Basically, it's not about morality of "pwning the pwners". It's about going for the lowest hanging fruit. The hackers that create these bogus tools know that anyone searching for these tools (instead of making it themselves) are incapable of double checking code and finding that kind of stuff. They also know that people doing this kind of stuff have info that they might want and that they don't encrypt or even isolate their stuff from their deployer devices: crypto wallets, personal files for blackmailing/selling, pr0n (sometimes the illegal kind). They know their targets well, and so, they make the perfect honeypot for them. And since it's a criminal targeting a potential criminal (since some are just prankster kids, not actual hackers), they know the conned won't do anything about it.
its not that anyone searching for this aren't able to double check, but enough of them don't and the cost to the uploader is almost nothing, just like how you get obvious scam emails not because they think you specifically will fall for it but because they know statistically enough people will fall for it versus the low cost of automatically sending out the same email. It wouldn't matter if 95% of people who look at the tools don't end up downloading it as long as enough do to offset the cost of making new github accounts.
> anyone searching for these tools (instead of making it themselves) what kind of logic is this, why in the world would you implement every hacktool you might need? at that point why not create your own compiler, standards, operating system, etc... if the implementation exists, and supports your usecase sufficiently theres no point in wasting time reinventing the wheel, regardless of whether or not you can.
@@dragoneye8610 no one is saying don't reuse tools, is the price you pay really worth ? It is just a matter of balance pros and cons. There is no honour among thieves, hacking is illegal, so if you see a hack tool. .. from a hacker ..... Well, enough has been said.
This is absolutely true. The first program I ever remember making was a keylogger to steal runescape passwords. I disguised it as a tool to DDoS people in pvp.
@@stage6fan475it’s a cool game engine, and there are some really cool games made using it, but on average it’s just for scammers to prey on kids with mommy’s credit card.(the Roblox company, the sketchy companies that make most of the slopp games, and those selling ‘hacks’ for Roblox)
Not very bizarre because russians are typically brainwashed to be doublethinking when they are very young. Standard procedure of an authoritarian country.
Not very bizarre because russians are typically brain washed to be double-thinking when they are very young. Standard procedure of an authoritarian country.
> passively complain that JH has ads and sponsors, which there are blockers for > Gaslight someone else for potentially not using an adblocker Logic/10
@@UnknownEntity420 I didn't mean to be toxic, though now that you say that I do see it, so sry. Second of all, John now has full videos that are dedicated to "show this beautiful and amazing work of xyz, 'oh and by the way I am lucky that they are sponsoring today's video'"
I found this people rat before this video, they had multiple hosting websites where they storage the stolen files. I have all of their source codes. Also took down 4/5 websites of them, Good Job
Another great point about why it's important to talk about even though these discord pirate wannabes deserve the results of their software...is that this kind of software is primarily used by children/teenagers/immature adults. They may not consider the consequences, or think they have nothing worth being stolen. But they are likely to share a computer or network with someone who does.
What triggers me most is the fact that these ppl are trying to rat people that want to spread stealers, like bro why not just hide rat inside of stealer that spreader gonna spread, so that original ratter would get more infections
Are you using Spectre here (wallpaper shown at 10:32) because it was a leftover VM from the Windows mod video or do you like to use it to have a less expensive VM? I'm just curious because I've been considering it for VMs when I don't feel like degrading my SSD lifespan by 40GB Edit: I've just realized the masterful subversive storytelling in why you were using Spectre for this video...
Can you make a video about Magisk (android root), it seems it is open source but some important parts are closed source (blobs), there is also a way to use magisk in wsa in windows
Me after stealing a random github Downloader script from github (Ended up having to read documentation without knowing what it's documenting and just decided to use a git module to clone a repo and then remove the .git folder)
People fell for my closed source info stealer disguised as a Roblox executor, over 40+ ppl ran it before the git got taken down. It wasn't just kids either, didn't do anything with the stolen info besides mess around on their discord account.
Lain would NEVER have to analyze this software to understand it's malware and exactly how it works. She would just know intuitively what the base64 decoded values are, what net requests are being made, amongst other things.
If you want obfuscated (and some are really heavily obfuscated!) stealer malware, there is plenty of it in Facebook ads at the moment. Most of the free downloads are information stealers. The AI video or image generators that are available as downloads, are favourites. It won't take you long to find them.
Can we detect easily a type of requests and actions on our machine? Or suspicious requests live scan ? Like I always wonder if it’s possible to identify those suspicious activity even in the programs himself before executing it. To identify if it’s malware / can be / or legit actions. Especially with non open source software. It should be possible to have a custom protection that can even let us allow precise actions and tell us details about it. Hybrid analysis is something that look like that but it would be great as an anti virus. Idk if one exists already.
This is what malware detection programs/services try to do, ye, these days it goes further than just static binary scan, you can upload a sample to some sandbox online and have report showing where it connects, what files it's using, what processes it's spawning
Thank you. This shows how powerful Python is. Also, open source would protect you if you are good enough to read the code. Despite your clickbaity thumbnail, it was not invisible. Wouldn't a simple wordwrap catch this much easier? (Wordwrap unknown programs, folks)
Please start a patreon and do some training type videos. I would definitely sign up. If your schedule allows for such activities And thank you for this content📚 Time
I thought this was going to be some weird unicode thing where it turns text invisible via special characters, not just a bunch of spaces to hide the code offscreen, lmao.
Probably because they decrypt without needing any extra information from the user (like a master password) so the malware just needs to to do the exact same thing as the browser to get the exact same information. Never said I'm any good at computer security but this is just my general take.
HAHA sending these types of people junk is so fun to me. Malware devs and scammers are lazy so spamming them usually works out. In my experience anyways.
It's crazely interesting. As at first when i've started cheating on Minecraft I would never expect any kind or rat or virus running trough until the day my discord account started going crazy 😂
Im so confused about the audio through the entire Video, it jumps back and forth from bad quality to good quality and then back to bad quality, sadly it's bothering me very much!
I only have a basic knowledge of Python, but I am amazed to see this work on “how it works”. Would this area be cybersecurity? Any tips for an aspiring developer?
hey, since you're a smart guy, maybe you can help me solve a little problem. I'm looking for the Hex code of the keys I'm pressing on a gaming controller (it's actually a gear shift lever). I'm using windows btw. example for keyboard: l_shift is = 0xa0 and l_ctrl = 0xa2 (I am looking for these values) finding this out for a keyboard is easy, since there is software for it, but I can't find anything for gaming controllers... I need this to use a mod for a game, which let's me shift gears manually, but I don't want to use my keyboard for driving and shifting, but my wheel and gear shifter. the game only supports wheels and doesn't let you shift manually at all. haha no idea if you can help at all or even read this, but thank you in advance ;-) (btw I've googled for an answer a lot and also asked this question on other places, but no one responds) tüdeldü
Controllers don't use keyboard keycodes. You need to use XInput/DirectInput mapping software to remap your controller inputs to keyboard keys. I know DS4Windows does it, but vigembus is dead and DS4W may not support your racing peripherals. GL
@@Zullfix hmmm... sounds like an idea. I thought about something like this, too but I didn't know you can map the keys to keyboard keys. cool. I'll try that when I have time for it! 🙂
Xbox Controller: A button: 0x04 B button: 0x05 X button: 0x06 Y button: 0x07 Left trigger: 0x09 Right trigger: 0x0a Left bumper: 0x0c Right bumper: 0x0d Left stick: 0x01 Right stick: 0x02 D-pad up: 0x0f D-pad down: 0x10 D-pad left: 0x11 D-pad right: 0x12 Start button: 0x08 Back button: 0x0b PlayStation Controller: Cross button: 0x04 Circle button: 0x05 Triangle button: 0x06 Square button: 0x07 L1 button: 0x09 R1 button: 0x0a L2 button: 0x0c R2 button: 0x0d Left stick: 0x01 Right stick: 0x02 D-pad up: 0x0f D-pad down: 0x10 D-pad left: 0x11 D-pad right: 0x12 Options button: 0x08 Share button: 0x0b Nintendo Switch Controller: A button: 0x04 B button: 0x05 X button: 0x06 Y button: 0x07 Left trigger: 0x09 Right trigger: 0x0a Left bumper: 0x0c Right bumper: 0x0d Left stick: 0x01 Right stick: 0x02 D-pad up: 0x0f D-pad down: 0x10 D-pad left: 0x11 D-pad right: 0x12 Plus button: 0x08 Minus button: 0x0b To find the hex code for a specific button on your gear shift lever, you can use a program like AutoHotkey to capture keystrokes.