Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'hidden'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. An osint tool that uses Ahmia.fi to get Tor hidden services and descriptions that match with the users query. [Hidden Content]
  2. Plugin for hiding content from prying eyes. Works in applications: Forums. Downloads. Blogs. Clubs. Gallery. Pages. Settings on the screenshot. Customize it at your discretion or leave it as it is. Select the necessary groups for which you want to hide content. (default: hidden for everyone) Select the forums where you want to hide content. (default: hidden for everyone) Select options for displaying the remaining or existing actions. (by default: remaining actions are displayed) Select the light/dark mode for the button window. (default: standard light (3-4 screenshots)) Customize the colors of the block and the text of the hidden content. Set the button for CKEditor. Installation along the way (k4hiddencontent.zip): [Hidden Content] To use the plugin without a button: Register all properties in the [Hidden Content]. p=10 - the number of posts. r=10 - the amount of reputation. f=10 is the number of files. j=10 - the number of days of registration. m=10 - user ID (or multiselection m=10,11,12). g=10 - group ID (or multiselection g=10,11,12). The tag can be used without properties. Example: [ hide ]hidden text[ /hide ]. < [No spaces] In this case, viewing will be limited only to guests. [hide][Hidden Content]]
  3. ✅ injection in explorer.exe ✅ Hidden schtasks ✅ WDExcluion ✅ Anti Analysis ✅ Offline - Online ✅ Change Path ✅ Super Hidden ❇ X64/X86 Bit [Hidden Content] [Hidden Content] Enjoy
  4. [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. v1.4.4 Latest ADD: Added support for NVIDIA RTX 3050, AMD RADEON RX 6400, 6500, 6600, 6650, 6700, 6750, 6850 video cards The list of supported algorithms/coins has been updated. They are located in the readme_en.txt file. Namely: astrobwt/v2 AstroBWT (Dero HE) gr GhostRider (Raptoreum) Monero v15 network update support. (hard fork ~16 July 2022) [hide][Hidden Content]]
  5. What is tornado? Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. tornado can do create hidden service with tor network generate cross platform msfvenom payload with fully undetectable shellcode execution not shikata_ga_nai things hidden service becomes available outside tor network and ready to reverse shell connection be careful with tor2web even onion network, the only suicide mission is wearing blinders. tornado not secure from victim's point of view: the point of tor is that users can connect without being eavesdropped on and going through the clearnet with tor2web, even with https seriously cripples the efforts made to protect users. Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  6. Anonymously Reverse shell over Tor Network using Hidden Services without port forwarding. This project implements the tor network with the metasploit-framework tool and msfvenom module. You can easily create hidden services for your LHOST .onion domain without portforwarding. If you have experienced different remote administration tools, probably you know you need a forward port with VPN or NGROK but in this sense, the Tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed. Currently, this project has that features. Create a hidden service Generate msfvenom payload with fully undetectable Hidden service becomes available outside tor network Disclaimer This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and are not responsible for any misuse or damage caused by this tool and software. [hide][Hidden Content]]
  7. PandoraHVNC Cracked with offline builder builder + source Use only in VM / VPS / RDP [Hidden Content] Ps. password is mCFL8uUyZPD2h2qp
  8. CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Disclaimer This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool. [hide][Hidden Content]]
  9. CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Misconfigured DNS scan using DNSDumpster.com. Scan the Crimeflare.com database. Bruteforce scan over 2500 subdomains. Disclaimer This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool. [hide][Hidden Content]]
  10. [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; *dev donate 10% A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. v1.4.2 A critical error with TOR has been fixed. On some PCs, an error about the missing tor.exe file could get out. Added improvements to the TOR itself. [Hidden Content]
  11. [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; *dev donate 10% A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. v1.4.1 Tips for beginners have been added to the builder. [Hidden Content]
  12. Cyrobo Hidden Disk Pro – There are many ways to store your data securely on your PC, and numerous applications designed to aid you in this endeavor. However, complex tools tend not to be very user-friendly, and using them on a daily basis may reduce your productivity.Hidden Disk, on the other hand, provides you with a straightforward method of securing your files. It creates a new drive that can be hidden at any time, together with the contained data, as well as protected with a user-provided password. Simple utility designed to help you hide your private files Using Hidden Disk could hardly be easier, as you can create a brand new disk drive with a single mouse click. It can then be used like any other drive, so anyone familiar with the File Explorer should be able to get the hang of this program in no time at all. Moreover, you can assign a particular letter to the created drive to make it easier to locate. However, it shares its disk space with the system drive, which may limit the amount of data you can store. Secure method of storing data Of course, you also have the option of encrypting the drive with a password. If you go for this additional security feature, you are required to provide this key every time the application is launched. Furthermore, you can take advantage of the application’s e-mail recovery feature to ensure you do not lose access to your files should you forget your password. Follow the provided instructions to avoid losing your data It is worth noting that you should always move your files from the hidden drive whenever you wish to reinstall the operating system or format the partition. Even though the data is normally inaccessible, it is stored on the system drive, so it can still be deleted when you perform these operations. All in all, Hidden Disk is a lightweight, easy-to-use program that enables you to store data on a hidden drive. It can be set up in seconds even by complete novices, and also allows you to encrypt the newly created drive for extra security. [Hidden Content] [hide][Hidden Content]]
  13. [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; v1.4.0 Now information about RAM is displayed in loggers. Now you can use a random worker name at choice, through a period after the wallet, or in the password. Depending on the pool support. [Hidden Content]
  14. HOW TO DETECT A HIDDEN CAMERA IN A ROOM. When you stay in a hotel, how do you know there is no room secret pinhole camera? When you travel to an unfamiliar destination or take a business trip, you stay at a hotel, but what you do not know is that you could unknowingly be photographed or be secretly recorded. In this age of smart recording devices and pinhole sized drones, always remember when staying in a hotel, that you can use this method to check your room : 1.When you have entered into your room, turn off the lights, and close the curtains,open your phone camera, do not turn the flash light on. 2.Turn around the room with your cell phone. When a red dot is found on your screen, that means that a hidden web camera is installed. # If no red dots, then the room is okay. Please forward this message to your friends who travel a lot. And those that make a lot of business trips. My dear friends and sisters kindly note and be aware. ‼️Don't be a victim of a nude picture.‼️
  15. [+] Run from under the user without admin rights; [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly; [+] Protection against restart, re-installation, if already working; [+] After infection, the assembly starts within a minute; [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute; [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute; [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it; [+] Autoload; [+] "Gluing"; [+] Icon selection; [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker; [+] Fake error. (can be turned on); [+] Protection against draining on VirusTotal; [+] Random name of the worker. (can be turned on); [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits; [+] Support SSL/TLS; [+] Auto update miner via Tor. (actual for hard forks); [+] Removes other hidden miners; [+] Self-destruct installation file; v1.3.9 ADD: Support mining on AMD: RX 6800, 6900 [Hidden Content]
  16. [+] Run from under the user without admin rights. [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly. [+] Protection against restart, re-installation, if already working. [+] After infection, the assembly starts within a minute. [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute. [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute. [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it. [+] Autoload. [+] "Gluing". [+] Icon selection. [+] Heavy mining on CPU can be selected: 50% 75% 100% [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min) [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU. [+] For nicehash and dwarfpool, always put a random name for the worker. [+] Fake error. (can be turned on). [+] Protection against draining on VirusTotal. [+] Random name of the worker. (can be turned on). [+] Loggers through the service [Hidden Content] [+] "Build" support of Windows from 7 and above 32\64 bits. [+] Support SSL/TLS. [+] Auto update miner via Tor. (actual for hard forks). [+] Removes other hidden miners. [+] Self-destruct installation file. v1.3.8 ADD: Support mining on NVIDIA: RTX 3060, 3070, 3080, 3090 AMD: RX 5600 A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product. [Hidden Content] Scan Start.exe (Server) *Checks available today: 180 Summary result: 12/20 (from 1 object) Start: 2020-12-07 21:04 Duration: 23 sec. Link to scan result: [Hidden Content]
  17. Requirements: Net Framework 4 Features: 1- Hide server from Process 2- Hide server from startup 3- Hide server from scheduled tasks 4- Hide the server from the hard drive 5- Run as administrator permanently 6- Anti Virtual Machine 7- Kill Botnet Before Run 8- Change Assembly 9- Change Icon 10- Merging with another file with the AES algorithm [hide][Hidden Content]] Scan (Payload.exe) [Hidden Content]
  18. SubDomainizer SubDomainizer is a tool designed to find hidden subdomains and secrets present is either webpage, Github, and external javascript present in the given URL. This tool also finds S3 buckets, cloudfront URL’s and more from those JS files which could be interesting like S3 bucket is open to read/write, or subdomain takeover and a similar case for cloudfront. It also scans inside the given folder which contains your files. Cloud Storage Services Supported: SubDomainizer can find URL for following cloud storage services: 1. Amazon AWS services (cloudfront and S3 buckets) 2. Digitalocean spaces 3. Microsoft Azure 4. Google Cloud Services 5. Dreamhost 6. RackCDN. Changelog v2.0 SANs Feature: Added a feature to find Subject Alternative Names for already found subdomains from different sources. Two options can be used with -san argument i.e. all or same. same will find only subdomains for TLD of the URL. all will find all (sub)domains having the same SAN for a given subdomain. Secret Location Feature: Added a feature to display the location of secrets. Inline in case if secret(s) found within the page (used in -u argument) URL of file in case if secret(s) found on External JS file or Github URL or File path (in case of the folder). [hide][Hidden Content]]
  19. 120 downloads

    BlackHatProTools Hidden Tools And Content Leak HQ Leak Fo BlackHatProTools Link: Free download for Users PRIV8
    $110 PRIV8
  20. lorsrf Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST Methods. [hide][Hidden Content]]
  21. A simple script to generate a hidden url for social engineering. Legal disclaimer: Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [HIDE][Hidden Content]]
  22. View File BlackHatProTools Hidden Content Leak BlackHatProTools Hidden Tools And Content Leak HQ Leak Fo BlackHatProTools Link: Free download for Users PRIV8 Submitter dEEpEst Submitted 17/05/20 Category Files Password ********  
  23. Introduction Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc. Hidden Eye Logo Disclaimer: Use this tool for educational purposes only. Hidden Eye: Advanced Phishing Tool [Android-Support-Available] As a modern phishing tool, Hidden Eye is very good at what it does. The perfect combination of all its functional components gives it an upper hand when attacking accounts. By using brute force attacks it can effectively access the user’s personal information. Hidden Eye can easily crack user passwords and can also collect other personal data belonging to the victim. Depending on the attack vector selected you can easily hack user accounts such as Facebook, Twitter, Instagram, Snapchat and many others. It can be used to carry out phishing on 30+ pages. The tool can also run on android devices through the UserLand app or Termux app. Features: Can perform live attacks (IP, geolocation, country, etc.) Captures victim’s keystrokes (using keylogger function) Serveo URL type selection (selects between RANDOM URL and CUSTOM URL) Numerous phishing pages (Facebook, Twitter, Instagram, Dropbox, Reddit, WordPress, Yahoo, and many more) Android support (Termux/UserLand) Supported Platforms: Linux (Tested on: Kali Linux, Parrot OS, Ubuntu, Arch Linux, Black Arch, OS X High Sierra, etc.) Android (Termux/UserLand) Prerequisites: This tool can’t be run effectively is some components are not in place, so make sure that you’ve installed the following: Python 3 sudo Wget from Python PHP [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.