Skip to content

drcrypterdotru/warworm-stealer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

14 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Warworm Stealer v1.3.0 (πŸ”₯NEW)

**Developed by DRCrypter for authorized security testing and educational purposes only.

Python Flask PyInstaller UPX License


What is Warworm Stealer?

Warworm Stealer is a simple as another stealer using for collecting many information details of pc, browser password, data, crypto wallet, many useful information but in this part I have combine idea with worm on networking (LAN) that helpful you understanding security research framework designed for authorized penetration testing, cybersecurity education, and threat simulation. It represents a sophisticated implementation of modern information gathering and lateral movement techniques commonly observed in advanced persistent threats (APTs), packaged within an accessible web-based builder interface (Easy to use).

Demo


Architecture Overview

System Design Pattern

Warworm Stealer a builder-stub architecture with three primary components:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    BUILDER LAYER (Flask)                    β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”β”‚
β”‚  β”‚  Web Dashboardβ”‚  β”‚  Config API β”‚  β”‚  PyInstaller        β”‚β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                              β”‚
                              β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    CONFIGURATION LAYER                      β”‚
β”‚          feature off/on & delivery settings                 β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                              β”‚
                              β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    EXECUTABLE LAYER (Stub)                  β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”       β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”β”‚
β”‚  β”‚  Data Collectionβ”‚ Network Worm β”‚       β”‚  Persistence        β”‚β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜       β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Execution Flow

  1. Configuration Step: User selects capabilities via web dashboard (WebUI)
  2. Compilation Step: Builder injects configuration into template stub
  3. Distribution Step: PyInstaller packages modules into single executable
  4. Execution Step: Execute our *Exe to your lab with configuration (setup from WebUI)
  5. Delivery Results Step: Sent all Success Data Reporting by zip to Discord or Telegram

πŸ›‘οΈ Warworm Stealer Feature Details


πŸ†• v1.3.0 Update: Introducing Remote Management - Control client remotely via browser!
Live desktop streaming, web-based file manager, and ngrok tunnel support. Features a clean WebUI dashboard with secure token authentication.

βš™οΈ Modules Summary

βš™οΈ Module 🎯 Purpose πŸ”‘ Key Highlights
🧠 Info Gathering System profiling Hardware, OS, IP, users, installed apps
πŸ” Credential Access Extract sensitive data Browser passwords, WiFi creds, session tokens
πŸ“Έ Surveillance Monitor environment Screenshots, active windows, multi-monitor
🌐 Network Ops (Worm) Spread & scan network Host discovery, port scanning, brute-force services (FTP, SSH, Telnet, SMB, RDP)
πŸ’° Crypto Clipper Hijack transactions Replaces crypto wallet addresses (BTC, ETH, XMR, LTC, DOGE)
πŸ” Persistence Maintain access Registry, startup (Startup)
πŸ“€ Exfiltration Send collected data Telegram / Discord delivery
πŸ”₯ Debug Telemetry Error tracking & diagnostics Auto-logs errors.txt with timestamps, included in zip delivery
πŸ–₯️ Remote Management (NEW 1.3.0) Remote monitoring & control Remote Desktop (real-time streaming), File Manager (web-based), Ngrok tunnel, unified password auth

πŸ“Έ Screenshots of Features

πŸŽ›οΈ WebUI Dashboard (v1.3.0)

Secure Build Dashboard
Dashboard Modules
Build Settings
Builder Settings
New Builder
New Builder

πŸ–₯️ Remote Monitoring and Management (RMM)

Remote Desktop - Live Streaming
Remote Desktop
File Manager - Web Based
File Manager
RMM Page
RMM Page
Secure Authentication Login
RMM Authentication

🧾 Report Samples

System Overview
Report System Info
Credentials & Passwords
Report Passwords
Network Scan Results
Report Network
Telegram Delivery
Telegram Delivery
Remote Access Panel (New v1.3.0)
RMM Access Credentials

πŸŽ₯ Demo Video

Watch WarWorm Stealer Demo.

Watch Remote Access (RMM) Demo


Project Structure

Warworm-Stealer/
β”‚
β”œβ”€β”€ πŸ“ Root Configuration
β”‚   β”œβ”€β”€ builder.py              # Flask application entry point
β”‚   β”œβ”€β”€ stub.txt                # Template loader with configuration injection
β”‚   β”œβ”€β”€ main_debug.py           # Standalone execute on VM-LAB (debug mode or developer mode)
β”‚   └── dashboard.html          # Frontend interface (embedded in builder)
β”‚
β”œβ”€β”€ πŸ“ modules/                # Core functionality  
β”‚   β”œβ”€β”€ bot.py                  # Delivery by method Discord Webhook or Telegram bot 
β”‚   β”œβ”€β”€ browser_stealer.py      # Multi-browser credential login  
β”‚   β”œβ”€β”€ collected_info.py       # System collect in USER-PC  
β”‚   β”œβ”€β”€ crypto_clipper.py       # Clipboard monitoring  
β”‚   β”œβ”€β”€ discord_token.py        # Grab Discord session 
β”‚   β”œβ”€β”€ persistence.py          # Auto STARTUP   
β”‚   β”œβ”€β”€ telegram_steal.py       # Grab Telegram session   
β”‚   β”œβ”€β”€ wifi_stealer.py         # Grab WIFI Password 
β”‚   └── worm_network.py         # Network scanner & brute force  
β”‚
β”œβ”€β”€ πŸ“ templates/               # Web interface assets
β”‚   └── dashboard.html          # Web UI for configuration
β”‚
β”œβ”€β”€ πŸ“ upx/                     # Compression binaries
β”‚   └── upx.exe                 # Ultimate Packer for eXecutables
β”‚
β”œβ”€β”€ πŸ“ builds/                  # Temporary compilation directories
β”‚   └── build_YYYYMMDD_HHMMSS/  # Timestamped build folders
β”‚
β”œβ”€β”€ πŸ“ File_Generated/          # πŸ“₯ Final output directory
β”‚   └── Cliented_*.exe          # Compiled executables
β”‚
β”œβ”€β”€ πŸ“ dist/                    # PyInstaller default output (Source code *.py)
│└── πŸ“„ requirements.txt         # Dependency 

Environment Setup

# Clone repository
git clone [repository-url]
cd Warworm-Stealer

# Create virtual environment
python -m venv .venv

# Activate environment
# Windows:
.venv\\Scripts\\activate
# Linux/Mac:
source .venv/bin/activate

# Install dependencies
pip install -r requirements.txt

# Optional: Place UPX binary 
mkdir upx 
# Copy upx.exe to upx/ directory

# Launch builder
python builder.py

Access Dashboard

Open web browser to: http://127.0.0.1:5000


Legal & Ethical Framework

Permitted Usage

βœ… Authorized Activities:

  • Penetration testing with written authorization
  • Security research in isolated environments
  • Educational demonstrations in classroom settings
  • CTF competition challenge creation
  • Personal system security auditing
  • Malware analysis sandboxing

Prohibited Usage

❌ Illegal Activities:

  • Deployment on systems without explicit permission
  • Credential theft from unauthorized targets
  • Network scanning of infrastructure without authorization
  • Cryptocurrency address substitution in real transactions
  • Any activity violating CFAA, GDPR, or local laws

Version History

Version Date Changes
1.3.0 2026-04-07 Remote Monitoring Management (Remote Desktop streaming, File Manager, Ngrok tunnel), Clean WebUI Dashboard with token auth
1.2.0 2026-03-25 Debug Telemetry (Error tracking, auto-logs errors.txt with timestamps)
1.0.0 2026-03-17 Initial release with full module suite

Credits & Attribution

Primary Development: DRCrypter.ru
Framework Architecture: Sentinel Builder v1.2 base
UI Design: Cyberpunk theme with neon accents
Module Contributions: Community security researchers

External Dependencies

  • PyInstaller (GPL-compatible)
  • Flask (BSD)
  • Paramiko (LGPL)
  • Cryptography (Apache/BSD)

Community & Resources

Join on Telegram

Join Telegram: https://t.me/burnwpcommunity



DRCrypter Website

Website: https://drcrypter.net
More tools, resources, and updates are shared on the website + community.


🧠 Security Takeaway

These techniques are commonly studied by security teams to understand threats such as:

  • Infostealer malware
  • Botnets
  • Ransomware loaders
  • Advanced Persistent Threats (APT)

Understanding them helps build:

  • πŸ” malware detection tools
  • πŸ›‘οΈ endpoint security systems
  • πŸ“Š SIEM detection rules

⭐ Star this repository if you find it valuable for security education and research!


⚠️ Disclaimer

This tool is for educational purposes only. 🏫 The creator and contributors are not responsible for any misuse or damages caused. Use responsibly, and only on systems you own or have permission for. βœ…

About

InfoStealer and worm networking brute telnet,ftp,ssh,smb,rdp combine together both are bestfriend

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages