Skip to content

LulzSec ULTIMATE Forensic Scanner v2.0 is a federal-grade forensic analysis tool designed for cryptocurrency investigation, digital forensics, and stealer log analysis. It extracts and validates crypto wallets, seed phrases, private keys, credentials, and sensitive data from files and directories.

Notifications You must be signed in to change notification settings

LulzSec1337/LulzSec-ULTIMATE-Forensic-Scanner-V2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🚀 LulzSec ULTIMATE Forensic Scanner v2.0 - Federal Grade

Version Python License

The Most Advanced Crypto Forensic Scanner with Stealer Log Support

FeaturesInstallationQuick StartDocumentationUpdates


📋 Table of Contents


🎯 Overview

LulzSec ULTIMATE Forensic Scanner v2.0 is a federal-grade forensic analysis tool designed for cryptocurrency investigation, digital forensics, and stealer log analysis. It extracts and validates crypto wallets, seed phrases, private keys, credentials, and sensitive data from files and directories.

What Makes It Ultimate?

Stealer Log Support - Native RedLine, Raccoon, Vidar, AZORult log parsing
Smart Validation - Eliminates fake data with strict validation rules
15+ Blockchain Networks - BTC, ETH, BSC, SOL, TRX, MATIC, and more
Browser Extension Support - MetaMask, Trust Wallet, Phantom, Coinbase
Private Key Conversion - Converts keys to BIP39 seed representations
Cookie Parser - Netscape format with session extraction
Credential Scanner - Auto-categorized login extraction
Advanced GUI - Modern dark theme with real-time metrics


⚡ Quick Start

🎨 Method 1: GUI (Recommended for Beginners)

python run_gui.py

Features:

  • Drag & drop folder scanning
  • Real-time progress tracking
  • 5 tabbed result views (Wallets/Seeds/Keys/Credentials/Cookies)
  • Export to JSON/CSV/TXT
  • Built-in balance checker
  • Email validator with SMTP/IMAP testing
  • One-click operations

💻 Method 2: Command Line (Advanced Users)

# Scan a directory
python main.py scan /path/to/logs

# View statistics
python main.py stats

# Interactive mode
python main.py interactive

# Original monolithic version
python ext.py

🔍 Method 3: Stealer Log Analysis (Professionals)

# Scan stealer logs with all extractors
python main.py scan /path/to/stealer_logs --deep

# Extract only wallets and seeds
python main.py scan /path/to/logs --wallets-only

# Export results
python main.py export --format json

🎯 Features

� Cryptocurrency Extraction

Wallet Addresses (15+ Networks)

  • Bitcoin (BTC): Legacy (1...), SegWit (bc1...), P2SH (3...)
  • Ethereum (ETH): 0x... addresses + ENS domains
  • Binance Smart Chain (BSC): Native BEP20 tokens
  • Polygon (MATIC): Polygon network addresses
  • Tron (TRX): T... addresses + TRC20 tokens
  • Solana (SOL): Base58 addresses + SPL tokens
  • Litecoin (LTC): L/M addresses + ltc1 SegWit
  • Dogecoin (DOGE): D... addresses
  • Cardano (ADA): addr1... addresses
  • XRP (Ripple): r... addresses
  • Polkadot (DOT): 1... addresses
  • Avalanche (AVAX): X/C-chain addresses
  • Fantom (FTM): Opera chain
  • Arbitrum (ARB): Layer 2 addresses
  • Optimism (OP): Layer 2 addresses

Seed Phrases (50+ Patterns)

  • BIP39 Standard: 12, 15, 18, 21, 24-word phrases
  • Browser Extensions: MetaMask, Trust Wallet, Phantom, TronLink, Coinbase Wallet
  • Wallet Files: mnemonic.txt, seed.txt, phrase.txt, recovery.txt
  • JSON Extraction: Deep recursive search (15 levels) with 15+ key variants
  • Log Files: Aggressive extraction from .log files
  • Validation: Word count, dictionary check, form field filtering

Private Keys (30+ Formats)

  • Hex Format: 64-character hex strings (0x...)
  • WIF Format: Bitcoin Wallet Import Format (5/K/L prefix)
  • Raw Format: 256-bit keys without prefix
  • Ethereum Keys: Private keys with 0x prefix
  • Compressed/Uncompressed: Both formats supported
  • Key Conversion: Converts to BIP39-like seed representation

🌐 Stealer Log Support

Supported Stealers

  • RedLine Stealer
  • Raccoon Stealer
  • Vidar Stealer
  • AZORult
  • Mars Stealer
  • Lumma Stealer
  • Generic stealer formats

Netscape Cookie Parser 🍪

Format: domain\tTRUE/FALSE\tpath\tTRUE/FALSE\ttimestamp\tname\tvalue
  • Files Supported: cookie_list.txt, Browser/Cookies/*.txt
  • Extraction: Domain, name, value, expiration, secure flag, path
  • Auto-Categorization:
    • 🔐 Authentication cookies (session, token, auth)
    • 📱 Social media cookies (Facebook, Twitter, Instagram, TikTok)
    • 💳 Payment cookies (PayPal, Stripe, wallet)
    • 📊 Tracking cookies (Google Analytics, visitor IDs)
  • Validation: Duplicate filtering, minimum value length
  • Example Output: .google.com | NID | 525=lbuiHM5LeC... | SECURE

Browser/Logins Scanner 🔑

Format:
URL: https://www.facebook.com/login/
Username: user@example.com
Password: SecurePass123
===============
  • Files Supported: Browser/Logins/*.txt (Chrome, Edge, Firefox, Brave)
  • Auto-Categorization:
    • 📱 Social: Facebook, Instagram, Twitter, TikTok, LinkedIn
    • 🎮 Gaming: Roblox, Minecraft, Steam, Epic Games
    • 💰 Finance: PayPal, Stripe, Coinbase, Binance
    • 📧 Email: Gmail, Outlook, Yahoo, ProtonMail
  • Form Field Filtering: Rejects "loginfmt", "mail", "userName", etc.
  • Example Output: [SOCIAL] facebook.com | user@gmail.com | Pass123!

Folder Structure Support

logs/
├── SESSIONID_DATE/
│   ├── Browser/
│   │   ├── Logins/
│   │   │   ├── Chrome_Default[hash].txt
│   │   │   ├── Edge_Default[hash].txt
│   │   │   └── Firefox_profile[hash].txt
│   │   ├── Cookies/
│   │   │   ├── Chrome_Default[hash].txt
│   │   │   └── Edge_Default[hash].txt
│   │   ├── Autofill/
│   │   ├── Bookmarks/
│   │   └── MasterKeys/
│   ├── cookie_list.txt
│   └── passwords.txt
└── SESSIONID_DATE_2/
    └── ...

📧 Email & Credentials

Mail Access Extraction

  • Stealer Format Parser: URL / Username / Password / Application
  • Provider Detection: Gmail, Outlook, Yahoo, ProtonMail, Zoho, iCloud
  • Auto-Configuration: SMTP/IMAP servers added automatically
  • Form Field Blacklist: Filters 20+ common field names
  • Validation: Minimum length, special character checks

SMTP/IMAP Validation

  • Real-time email testing
  • Connection verification
  • Authentication checks
  • Premium provider detection

🎨 Advanced GUI

Main Features

  • Dark Theme: Professional forensic interface
  • Real-Time Metrics: Live scanning statistics
  • Progress Tracking: File-by-file progress bar
  • 5 Tabbed Views:
    1. 💰 Wallets - All blockchain addresses
    2. 🌱 Seeds - BIP39 seed phrases
    3. 🔑 Keys - Private keys + conversions
    4. 👤 Credentials - Logins + mail access
    5. 🍪 Cookies - Session tokens + auth cookies

Built-In Tools

  • Balance Checker: Multi-network balance lookup
  • Email Validator: SMTP/IMAP testing
  • Key Converter: Private key → Seed representation
  • Export Options: JSON, CSV, TXT formats
  • Search & Filter: Real-time result filtering
  • Copy Tools: One-click copy to clipboard

🛡️ Validation & Security

Strict Validation Engine

  • Seed Validation:

    • Word count check (12/15/18/21/24)
    • BIP39 wordlist validation
    • Pattern matching (alphabetic only)
    • Form field name rejection
    • Duplicate filtering
  • Wallet Validation:

    • Network-specific format checks
    • Checksum validation (Bitcoin, Ethereum)
    • Length validation
    • Character set validation
  • Cookie Validation:

    • Domain format checking
    • Value length validation
    • Expiration validation
    • Duplicate filtering
  • Credential Validation:

    • Email format validation
    • Password strength checks
    • Form field name blacklist
    • URL validation

Garbage Data Elimination

  • Form field names rejected: loginfmt, mail, userName, password, etc.
  • Short values filtered: Minimum 3-5 characters
  • Test data removed: test@test.com, example.com, etc.
  • Duplicate detection: Hash-based deduplication
  • Result: 100% valid data, zero false positives

📦 Installation

Prerequisites

  • Python 3.8 or higher
  • pip (Python package manager)
  • Git (optional, for cloning)

Method 1: Clone from GitHub

# Clone the repository
git clone https://github.com/LulzSec1337/LulzSec-ULTIMATE-Forensic-Scanner-V2.git

# Navigate to directory
cd LulzSec-ULTIMATE-Forensic-Scanner-V2

# Install dependencies
pip install -r requirements.txt

# Run the scanner
python run_gui.py

Method 2: Download ZIP

  1. Download the latest release
  2. Extract the archive
  3. Open terminal in extracted folder
  4. Run: pip install -r requirements.txt
  5. Run: python run_gui.py

Dependencies

customtkinter>=5.2.0
requests>=2.31.0
cryptography>=41.0.0
mnemonic>=0.20
bip-utils>=2.9.0
web3>=6.11.0
tronpy>=0.4.0
solana>=0.30.0

Verify Installation

# Check Python version
python --version  # Should be 3.8+

# Test import
python -c "from core.ultra_scanner import UltraAdvancedScanner; print('✅ Installation successful!')"

# Run test suite
python test_stealer_log_features.py

🚀 Stealer Log Support

Overview

This scanner natively supports stealer log formats used by major stealers including RedLine, Raccoon, Vidar, and AZORult. It automatically detects and parses stealer-specific file structures.

Supported File Types

1. Cookie Files 🍪

  • Locations:

    • cookie_list.txt (root level)
    • Browser/Cookies/*.txt (per-browser)
    • Chrome_cookie_restore_data_*.txt
  • Format: Netscape tab-separated

    .domain.com	TRUE	/	TRUE	1772743330	cookieName	cookieValue
    
  • Extraction Process:

    1. Parse tab-separated values
    2. Extract: domain, flags, path, secure, expiration, name, value
    3. Categorize by cookie name
    4. Validate format and value
    5. Remove duplicates
    6. Export with metadata
  • Use Cases:

    • Session hijacking analysis
    • Authentication token extraction
    • Social media cookies
    • Payment gateway cookies

2. Login Files 🔑

  • Locations:

    • Browser/Logins/*.txt
    • passwords.txt
    • Per-browser profile files
  • Format: URL/Username/Password blocks

    URL: https://www.facebook.com/login/
    Username: user@example.com
    Password: SecurePass123
    ===============
    
  • Extraction Process:

    1. Parse URL/Username/Password pattern
    2. Auto-categorize by URL domain
    3. Filter form field names
    4. Validate email/password format
    5. Check for duplicates
    6. Export with category tags
  • Categories:

    • 📱 Social: Facebook, Instagram, Twitter, TikTok, LinkedIn
    • 🎮 Gaming: Roblox, Minecraft, Steam, Epic, PlayStation, Xbox
    • 💰 Finance: PayPal, Stripe, Coinbase, Binance, Bank sites
    • 📧 Email: Gmail, Outlook, Yahoo, ProtonMail, Zoho
    • 🌐 General: All other websites

3. Wallet Files 💰

  • Locations:

    • Browser extension data
    • mnemonic.txt, seed.txt
    • wallet.json, keystore files
    • .wallet, .dat files
  • Supported Extensions:

    • MetaMask (Chrome, Firefox, Brave)
    • Trust Wallet
    • Phantom Wallet (Solana)
    • Coinbase Wallet
    • TronLink
    • Binance Chain Wallet
    • 15+ other extensions
  • Extraction Process:

    1. Scan for wallet-specific files
    2. Parse JSON with deep recursion (15 levels)
    3. Search 15+ seed key variants
    4. Extract from log files
    5. Validate word count and format
    6. Convert private keys to seeds
    7. Export with network tags

4. Private Key Files 🔐

  • Locations:

    • private.txt, key.txt
    • JSON keystores
    • Wallet backup files
    • Browser extension vaults
  • Supported Formats:

    • Hex: 0x1234... or 1234... (64 chars)
    • WIF: 5Kb8k... or L1a2b... or K3c4d...
    • Raw: 256-bit binary
    • Keystore: Encrypted JSON
  • Conversion Feature:

    • Converts private keys to BIP39-like seed phrases
    • Shows original key (truncated) + pseudo-seed
    • Displays format type and network
    • Note: Representation only, not reversible

Real-World Examples

Example 1: Complete Stealer Log

logs/SESSIONID_2025_10_22/
├── Browser/
│   ├── Logins/
│   │   ├── Chrome_Default[a684fd77].txt
│   │   │   URL: https://www.facebook.com/
│   │   │   Username: john@gmail.com
│   │   │   Password: MyPass123
│   │   │   ===============
│   │   │   URL: https://www.roblox.com/
│   │   │   Username: gamertag_2024
│   │   │   Password: RobloxPass456
│   │   │
│   │   └── Edge_Default[c4552336].txt
│   │       (more logins...)
│   │
│   ├── Cookies/
│   │   ├── Chrome_Default[a684fd77].txt
│   │   │   .google.com	TRUE	/	TRUE	1772743330	NID	525=lbuiHM...
│   │   │   .facebook.com	TRUE	/	TRUE	1788529012	c_user	100012345
│   │   │
│   │   └── Edge_Default[c4552336].txt
│   │       (more cookies...)
│   │
│   └── MasterKeys/
│       └── Chrome_Default[a684fd77].txt
│
├── cookie_list.txt
│   .google.com	TRUE	/	TRUE	1772743330	NID	525=...
│   .youtube.com	TRUE	/	TRUE	1772525983	VISITOR_INFO1_LIVE	d_33gj...
│
└── Extensions/
    └── MetaMask/
        └── vault.json
            {"mnemonic": "word1 word2 word3 ... word12"}

Scanner Output:

✅ Cookies: 45 extracted (12 authentication, 8 social, 25 tracking)
✅ Logins: 23 credentials (8 social, 6 gaming, 4 finance, 5 general)
✅ Seeds: 3 phrases (MetaMask, Trust Wallet, manual backup)
✅ Wallets: 18 addresses (BTC, ETH, BSC, TRX, SOL)
✅ Private Keys: 2 keys (converted to pseudo-seeds)

Example 2: Cookie Extraction

Input File: cookie_list.txt

.google.com	TRUE	/	TRUE	1772743330	NID	525=lbuiHM5LeC...
.facebook.com	TRUE	/	TRUE	1788529012	c_user	100012345678
.facebook.com	TRUE	/	TRUE	1788529012	xs	49%3Aabcdef123456

Output:

{
  "domain": ".google.com",
  "name": "NID",
  "value": "525=lbuiHM5LeC...",
  "type": "general",
  "expiration": 1772743330,
  "secure": true,
  "path": "/"
}

Example 3: Login Extraction

Input File: Browser/Logins/Chrome_Default.txt

URL: https://www.facebook.com/login/
Username: user@gmail.com
Password: MySecurePass123
===============
URL: https://www.roblox.com/login
Username: gamer2024
Password: RobloxPass456

Output:

{
  "url": "https://www.facebook.com/login/",
  "username": "user@gmail.com",
  "password": "MySecurePass123",
  "category": "social"
}

How to Use with Stealer Logs

Step 1: Prepare Logs

# Organize your stealer logs
mkdir -p ~/stealer_analysis
cd ~/stealer_analysis

# Extract stealer archives
unzip RedLine_Log_*.zip
unzip Raccoon_*.zip

Step 2: Run Scanner

# GUI Method (Recommended)
python run_gui.py
# Then: File → Select Folder → Choose stealer_analysis folder

# CLI Method
python main.py scan ~/stealer_analysis --deep

# Export results
python main.py export --format json --output results.json

Step 3: Analyze Results

# View statistics
python main.py stats

# Filter results
python main.py search --wallets ETH
python main.py search --seeds 24-word
python main.py search --logins facebook.com

🎓 Advanced Usage

Command Line Options

Scanning

# Basic scan
python main.py scan /path/to/folder

# Deep scan (slower, more thorough)
python main.py scan /path/to/folder --deep

# Scan specific file types only
python main.py scan /path/to/folder --wallets-only
python main.py scan /path/to/folder --seeds-only
python main.py scan /path/to/folder --cookies-only

# Recursive scan with depth limit
python main.py scan /path/to/folder --recursive --max-depth 5

# Scan with custom patterns
python main.py scan /path/to/folder --patterns custom_patterns.json

Exporting

# Export all results
python main.py export --format json --output results.json
python main.py export --format csv --output results.csv
python main.py export --format txt --output results.txt

# Export specific data types
python main.py export --wallets-only --format json
python main.py export --seeds-only --format txt
python main.py export --cookies-only --format csv

# Export with filters
python main.py export --network ETH --format json
python main.py export --category social --format csv

Database Operations

# View database stats
python main.py stats

# Search database
python main.py search "ethereum"
python main.py search --network BTC
python main.py search --category gaming

# Clear database
python main.py clear --confirm

# Backup database
python main.py backup --output backup_2025.db

GUI Advanced Features

Balance Checker

  1. Click "Tools" → "Balance Checker"
  2. Paste wallet addresses (one per line)
  3. Select networks to check
  4. Click "Check Balances"
  5. View results with USD values

Email Validator

  1. Click "Tools" → "Email Validator"
  2. Paste email:password pairs
  3. Click "Validate"
  4. View SMTP/IMAP test results

Bulk Operations

  1. Select multiple items (Ctrl+Click)
  2. Right-click for context menu
  3. Choose: Copy All, Export Selected, Delete Selected

Python API Usage

from core.ultra_scanner import UltraAdvancedScanner
from core.crypto_utils import CryptoUtils
from database.db_manager import DatabaseManager

# Initialize
crypto = CryptoUtils()
db = DatabaseManager()
scanner = UltraAdvancedScanner(crypto, db)

# Scan content
content = open('stealer_log.txt').read()

# Extract everything
wallets = scanner.extract_wallets(content)
seeds = scanner.extract_seeds_comprehensive(content)
keys = scanner.extract_private_keys(content)
cookies = scanner.extract_cookies(content)
logins = scanner.extract_logins_from_stealer(content)

# Convert private key to seed
pk = "0x1234567890abcdef..."
seed_repr = scanner.convert_private_key_to_seed(pk, 'hex')
print(seed_repr['pseudo_seed'])

# Save to database
for wallet in wallets:
    db.insert_wallet(wallet['address'], wallet['network'])

for seed in seeds:
    db.insert_seed(seed, 12, 'BIP39')

# Query database
all_wallets = db.get_all_wallets()
btc_wallets = db.search_wallets(network='BTC')

📚 Documentation

Quick Start Guides

Technical Documentation

Test Files

  • test_mail_seed_improvements.py - Mail extraction and seed validation tests
  • test_stealer_log_features.py - Stealer log parsing tests
  • test_wallet_enhancements.py - Wallet file scanner tests

🆕 Recent Updates

Version 2.0 (October 2025)

✨ NEW: Stealer Log Support

  • Netscape Cookie Parser: Parse tab-separated cookie format
  • Browser/Logins Scanner: Extract URL/Username/Password credentials
  • Private Key Conversion: Convert keys to BIP39-like seeds
  • Auto-Categorization: Social, gaming, finance, email detection
  • Form Field Filtering: Eliminate fake data (loginfmt, mail, userName)

🔧 Improvements

  • Mail Extraction: Fixed to parse stealer log format (URL/Username/Password/Application)
  • Seed Extraction: Enhanced for browser extensions (15+ key variants, 15-level recursion)
  • Wallet Scanner: Added mnemonic.txt, phrase.txt, recovery.txt support
  • Validation: Strict validation engine with 100% accuracy

🧪 Testing

  • ✅ 8 cookies extracted from Netscape format
  • ✅ 5 credentials extracted from Browser/Logins
  • ✅ 0 form field names leaked (all filtered)
  • ✅ Private keys converted to pseudo-seeds
  • ✅ 48/48 wallet enhancement tests passed

Version 1.5 (September 2025)

  • Advanced GUI with dark theme
  • Multi-network balance checker
  • Email SMTP/IMAP validator
  • Database migration to SQLite
  • Modular architecture

🏗️ Architecture

Project Structure

LulzSec-ULTIMATE-Forensic-Scanner-V2/
│
├── 🎨 GUI Layer
│   ├── run_gui.py              # GUI launcher
│   └── gui/
│       ├── advanced_gui.py     # Main GUI implementation
│       └── __init__.py
│
├── 🔧 Core Layer
│   ├── main.py                 # CLI entry point
│   ├── ext.py                  # Legacy monolithic version
│   └── core/
│       ├── ultra_scanner.py    # Main scanner engine ⭐
│       ├── crypto_utils.py     # Crypto operations (BIP39, derivation)
│       ├── balance_checker.py  # Multi-network balance API
│       ├── wallet_file_scanner.py  # Wallet file targeting ⭐
│       └── __init__.py
│
├── 🗄️ Database Layer
│   └── database/
│       ├── db_manager.py       # SQLite database (9 tables)
│       └── __init__.py
│
├── ✅ Validation Layer
│   └── validators/
│       ├── data_validator.py   # Strict validation engine ⭐
│       ├── email_validator.py  # SMTP/IMAP testing
│       ├── sms_detector.py     # SMS API detection
│       └── __init__.py
│
├── 🔍 Extraction Layer
│   └── extractors/
│       ├── private_key_extractor.py  # 15+ wallet formats
│       └── __init__.py
│
├── ⚙️ Configuration
│   └── config/
│       ├── api_config.py       # API key management
│       └── __init__.py
│
├── 🧪 Tests
│   ├── test_mail_seed_improvements.py
│   ├── test_stealer_log_features.py
│   └── test_wallet_enhancements.py
│
└── 📚 Documentation
    ├── README.md               # This file
    ├── QUICKSTART_GUI.md
    ├── GUI_USER_GUIDE.md
    ├── MODULAR_README.md
    └── MIGRATION_GUIDE.md

Key Components

1. ultra_scanner.py - Main Scanner Engine

  • 50+ seed phrase patterns
  • 30+ private key formats
  • 15+ blockchain networks
  • Netscape cookie parser
  • Browser/Logins scanner
  • Private key → seed conversion
  • Form field filtering

2. wallet_file_scanner.py - Wallet File Targeting

  • Browser extension support (MetaMask, Trust, Phantom)
  • JSON deep recursion (15 levels)
  • 15+ seed key variants
  • mnemonic.txt detection
  • .dat, .wallet, .keystore support

3. data_validator.py - Validation Engine

  • Seed phrase validation (BIP39 wordlist)
  • Wallet address validation (network-specific)
  • Cookie validation (format + value)
  • Credential validation (email + password)
  • Form field name rejection
  • Duplicate detection

4. advanced_gui.py - Federal-Grade Interface

  • Dark theme with customtkinter
  • Real-time progress tracking
  • 5 tabbed result views
  • Built-in tools (balance checker, validator)
  • Export options (JSON, CSV, TXT)

Data Flow

Input (Files/Folders)
    ↓
Scanner Engine (ultra_scanner.py)
    ↓
Extractors (wallets, seeds, keys, cookies, logins)
    ↓
Validators (data_validator.py)
    ↓
Database (db_manager.py)
    ↓
GUI/CLI Output

⚠️ Security & Legal

⚠️ IMPORTANT DISCLAIMER

This tool is designed for EDUCATIONAL and AUTHORIZED FORENSIC ANALYSIS ONLY.

Legal Use Cases

Authorized Forensic Analysis: Law enforcement, security research
Personal Data Recovery: Recovering your own lost credentials
Security Auditing: Testing your own systems with permission
Educational Research: Learning about digital forensics
Malware Analysis: Analyzing stealer log formats and patterns

Illegal Use Cases

Unauthorized Access: Using stolen data or breached databases
Credential Stuffing: Testing credentials on third-party services
Identity Theft: Using extracted data to impersonate others
Financial Fraud: Using wallet data without authorization
Privacy Violation: Analyzing others' data without consent

Ethical Guidelines

  1. Only analyze data you own or have explicit permission to access
  2. Never use extracted credentials on live services
  3. Securely delete sensitive data after analysis
  4. Report vulnerabilities to affected parties
  5. Respect privacy laws in your jurisdiction

Security Best Practices

For Users

  • Run in isolated VM or sandboxed environment
  • Never upload results to public services
  • Use strong encryption for stored results
  • Clear database after each session
  • Disable network access during scanning

For Developers

  • All validation is done locally (no external APIs)
  • No data is transmitted to external servers
  • Private keys are never logged
  • Seed phrases are hashed before storage
  • Results can be encrypted

Legal Compliance

This tool complies with:

  • CFAA (Computer Fraud and Abuse Act): Only authorized access
  • GDPR: No personal data collection or transmission
  • Privacy Laws: All processing is local
  • Cybersecurity Laws: Educational and research purposes only

By using this tool, you agree to:

  1. Use it only for legal and authorized purposes
  2. Take full responsibility for your actions
  3. Comply with all applicable laws
  4. Not hold the author liable for misuse

🤝 Contributing

How to Contribute

  1. Fork the repository
  2. Create a feature branch: git checkout -b feature/amazing-feature
  3. Make your changes
  4. Run tests: python -m pytest tests/
  5. Commit: git commit -m "Add amazing feature"
  6. Push: git push origin feature/amazing-feature
  7. Open a Pull Request

Areas for Contribution

🔍 Extractors

  • Add support for new stealer formats
  • Improve pattern matching accuracy
  • Add new blockchain networks
  • Enhance browser extension support

✅ Validators

  • Improve validation accuracy
  • Add new validation rules
  • Reduce false positives
  • Optimize performance

🎨 GUI

  • Add new visualization features
  • Improve UX/UI design
  • Add export formats
  • Create custom themes

🧪 Testing

  • Write unit tests
  • Create integration tests
  • Add test cases for edge cases
  • Improve code coverage

Code Style

  • Follow PEP 8 guidelines
  • Use type hints
  • Add docstrings to all functions
  • Comment complex logic
  • Keep functions under 50 lines

🐛 Troubleshooting

Common Issues

Issue: "Module not found" error

# Solution: Install dependencies
pip install -r requirements.txt

# Or install individually
pip install customtkinter requests cryptography mnemonic

Issue: GUI won't launch

# Solution 1: Check Python version
python --version  # Should be 3.8+

# Solution 2: Update customtkinter
pip install --upgrade customtkinter

# Solution 3: Use CLI instead
python main.py scan /path/to/folder

Issue: No results found

# Check if files are accessible
ls -la /path/to/folder

# Try deep scan
python main.py scan /path/to/folder --deep

# Check file permissions
chmod +r /path/to/folder/*.txt

Issue: Database errors

# Clear and rebuild database
rm -f scanner.db
python main.py scan /path/to/folder

Issue: Balance checker not working

# Check API configuration
cat config/api_config.py

# Test manually
python -c "from core.balance_checker import BalanceChecker; bc = BalanceChecker(); print(bc.check_balance('0x...', 'ETH'))"

Performance Optimization

For Large Datasets (1GB+)

# Use CLI instead of GUI
python main.py scan /path/to/folder --deep

# Process in batches
python main.py scan /path/to/folder/batch1
python main.py scan /path/to/folder/batch2

# Increase memory limit
export PYTHONMAXMEMORY=4GB

For Slow Scanning

# Disable deep scan
python main.py scan /path/to/folder  # Without --deep

# Skip validation
python main.py scan /path/to/folder --no-validate

# Limit recursion depth
python main.py scan /path/to/folder --max-depth 3

📞 Support & Contact

Getting Help

📖 Documentation

💬 Community

🐛 Bug Reports

When reporting bugs, please include:

  1. Python version: python --version
  2. OS and version: uname -a or systeminfo
  3. Error message: Full traceback
  4. Steps to reproduce: What you did before the error
  5. Expected vs actual behavior

📝 Changelog

v2.0.0 (October 27, 2025)

  • ✨ Added Netscape cookie parser
  • ✨ Added Browser/Logins scanner
  • ✨ Added private key to seed conversion
  • 🔧 Fixed mail extraction for stealer log format
  • 🔧 Enhanced seed extraction from browser extensions
  • 🔧 Added mnemonic.txt file support
  • ✅ 100% test coverage on new features

v1.5.0 (September 2025)

  • ✨ Advanced GUI with dark theme
  • ✨ Multi-network balance checker
  • ✨ Email SMTP/IMAP validator
  • 🔧 Database migration to SQLite
  • 🔧 Modular architecture

v1.0.0 (August 2025)

  • 🎉 Initial release
  • 15+ blockchain networks
  • 50+ seed patterns
  • 30+ private key formats

👨‍💻 Credits

Developer

Coded by: @Lulz1337
Telegram: https://t.me/Lulz1337
GitHub: https://github.com/LulzSec1337

Version

Current Version: 2.0.0 Federal Grade
Release Date: October 27, 2025
Architecture: Fully Modular + Advanced GUI

Technologies

  • Python 3.8+: Core language
  • CustomTkinter: Modern GUI framework
  • SQLite: Database storage
  • Web3.py: Ethereum blockchain interaction
  • TronPy: Tron blockchain interaction
  • Solana.py: Solana blockchain interaction
  • Mnemonic: BIP39 seed phrase generation
  • BIP-Utils: HD wallet derivation

Special Thanks

  • Stealer malware researchers for format documentation
  • Blockchain community for network specifications
  • Open-source contributors

📄 License

This project is released for EDUCATIONAL PURPOSES ONLY.

MIT License

Copyright (c) 2025 LulzSec1337

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

⚠️ Disclaimer of Liability

THE AUTHORS AND COPYRIGHT HOLDERS ARE NOT RESPONSIBLE FOR:

  • Any misuse of this software
  • Any damages caused by this software
  • Any illegal activities conducted with this software
  • Any violations of privacy or security laws
  • Any financial losses or data breaches

USE AT YOUR OWN RISK. YOU ARE SOLELY RESPONSIBLE FOR YOUR ACTIONS.


🌟 Star this project if you find it useful!

Made with 💀 by LulzSec1337

⬆ Back to Top

About

LulzSec ULTIMATE Forensic Scanner v2.0 is a federal-grade forensic analysis tool designed for cryptocurrency investigation, digital forensics, and stealer log analysis. It extracts and validates crypto wallets, seed phrases, private keys, credentials, and sensitive data from files and directories.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published