Diggersby, designed to infiltrate and monitor Discord bots that may be employed as command-and-control (C2) channels by malicious actors. By leveraging the Discord Bot API, Diggersby enables users to capture messages from potentially harmful bots, facilitating efficient tracking and analysis.
🔍 Key Features #
-
Multi-Platform Support: Diggersby is available in three formats:
- Command-Line Interface (CLI)
- Graphical User Interface (GUI): Supports both Windows and macOS.
- Web Interface: https://diggersby.n3rr.xyz/
-
Monitoring Capabilities: The tool allows users to:
- Input a Discord bot token.
- Specify a server (guild) ID.
- Specify a channel ID.
- List out all available channels (excluding voice channel)
- Capture and export messages sent by the bot.
-
Data Export: Users can export bot information and captured messages for further analysis.
⚙️ Installation & Usage #
For Windows:
- Clone the repository.
- Run
Diggersby\dist\windows\Diggersby.exe
For macOS:
- Clone the repository.
- Run
Diggersby\dist\mac\Diggersby
For CLI (Cross-Platform):
- Clone the repository.
- Run python
Diggersby\diggersby_cli.py
Usage Steps:
- Start the application.
- Input the bot’s token (e.g., abcdefgh12345!@#$%).
- Enter the server/guild ID if available (e.g., 123456789).
- Enter the channel ID if available (e.g., 123456789).
- Use the “Export Bot Info” or “Export Message” button to download the results.
🛠️ Obtaining Bot Tokens #
- Hunting: Utilize platforms like Fofa to search for exposed tokens.
- Malware Samples: Analyze samples from repositories such as Malware Bazaar to extract tokens.
🔗 Link to repo: https://github.com/n3rr/Diggersby