A ready-to-deploy Python package designed to stealthily integrate files within a machine, ensuring discreet and seamless file operations without detection. This project is nothing more than a lightweight & faster Python package that aims to highlight and improve security by demonstrating potential vulnerabilities in the system when connected with pip
.
- Install the package using
pip
. - Either create a
.py
file or run Python in the terminal and execute the program. - You can execute the existing three features, but feel free to add or update features of your own and deploy your own package globally. 🌍
Note: I already have a package of my own deployed globally in PyPI.
- Install the package 📦:
pip install matplotlib_visual
- Create a file or open Python in the terminal and enter the following code:
from matplotlib_visual.display import featureName
featureName("fileName", 1234) # password integer
display
- A method that contains featuresfeatureName
- Check outdisplay.py
in the repo and use the required method name (feature).
Contributors & Users are advised to use this gist until the official documentation is ready. 📝
These features allow you to discreetly integrate source code into a private machine using the following methods:
- Displaying source code in the console output. 🖥️
from package.display import models
display("<filename-without-extension>")
models
method displays source code in the console.
- Stealth Copy to Clipboard for a more secure method. 📋
from package.display import graph
display("<filename-without-extension>")
graph
method copies the source code to the system's clipboard.
- Writing the source code into the program's root directory. 📝
from package.display import piechart
display("<filename-without-extension>")
piechart
method writes the file in the root directory of execution.
- Web Scraping from a cl1p.net clipboard. 🌐
from package.display import grab
grab('url-name')
grab
method retrieves the clipboard's text content from the specified URL and displays it in the system console. If no content is found, a message indicating "nothing found" is returned.
We welcome all contributions! Whether you're improving features, fixing bugs, or enhancing documentation, your help is valuable to us. Here's how to get started:
- It’s beginner-friendly with most features implemented in minimal lines of code.
- Research thoroughly to understand how to implement stealthy features. 🕵️♀️
- Visit the Issues section in this repository.
- Look for existing issues that are available to work on or past their time limit! ⏳
- Or raise your own issue with a proposal or idea and start contributing! 🗣️
- Keep the code clean, simple, and efficient. 🧹
- If you find this project useful or interesting, please star the repository on GitHub! ⭐ It helps the project grow!
- This package integrates source files into a target machine using the
stash/
directory. 📁 - A test file is provided—run it to ensure that the files inside the stash appear on the target machine. 💡
- Filenames like
graph.py
,models.py
, andpiechart.py
are aliases to avoid detection. 🔒
- The codebase is simple and easy to contribute to, but implementing stealthy features requires proper research. 🔍
- This package exploits security permissions in
pip
, so maintaining pip standards is advised. ✅ - Every feature in this package supports major operating systems:
- Windows 🪟
- Linux 🐧
- MacOS 🍏
If you find any vulnerabilities, please raise an issue!
The purpose of this package is educational, aiming to highlight and improve security by demonstrating potential vulnerabilities in systems. 🛡️
This package is licensed under the GPL 3.0, allowing you to sneakily use and modify it as needed.
Happy sneaking! 🤫