Damaged - Embrace the Infinite

Step into the world of endless opportunities and unlock the gateway to virtual transactions.

  • Domain Update: Our Forum has moved! Please visit us at Damaged.gg for the latest updates.

[Warning] Beware of the python source codes being posted here

ChatGPT

Guest

Hello fellow members of c.io,

I'm reaching out today to raise
an important flag regarding the Python "open source" code snippets that you might come across on this forum. It has come to my attention that a concerning number of individuals, both forum members and potentially even some staff, seem to be overlooking potential security risks. (TL;DR available at the end of the the thread)


Allow me to show a specific example:
Show ContentSpoiler:

At first glance, this code may seem innocent. There's no blatant indication of any attempt to access a Discord webhook, Telegram, or any external server that might suggest your data is being sent to a attacker.
However, what many of you, may have missed upon initial inspection is the libraries being installed and executed:

Show ContentSpoiler:

The hidden threat lies within the library named "pypiele."

The tricky part happens behind the scenes:
pip install pypiele
(assuming the malicious library is disguised as "pypiele"), it downloads the malicious code onto your computer.

This code is saved in a location on your system,
"AppData\Local\Programs\Python\PythonVersion\lib\nameofmalware"


Now, when you run the innocent-looking main.py script that you found online, it starts importing libraries, including the malicious "pypiele."
This means the harmful code gets executed alongside the legitimate code. The attacker's script could perform actions that compromise your privacy and security, like stealing your private information, logging your keystrokes, or taking unauthorized control of your system.

Here's the tricky part: The bad librarycan be different in is name. It might be called "pypypal" or something else each time. This makes it hard to spot.
It's important that we remain vigilant, especially in the realm of open source threads.

Don't let the apparent simplicity of a code snippet blind you to the potential risks it may conceal. By exercising caution and inspecting both the code and the libraries it employs, we can collectively work to ensure a safer and more secure coding environment.
Stay informed, stay safe.


How do i stay safe from this?

simple!

just go to

pypi.org

And look up the libraries name that you find within a open source python program and make sure they are legit.

-----------------------------------------------------------------------------

TL;DR :
When you run the innocent-looking main.py script that you found online, it starts importing libraries, including the malicious "pypiele" in our exemple. Don't let the apparent simplicity of a code snippet blind you, always look up the libraries name that you find within a open source python program and make sure they are legit using pypi.org


[Image: gzqFSUa.gif]
IGNITEHOST.PRO | ENCRYPTED RDP & VPS Instant Deployment Admin Panel 100% Anonymous Cracking Allowed
[Image: Screenshot_27.png]

[Image: image.png?ex=65649816&is=65522316&hm=24a...6d781e6d&=]
 

ChatGPT

Guest
(05 August, 2023 - 03:37 AM)Ddarknotevil Wrote: Show More
(05 August, 2023 - 03:32 AM)Rune Wrote: Show More
Hello fellow members of c.io,
I'm reaching out today to raise an important flag regarding the Python "open source" code snippets that you might come across on this forum. It has come to my attention that a concerning number of individuals, both forum members and potentially even some staff, seem to be overlooking potential security risks. Despite my earlier report about a particular thread that is still active, it continues to spread malware that poses a threat to unsuspecting users.
Allow me to show a specific example:

Show ContentSpoiler:
At first glance, this code may seem innocent. There's no blatant indication of any attempt to access a Discord webhook, Telegram, or any external server that might suggest your data is being sent to a attacker. However, what many of you, may have missed upon initial inspection is the libraries being installed and executed:
Show ContentSpoiler:


the hidden threat lies within the library named "pypiele." If you were to execute this code without a second thought, the "pypiele" malware would discreetly operate in the background. Its purpose? To steal your information from your system, including browser logins, Discord tokens, and cookies.
Now The librarymodule can be different each time. It can be named "he8hew98h3" or "pypyaal" or "example95" Since Is the Attacker's choice of name to upload.
It's important that we remain vigilant, especially in the realm of open source threads. Don't let the apparent simplicity of a code snippet blind you to the potential risks it may conceal. By exercising caution and inspecting both the code and the libraries it employs, we can collectively work to ensure a safer and more secure coding environment.
Stay informed, stay safe.


This malware code was obtained from the user @Ehohjsuise< (this user is posting malware and staff still hasnt banned him just like other hundreds of users)​

Thats Huge Thank you for the heads up , Now I know why my new paypal Account got hacked lol
[Image: wack.png]

Even though we act like retards in SB, is important that we look out for each other in terms of security and safety.
 

tester

Guest
@Rune how do you actually decompile Python .exe back to the source code
is there any video or tutorial.
 

testsssse

Guest
(05 August, 2023 - 05:17 AM)ToFamSuper Wrote: Show More
@Rune how do you actually decompile Python .exe back to the source code
is there any video or tutorial.

He didn't decompile it, he is just analyzing a source code from the source code section.
Mid and bottom signaturespots for sale.
DM me here or on tg : https://t.me/PureEvil99
 

48,670

38,233

238,380

Top