AI prompts
base on Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier. <span align='center'>
# `PySilon Malware`
<p align='center'><img src="https://user-images.githubusercontent.com/44233157/205148071-ed0f810e-be71-4b18-8c6b-94e838ebda5d.png" width=500 /></p>
`Advanced RAT malware written in Python, fully controllable through Discord with dedicated GUI builder to make preparation easier.`
`Dont download or buy from anywhere else except this repository. Especially not from someone claiming they got an advanced/pro version on telegram or discord!`
</span>
--------------------
## Wiki
Read our extensive Wiki for more information and detailed building instructions.
[![Wiki](https://img.shields.io/badge/wiki-link-blue?style=for-the-badge&logo=gitbook&logoColor=white)](https://github.com/mategol/PySilon-malware/wiki)
## PySilon Community
Join our Telegram and Discord servers for support, to ask questions, recommend features and talk to like minded people!
[![Telegram - Group](https://img.shields.io/badge/pysilon-community-blue?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/+8razFyklyFw2OWU0)
--------------------
# Table of contents
- <a href="https://github.com/mategol/PySilon-malware#disclaimer">Disclaimer</a>
- <a href="https://github.com/mategol/PySilon-malware#features">Features</a>
- <a href="https://github.com/mategol/PySilon-malware#preparation">Preparation</a>
- <a href="https://github.com/mategol/PySilon-malware#available-commands">Available commands</a>
- <a href="https://github.com/mategol/PySilon-malware#setup">Setup</a>
- <a href="https://github.com/mategol/PySilon-malware#building-standalone-executable">Building executable</a>
- <a href="https://github.com/mategol/PySilon-malware#autonomic-features">Autonomic features</a>
- <a href="https://github.com/mategol/PySilon-malware#commands-manual">Commands manual</a>
--------------------
# Disclaimer
> Information and code provided on this repository are for educational purposes only. The creator is no way responsible for any direct or indirect damage caused due to the misusage of the information. Everything you do, you are doing at your own risk and responsibility.
--------------------
# Features
### PySilon malware can do plenty of things, like:
- handle multiple PCs (not only one, like in most of the cases)
- UAC Bypass (gain *Administrative permissions* on startup)
- **delete itself whenever you want**
- log every key pressed on *keyboard* (keylogger)
- take *screenshots* anytime you want
- record *screen* anytime you want
- elevate itself to *critical process* (will trigger *Blue Screen of Death* when killed)
- directly *manipulate* **victim's PC graphics** (display custom "things"->[bitmaps, images, texts, glitch effects])
- turn **off**/**on** *monitors* of victim's PC
- **block** access to any *website*
- browse and kill running *processes*
- disable processes (make certain processes **impossible** to run)
- *communicate* with the victim in several ways
- use *Text-To-Speech* on victim's PC
- take images from *webcam*
- *block* the *mouse* and *keyboard*
- steal saved *WiFi* passwords
- grab *history*, *cookies* and *passwords* saved in web browsers
- grab *discord tokens*
- grab system information
- manipulate *Windows sounds* settings (change the *volume*)
- play **audio files** on victim's PC (in background)
- record *microphone* input (24/7) and save it in *.wav* files
- stream live *microphone* input on voice channel
- browse *files* on target PC
- upload and download *files* from target PC
- remove *files* from target PC
- execute *files* on target PC
- replace copied *crypto currency wallet* addresses to your [configured] ones
- trigger *jumpscares*
- trigger *Blue Screen of Death*
- execute *fork bomb* (crash the PC)
- *Anti-VM* (PySilon won't run on Virtual Machines, f.ex.: VirtualBox, VMWare)
- run *shell* commands (CMD/Powershell)
- ***Debug Mode*** for easier testing and `contribution`
--------------------
# Preparation<br />
`git clone https://github.com/mategol/pysilon-malware`<br />
`cd pysilon-malware`<br />
<a href="https://github.com/mategol/PySilon-malware/wiki/Setup">`Create Discord BOT and server`</a><br />
***Windows:*** `Run the PySilon.bat either from Command Line or double clicking on it`<br />
***Linux:*** `Run the PySilon.sh from Command Line`<br />
--------------------
# Available commands
<a href="https://github.com/mategol/pysilon-malware#ss"> `.ss`</a> - take screenshot at any time<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.screenrec`</a> - record the screen for 15 seconds<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.critical-enable`</a> - elevates the process to critical status (`.critical-disable` to undo)<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.display-graphic`</a> - manipulate low-level graphics by displaying pixels prepared in DrawlingStudio<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.display-glitch <name>`</a> - display specified screen glitch<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.monitors-off`</a> - turn off all monitors (`.monitors-on` to turn back on)<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.website-block <website>`</a> - block specified website from being accessed from any browser (`.website-unblock <website>` to unblock it)<br />
<a href="https://github.com/mategol/pysilon-malware#show-what-to-show"> `.show <what-to-show>`</a> - get list of running processes or available commands<br />
<a href="https://github.com/mategol/pysilon-malware#kill-process-id"> `.kill <process-name-or-id>`</a> - kill any running process<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.blacklist <process-name>`</a> - adds specified process to the blacklist (victim won't be able to run it)<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.whitelist <process-name>`</a> - removes specified process from the blacklist (victim will be able to run it) <br />
<a href="https://github.com/mategol/pysilon-malware#kill-process-id"> `.foreground`</a> - get active window process name<br />
<a href="https://github.com/mategol/pysilon-malware#kill-process-id"> `.msg title="<title>" text="<text>" style=<style>`</a> - send a message to victim and get the response<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.tts <message>`</a> - plays a *Text-to-Speech* message on victim's PC<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.webcam <action>`</a> - use connected webcam (currently supports photos shooting)<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.block-input`</a> - block the mouse and keyboard(`.unblock-input` to unblock it)<br />
<a href="https://github.com/mategol/pysilon-malware#grab-what-to-grab"> `.grab <what-to-grab>`</a> - grab for example saved passwords in web browsers<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.volume <value>`</a> - change the audio output volume on victim's PC<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.play [<file>]`</a> - play any *.mp3* file on the victim's PC (existing one or sent in the next message if no filename was provided)<br />
<a href="https://github.com/mategol/pysilon-malware#join"> `.join`</a> - join voice-channel and stream live microphone input<br />
<a href="https://github.com/mategol/pysilon-malware#pwd"> `.pwd`</a> - show working directory<br />
<a href="https://github.com/mategol/pysilon-malware#ls"> `.ls`</a> - list content of working directory<br />
<a href="https://github.com/mategol/pysilon-malware#tree"> `.tree`</a> - show tree of working directory<br />
<a href="https://github.com/mategol/pysilon-malware#cd-directory"> `.cd <directory>`</a> - change working directory<br />
<a href="https://github.com/mategol/pysilon-malware#upload-type-filename"> `.upload <type> [<name>]`</a> - upload any file or zipped directory (also greater than 8MB ones) onto target PC<br />
<a href="https://github.com/mategol/pysilon-malware#download-file-or-directory"> `.download <file-or-directory>`</a> - download any file or zipped directory (also greater than 8MB ones) from target PC<br />
<a href="https://github.com/mategol/pysilon-malware#remove-file-or-dir"> `.remove <file-or-directory>`</a> - remove file or directory on target PC<br />
<a href="https://github.com/mategol/pysilon-malware#execute-file"> `.execute <file>`</a> - run any file on target PC<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.start-clipper`</a> - start crypto-clipper (swap crypto currency wallet addresses to your ones)(`.stop-clipper` to stop it)<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.jumpscare [<preset>]`</a> - play very loud and rapidly flashing video or other graphics<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.bsod`</a> - trigger Blue Screen of Death<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.forkbomb`</a> - execute fork bomb<br />
<a href="https://github.com/mategol/pysilon-malware#ss"> `.cmd <command>`</a> - execute shell command on victim's PC and send back the output<br />
<a href="https://github.com/mategol/pysilon-malware#implode"> `.implode`</a> - remove PySilon from target PC and clean the "evidence"<br />
<a href="https://github.com/mategol/pysilon-malware#clear"> `.clear`</a> - clear messages from file-related channel<br />
--------------------
XMR: 4BGaWuNg1io79eHeM67HdEdWgucd6QGfnZACfoRh4eWQYXbGeJGAyxZ4gb15SssDQff4WShpcB3KaAXkyJZr3eQR719bfpp
BTC: bc1qw6vp2pj74gthgftyh88rly03pjyuemcavsg9fp
ETH: 0x8DBF8b713542b6AA96981Ce6Ab8a19eDf502356c
LTC: LZP9Wbuwb4XgeJ8cQPpaWAkpAfWeXq363V
--------------------
### ToDo
List of features that should appear in following releases:
- [ ] webhook connection in case of unexpected circumstances (like BOT-Token banned by Discord)
- [ ] overall system info grabber with cool Discord Embeds
- [ ] traditional reverse shell creator
- [ ] grab credit cards information
- [ ] optional crypto mining (for example, when victim is idle)
- [ ] grab sessions from popular applications (Steam/Minecraft/Metamask/Exodus/Roblox)
", Assign "at most 3 tags" to the expected json: {"id":"10662","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"