This OS is tailored for advanced security assessments, including penetration testing, malware analysis, and network intrusion simulations. It is often used in controlled environments for legal security research, digital forensics, and cyber defense training.
Key Features & Capabilities
1. Data Theft (Stealer Module)
Browser Data Harvesting
Extracts saved passwords (Chrome, Firefox, Edge).
Steals autofill data & credit card details.
Collects cookies (for session hijacking).
Cryptocurrency Wallet Theft
Targets MetaMask, Exodus, Electrum, etc.
Scans for wallet.dat files (Bitcoin, Ethereum).
System Information Logging
Captures IP address, OS version, hardware details.
Logs keystrokes (keylogger) for credential theft.
FTP & Email Credentials
Harvests saved credentials from FileZilla, Outlook, Thunderbird.