencies listed (9K) on CoinMarketCap. Coding

Samyak Jain 3 Jul 03, 2022
PoC for CVE-2021-26855 -Just a checker-

CVE-2021-26855 PoC for CVE-2021-26855 -Just a checker- Usage python3 CVE-2021-26855.py -u https://mail.example.com -c example.burpcollaborator.net # C

Abdullah AlZahrani 17 Dec 22, 2022
An intranet tool for easily intranet pentesting

IntarKnife v1.0 a tool can be used in intarnet for easily pentesting moudle hash spray U can use this tool to spray hash on a webshell IntraKnife.exe

4 Nov 24, 2021
SQLi Google Dork Scanner (new version)

XGDork² - ViraX Google Dork Scanner SQLi Google Dork Scanner by ViraX @ 2021 for Python 2.7 - compatible Android(NoRoot) - Termux A simple 'naive' pyt

8 Dec 20, 2022
Dapunta Multi Brute Force Facebook - Crack Facebook With Login - Free

✭ DMBF CRACK Dibuat Dengan ❤️ Oleh Dapunta Author: - Dapunta Khurayra X ⇨ Fitur Login [✯] Login Token ⇨ Fitur Crack [✯] Crack Dari Teman, Public,

Dapunta ID 10 Oct 19, 2022
Small python script to look for common vulnerabilities on SMTP server.

BrokenSMTP BrokenSMTP is a python3 BugBounty/Pentesting tool to look for common vulnerabilities on SMTP server. Supported Vulnerability : Spoofing - T

39 Dec 16, 2022
test application for the licence key web app.

licence_software_test_app Make sure you set your database values in a .env file to the folder. Install MYSQL connector: pip install mysql-connector-py

Carl Beattie 1 Oct 28, 2021
A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.

A simple python script to dump remote files through a local file read or local file inclusion web vulnerability. Features Dump a single file w

Podalirius 48 Dec 03, 2022
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.

CVE-2021-31166: HTTP Protocol Stack Remote Code Execution Vulnerability This is a proof of concept for CVE-2021-31166 ("HTTP Protocol Stack Remote Cod

Axel Souchet 820 Dec 18, 2022
python driver for fingerprint machine (ZKTeco biometrics)

fpmachine python driver for fingerprint machine (ZKTeco biometrics) support until now 2 model supported and tested ZMM100_TFT and ZMM220_TFT install p

Samy Sultan 4 Oct 06, 2022
A security system to warn you when people enter your room 🎥

Get Out My Room v0.1 I hate people coming in my room when i'm not there. Get Out My Room is a simple security system that sends notifications with vid

ScriptLine 1 Jan 11, 2022
LinOTP - the open source solution for two factor authentication

LinOTP LinOTP - the Open Source solution for multi-factor authentication Copyright © 2010-2019 KeyIdentity GmbH Coypright © 2019- arxes-tolina GmbH In

LinOTP 462 Jan 02, 2023
DNS hijacking via dead records automation tool

DeadDNS Multi-threaded DNS hijacking via dead records automation tool How it works 1) Dig provided subdomains file for dead DNS records. 2) Dig the fo

45 Dec 20, 2022