A tool for working with Echelon, RedLine, Racoon, and DCRat logs
1) Get CCs - Pulls all cards from logs
2) Get FTPs - Вытаскивает и проверяет на валидность все FTP-сервера из лога
3) Get Discord tokens - Вытаскивает токены из всех сессий Discord, и записывает их в файл DiscordTokens.txt
4) Search passwords - Pulls out all login
assword pairs for the specified part of the URL
5) Get Telegrams - Pulls out all Telegram sessions, with the subsequent possibility of opening by number [THERE SHOULD BE A TELEGRAM PORTABLE WITH THE NAME IN THE PROGRAM FOLDER Telegram.exe ]
6) Sort Logs by Date - Sorts logs, creates a folder Sorts and folders with years, then folders with months in folders for years, and sorts logs by dates
7) VERBOSE - This parameter is responsible for seeing not only the login
assword, but also the full URL of the site when Searching passwords
Manual
1) Password: 123
2) Unzip the archive to any folder
3) Run stealer.exe , next stealerchecker.exe
4) We throw in the database of logs and check for any requests!
Link
1) Get CCs - Pulls all cards from logs
2) Get FTPs - Вытаскивает и проверяет на валидность все FTP-сервера из лога
3) Get Discord tokens - Вытаскивает токены из всех сессий Discord, и записывает их в файл DiscordTokens.txt
4) Search passwords - Pulls out all login
5) Get Telegrams - Pulls out all Telegram sessions, with the subsequent possibility of opening by number [THERE SHOULD BE A TELEGRAM PORTABLE WITH THE NAME IN THE PROGRAM FOLDER Telegram.exe ]
6) Sort Logs by Date - Sorts logs, creates a folder Sorts and folders with years, then folders with months in folders for years, and sorts logs by dates
7) VERBOSE - This parameter is responsible for seeing not only the login
Manual
1) Password: 123
2) Unzip the archive to any folder
3) Run stealer.exe , next stealerchecker.exe
4) We throw in the database of logs and check for any requests!
Link