Skip to content

Latest commit

 

History

History
76 lines (53 loc) · 1.58 KB

File metadata and controls

76 lines (53 loc) · 1.58 KB

🛠️ Gb_Analizer

A powerful tool for reverse engineering grabbers (malware) to extract webhooks and tokens.

🌟 Features

  • Reverse Engineer grabbers and extract webhooks and tokens.
  • Supports multiple deobfuscation methods.
  • Handles both Java and Python-based grabbers.
  • Outputs details in JSON format.

📦 Installation

Windows

  1. Clone the repository:

    git clone https://github.com/lalaio1/Gb_Analizer.git
    cd Gb_Analizer
  2. Install dependencies:

    pip install -r requirements.txt

Linux

  1. Clone the repository:

    git clone https://github.com/lalaio1/Gb_Analizer.git
    cd Gb_Analizer
  2. Install dependencies:

    pip install -r requirements.txt

Note: Python 3.9 or higher is required.

🚀 Usage

python deobfuscator.py <filename> [options]

Options

  • -d, --download: Download the file from a link.
  • -j, --json: Output details in JSON format.

Example

python deobfuscator.py example_grabber.py -j

🎨 Example Output

{
    "type": "python grabber",
    "webhook": "https://discord.com/api/webhooks/...",
    "pyinstaller_version": "4.5",
    "python_version": "3.9"
}

🛠️ Development Status

Note: This tool is currently in the alpha stage and is still under active testing. Users may experience bugs or incomplete features. Your feedback and contributions are welcome to improve the tool.

👨‍💻 Author

  • Developed by lalaio1. Please give a star on GitHub.