✅ White Snake experimental update 1.6.1.6
Trezor/Ledger hardware wallets phishing (requires custom C2 installation; and also updating server side files and build)
Tested with Trezor model T and Ledger nano X.
Tronlink wallet bruteforce automatic action.
Steam Desktop Authenticator .maFile...
✅ White Snake update 1.6.1.4
Added automatic action to extract latest crypto exchanges (BoxExchanger based websites)
Added new icons for system info tab.
Geolocation map now shows IP-based geolocation.
Changed stub encryption method.
You can disable stub obfuscation in builder...
Geolocation tab
Based on Wi-Fi points; Requires WLAN module on victim's pc to work; accuracy 30 meters
Geolocation map has light/dark layers depending on selected theme.
Some videos (Including old versions)
Grabber tab
Contains stolen files. For example wallets, apps sessions and etc.
Remote Terminal tab
Appears only if you have enabled "Resident" mode in builder.
If victim's PC is online - green dot will blink near "Remote terminal" caption.
You can execute system commands, download and...
Passwords tab
This tab contains passwords from all browsers and several apps like filezilla hosts, pidgin and etc.
You can export unique passwords to generate bruteforce list.
Also you can search entries by domain name.
Credit Cards and AutoFill tabs (Description not needed.)
Cookies tab...
Report page
Browser History render is disabled by default. (To speed up report load)
You can enable history render by toggling key in config (%LocalAppdata%\WhiteSnake\templates\lib\js\config.json)
Basic information tab
Contains system info and desktop screenshot.
Automatic actions tab...
You can set fake digital signature.
File size pumper.
proxy-setup command (Allows you to setup SOCKS5 proxy from victim pc)
netdiscover command (Allows you to perform LAN scan for devices and open ports)
Windows stub features
File loader.
Leaves no trace.
Strong log encryption.
No server/ports needed. (All infrastructure works over tor network)
Fast execution in memory.
You able to install beacon into victim PC for remote access.
Functionality can be extended by editing grabber commands tab...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.