Phonesploit is a tool for remote ADB exploitation in Python3. Features Access Shell Screen record victim device Screenshot a picture on victim device Pull folders from victim device Turn victim device off Uninstall an app Show real time log of victim device Dump system info List all apps on victim Run an app Port Forwarding […]
Lazymux is a tool installer that is specially made for termux user which provides a lot of tool mainly used tools in termux and its easy to use, Lazymux install any of the given tools provided by it from itself with just one click, and its often get updated. With just one click, you may […]
What is Tool X Tool-X is a Kali Linux hacking tools installer for Termux and linux system. Tool-X was developed for Termux and linux based systems. Using Tool-X, you can install almost 370+ hacking tools in Termux (android) and other Linux based distributions. Now Tool-X is available for Ubuntu, Debian etc.Below are the system requirementsTool-X works […]
🎣 PHISHING RESOURCES 🎣 OSINT Links & Toolshttps://www.osinttechniques.com/osint-tools.html Maltegohttps://www.maltego.com/downloads/ Recon-nghttps://github.com/lanmaster53/recon-ng Google dorkshttps://www.abw.gov.pl/download/1/2783/MidlerGarlickiMincewicz-PL.pdfhttps://www.exploit-db.com/google-hacking-database PHP Code saving POST data:https://gist.github.com/magnetikonline/650e30e485c0f91f2f40 Certificateshttps://www.certificate-transparency.org/what-is-ct https://transparencyreport.google.com/https/certificates Domains Name Generationhttps://github.com/elceef/dnstwist Scoring / Rankinghttps://www.alexa.com/siteinfo WHOIS privacy / historyhttps://whois-history.whoisxmlapi.com Ageinghttps://www.expireddomains.net/ Web Archivehttps://web.archive.org CategorizationBlueCoat: http://sitereview.bluecoat.com/sitereview.jsp Cisco: http://www.senderbase.org/home McAfee: http://www.mcafee.com/us/threat-center.aspx Trend Micro: https://global.sitesafety.trendmicro.com Websense: http://csi.websense.com Zscaler: http://zulu.zscaler.com SE Tools Evilginx (MITM Phishing Framework)https://github.com/kgretzky/evilginx2 SEThttps://github.com/trustedsec/social-engineer-toolkit BeEFhttps://github.com/beefproject/beef GoPhishhttps://github.com/gophish/gophishhttps://docs.getgophish.com/user-guide/ KingPhisherhttps://github.com/rsmusllp/king-phisherhttps://king-phisher.readthedocs.io/en/latest/ […]
Awesome Hacking A collection of awesome lists for hackers, pentesters & security researchers. Your contributions are always welcome ! Awesome Repositories Repository Description Android Security Collection of Android security related resources AppSec Resources for learning about application security Asset Discovery List of resources which help during asset discovery phase of a security assessment engagement Bug Bounty List […]
Welcome To Phishing FaceBook Alternative – Use blackeye tool in Kali Linux Required Python2 or Python3 Download Links: https://www.python.org/ftp/python/3.6.1/python-3.6.1-amd64.exe (for Windows User) https://www.python.org/ftp/python/2.7.13/python-2.7.13.amd64.msi (for Windows User) https://git-scm.com/download/win (Download Git) Installation Install Python from given links(Add Environment Vars if needed). Install Python Django Install Python Requests Download Repo (Commands) command > git clone https://github.com/IAmBlackHacker/Facebook-phishing command > cd Facebook-phishing Make Backened […]
Instagram Bruter This program will brute force any Instagram account you send it its way given a list of proxies.github link : https://github.com/Hackertrackersj/Instabruteforce.git NOTICE It motivates me to keep updating this program. Requirements Python v3.9 proxy list Install Dependencies Install Pipenv Create environment Make sure you have Python 3.9 installed Install Requirements Help Proxies The system […]