Phonesploit is a tool for remote ADB exploitation in Python3. Features Access Shell Screen record victim device Screenshot a picture on victim device Pull folders from victim device Turn victim device off Uninstall an app Show real time log of victim device Dump system info List all apps on victim Run an app Port Forwarding […]
🎣 PHISHING RESOURCES 🎣 OSINT Links & Toolshttps://www.osinttechniques.com/osint-tools.html Maltegohttps://www.maltego.com/downloads/ Recon-nghttps://github.com/lanmaster53/recon-ng Google dorkshttps://www.abw.gov.pl/download/1/2783/MidlerGarlickiMincewicz-PL.pdfhttps://www.exploit-db.com/google-hacking-database PHP Code saving POST data:https://gist.github.com/magnetikonline/650e30e485c0f91f2f40 Certificateshttps://www.certificate-transparency.org/what-is-ct https://transparencyreport.google.com/https/certificates Domains Name Generationhttps://github.com/elceef/dnstwist Scoring / Rankinghttps://www.alexa.com/siteinfo WHOIS privacy / historyhttps://whois-history.whoisxmlapi.com Ageinghttps://www.expireddomains.net/ Web Archivehttps://web.archive.org CategorizationBlueCoat: http://sitereview.bluecoat.com/sitereview.jsp Cisco: http://www.senderbase.org/home McAfee: http://www.mcafee.com/us/threat-center.aspx Trend Micro: https://global.sitesafety.trendmicro.com Websense: http://csi.websense.com Zscaler: http://zulu.zscaler.com SE Tools Evilginx (MITM Phishing Framework)https://github.com/kgretzky/evilginx2 SEThttps://github.com/trustedsec/social-engineer-toolkit BeEFhttps://github.com/beefproject/beef GoPhishhttps://github.com/gophish/gophishhttps://docs.getgophish.com/user-guide/ KingPhisherhttps://github.com/rsmusllp/king-phisherhttps://king-phisher.readthedocs.io/en/latest/ […]
Awesome Hacking A collection of awesome lists for hackers, pentesters & security researchers. Your contributions are always welcome ! Awesome Repositories Repository Description Android Security Collection of Android security related resources AppSec Resources for learning about application security Asset Discovery List of resources which help during asset discovery phase of a security assessment engagement Bug Bounty List […]
Instagram Bruter This program will brute force any Instagram account you send it its way given a list of proxies.github link : https://github.com/Hackertrackersj/Instabruteforce.git NOTICE It motivates me to keep updating this program. Requirements Python v3.9 proxy list Install Dependencies Install Pipenv Create environment Make sure you have Python 3.9 installed Install Requirements Help Proxies The system […]
A beginners friendly, Automated phishing tool with 30+ templates. Zphisher Disclaimer Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to […]
hacker-typer.com prank your friends now Write fake code in Atom. Inspired by http://hackertyper.com/usageopen the link and type like a monkey Supported languages: Hacker-typer detect the file extension and write code according to language: Python Javascript Java Go
Xteam tool ## Screenshot: ## Features: Insta information gathering Crack android lockscreen interfaces Phishing Hacks Wireless attacks added Update script Remove script Requirements Data connection No Root Available On Termux Kali Linux Test On: Termux Debian INSTALLATION [Termux] apt update apt upgrade pkg install python pkg install python2 pkg install git git clone https://github.com/xploitstech/Xteam ls […]
Installation We provide installation instructions for ImageNet classification experiments here. Dependency Setup Create an new conda virtual environment Install Pytorch>=1.8.0, torchvision>=0.9.0 following official instructions. For example: Clone this repo and install required packages: The results in the paper are generated with torch==1.8.0+cu111 torchvision==0.9.0+cu111 timm==0.3.2. Dataset Preparation Download the ImageNet-1K classification dataset and structure the data […]
CamPhish Grab cam shots from target’s phone front camera or PC webcam just sending a link. What is CamPhish? CamPhish is techniques to take cam shots of target’s phone front camera or PC webcam. CamPhish Hosts a fake website on in built PHP server and uses ngrok & serveo to generate a link which we […]
CiLocks | Android/IOS Hacking 📱 Crack Interface lockscreen, Metasploit and More Android/IOS Hacking Please Don’t Use for illegal Activity Update Available V2.1 🚀 Added New Tools Root Android {Supersu} Not Support All OS Version Jump To Adb Toolkit Shell ScreenShot Copy All Camera Photo Copy All WhatsApp Folder Copy All Data Storage Manual Copy {Costum} Backup Data […]