Welcome to the ending of 'StormFN' These people claim to have the safest fortnite dev in the making, in reality this shit is a miner,
EXE Login Grabber and much more. Later in the code you will see that this shit is PACKED with malware's. The owner is also a pedophile
which I wish I still had my paws on the screenshots. Don't worry I will find them and add them to this dox though, anyways let's get into
exposing this code

/StormFN Launcher;component/app.xaml
AC_bypass
system*
Set-Service 'BEService' -StartupType Disabled
Set-Service 'EasyAntiCheat' -StartupType Disabled
An Error occured
Status
Fortnite Path
Launch
Storm Launcher
FortniteGame\Binaries\Win64\FortniteClient-Win64-Shipping.exe
FortniteGame\Binaries\Win64\FortniteClient-Win64-Shipping_EAC.exe
FortniteGame\Binaries\Win64\FortniteLauncher.exe
" wasn't found, stop deleting game files!
DLL's not found
-AUTH_LOGIN=unused -AUTH_PASSWORD=
-AUTH_TYPE=exchangecode -epicapp=Fortnite -epicenv=Prod -epiclocale=en-us -epicportal -nobe -fromfl=eac -fltoken=f7b9gah4h5380d10f721dd6a -skippatchcheck
-epicapp=Fortnite -epicenv=Prod -epiclocale=en-us -epicportal -nobe -fromfl=eac -fltoken=f7b9gah4h5380d10f721dd6a -skippatchcheck
/Injector.exe
https://cdn.discordapp.com/attachments/698620628881899530/812703176381562880/Injector.exe
Please make sure that you are connected to the internet.
"{0}" "{1}"
https://discord.gg/stormfn
Epic\UnrealEngineLauncher\LauncherInstalled.dat
LocalAppData
\FortniteGame\Saved\PersistentDownloadDir
\FortniteGame\Saved\webcache
/StormFN Launcher;component/mainwindow.xaml
FortConsole.dll
Authorization
Basic NTIyOWRjZDNhYzM4NDUyMDhiNDk2NjQ5MDkyZjI1MWI6ZTNiZDJkM2UtYmY4Yy00ODU3LTllN2QtZjNkOTQ3ZDIyMGM3
Content-Type
application/x-www-form-urlencoded
grant_type
client_credentials
https://account-public-service-prod03.ol.epicgames.com/account/api/oauth/deviceAuthorization
private void Give_AntiCheat_Love()
{
    using (PowerShell powerShell = PowerShell.Create())
    {
        string str = "system*";
        powerShell.AddScript("Set-Service 'BEService' -StartupType Disabled" + str);
        powerShell.AddScript("Set-Service 'EasyAntiCheat' -StartupType Disabled" + str);
        Config_file.Default.AC_bypass = true;
        Config_file.Default.Save();
        foreach (PSObject psobject in powerShell.Invoke())
        {
            if (psobject != null)
            {
                this.msg("An Error occured \n" + psobject.Properties["Status"].Value.ToString() + " - ");
            }
        }
this.exchange = Auth.GetExchange(this.token);
string text = Path.Combine(Config_file.Default.Path, "FortniteGame\\Binaries\\Win64\\FortniteClient-Win64-Shipping.exe");
string text2 = Path.Combine(Config_file.Default.Path, "FortniteGame\\Binaries\\Win64\\FortniteClient-Win64-Shipping_EAC.exe");
string text3 = Path.Combine(Config_file.Default.Path, "FortniteGame\\Binaries\\Win64\\FortniteLauncher.exe");
if (!File.Exists(text))
{
    this.msg("\"" + text + "\" wasn't found, stop deleting game files!");
    this.ShowLi(false);
    return;
}
if (!File.Exists(MainWindow.plataniumdllpath) || !File.Exists(MainWindow.consoledllpath))
{
    this.msg("DLL's not found");
    this.ShowLi(false);
    return;
}
if (!File.Exists(text2))
{
    this.msg("\"" + text2 + "\" wasn't found, stop deleting game files!");
    this.ShowLi(false);
    return;
}
if (!File.Exists(text3))
{
    this.msg("\"" + text3 + "\" wasn't found, stop deleting game files!");
    this.ShowLi(false);
    return;
}
Config_file.Default.Path = this.FN_Path.Text;
Config_file.Default.Save();
this.exchange = Auth.GetExchange(this.token);
string arguments = "-AUTH_LOGIN=unused -AUTH_PASSWORD=" + this.exchange + " -AUTH_TYPE=exchangecode -epicapp=Fortnite -epicenv=Prod -epiclocale=en-us -epicportal -nobe -fromfl=eac -fltoken=f7b9gah4h5380d10f721dd6a -skippatchcheck";
Process process = new Process
{
    StartInfo = new ProcessStartInfo(text, arguments)
    {
        UseShellExecute = false,
        RedirectStandardOutput = false,
        CreateNoWindow = true
    }
};
Process process2 = new Process();
process2.StartInfo.FileName = text3;
process2.Start();
foreach (object obj in process2.Threads)
{
    ProcessThread processThread = (ProcessThread)obj;
    Win32.SuspendThread(Win32.OpenThread(2, false, processThread.Id));
}
Process process3 = new Process();
process3.StartInfo.FileName = text2;
process3.StartInfo.Arguments = "-epicapp=Fortnite -epicenv=Prod -epiclocale=en-us -epicportal -nobe -fromfl=eac -fltoken=f7b9gah4h5380d10f721dd6a -skippatchcheck";
process3.Start();
foreach (object obj2 in process3.Threads)
{
    ProcessThread processThread2 = (ProcessThread)obj2;
    Win32.SuspendThread(Win32.OpenThread(2, false, processThread2.Id));
}
process.Start();
public static string GetDevicecodetoken()
{
    RestClient restClient = new RestClient("https://account-public-service-prod03.ol.epicgames.com/account/api/oauth/token");
    RestRequest restRequest = new RestRequest(1);
    restRequest.AddHeader("Authorization", "Basic NTIyOWRjZDNhYzM4NDUyMDhiNDk2NjQ5MDkyZjI1MWI6ZTNiZDJkM2UtYmY4Yy00ODU3LTllN2QtZjNkOTQ3ZDIyMGM3");
    restRequest.AddHeader("Content-Type", "application/x-www-form-urlencoded");
    restRequest.AddParameter("grant_type", "client_credentials");
    RestRequest restRequest2 = restRequest;
    string[] array = restClient.Execute(restRequest2).Content.Split(new char[]
    {
        ':'
    }, 26);
    string result;
    try
    {
        result = array[1].ToString().Split(new char[]
        {
            ','
        }, 2)[0].ToString().Split(new char[]
        {
            '"'
        }, 2)[1].ToString().Split(new char[]
        {
            '"'
        }, 2)[0].ToString();
    }
    catch
    {
        MessageBox.Show("Please make sure that you are connected to the internet.");
        Process.GetCurrentProcess().Kill();
        result = "error";
    }
    return result;
}
ansi_stdout_color(FOREGROUND_RED|FOREGROUND_GREEN|FOREGROUND_BLUE);
printf("\n\n****************************************************************");
printf("\n\n    %s v%s by SecurityXploded", "Remote DLL Injector", "2.1");
printf("\n\n    %s", "http://securityxploded.com/remote-dll-injector.php");
ansi_stdout_color(FOREGROUND_RED|FOREGROUND_GREEN|FOREGROUND_BLUE);
printf("\n\n****************************************************************");
ansi_stdout_color(FOREGROUND_GREEN);
printf("\n\n\n Usage: \n\t %s.exe <pid>  <dll_file_path>", "RemoteDLLInjector64");
printf("\n\n\n Examples:\n");
printf("\n\t //Inject DLL into process with pid 1551");
printf("\n\t %s.exe 1551 \"c:\\my project\\inject.dll\"", "RemoteDLLInjector64");
printf("\n\n\t //Show this help screen");
printf("\n\t %s.exe -h", "RemoteDLLInjector64");
printf("\n\n");