Skip to main content

Diggersby

·218 words·2 mins
Tools

Diggersby, designed to infiltrate and monitor Discord bots that may be employed as command-and-control (C2) channels by malicious actors. By leveraging the Discord Bot API, Diggersby enables users to capture messages from potentially harmful bots, facilitating efficient tracking and analysis.


🔍 Key Features
#

  • Multi-Platform Support: Diggersby is available in three formats:

    • Command-Line Interface (CLI)
    • Graphical User Interface (GUI): Supports both Windows and macOS.
    • Web Interface: https://diggersby.n3rr.xyz/
  • Monitoring Capabilities: The tool allows users to:

    • Input a Discord bot token.
    • Specify a server (guild) ID.
    • Specify a channel ID.
    • List out all available channels (excluding voice channel)
    • Capture and export messages sent by the bot.
  • Data Export: Users can export bot information and captured messages for further analysis.


⚙️ Installation & Usage
#

For Windows:

  1. Clone the repository.
  2. Run Diggersby\dist\windows\Diggersby.exe

For macOS:

  1. Clone the repository.
  2. Run Diggersby\dist\mac\Diggersby

For CLI (Cross-Platform):

  1. Clone the repository.
  2. Run python Diggersby\diggersby_cli.py

Usage Steps:

  1. Start the application.
  2. Input the bot’s token (e.g., abcdefgh12345!@#$%).
  3. Enter the server/guild ID if available (e.g., 123456789).
  4. Enter the channel ID if available (e.g., 123456789).
  5. Use the “Export Bot Info” or “Export Message” button to download the results.

🛠️ Obtaining Bot Tokens
#

  • Hunting: Utilize platforms like Fofa to search for exposed tokens.
  • Malware Samples: Analyze samples from repositories such as Malware Bazaar to extract tokens.

🔗 Link to repo: https://github.com/n3rr/Diggersby