Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003464471|08|2023|885
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003432437|08|2023|333
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003484305|08|2023|674
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003471435|08|2023|553
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003406845|08|2023|845
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003410235|08|2023|583
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003401713|08|2023|354
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003458176|08|2023|355
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003478547|08|2023|235
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003487365|08|2023|772
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003403487|08|2023|857
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003408403|08|2023|808
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003464711|08|2023|843
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003488322|08|2023|454
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003432221|08|2023|073
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003470775|08|2023|502
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003432437|08|2023|333
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003484305|08|2023|674
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003471435|08|2023|553
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003406845|08|2023|845
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003410235|08|2023|583
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003401713|08|2023|354
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003458176|08|2023|355
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003478547|08|2023|235
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003487365|08|2023|772
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003403487|08|2023|857
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003408403|08|2023|808
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003464711|08|2023|843
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003488322|08|2023|454
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003432221|08|2023|073
⋊Response: $1 Charged ✅ CHARGED CC: 5117950003470775|08|2023|502
👍1
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049905551|02|2028|460
⋊Response: $1 Charged ✅
CHARGED CC: 5313640066468301|04|2024|189
⋊Response: $1 Charged ✅
CHARGED CC: 5313640060753377|08|2022|649
⋊Response: $1 Charged ✅
CHARGED CC: 5313640058240494|10|2029|350
⋊Response: $1 Charged ✅
CHARGED CC: 5313640045756354|12|2023|241
⋊Response: $1 Charged ✅
CHARGED CC: 5313640034008767|10|2026|093
⋊Response: $1 Charged ✅
CHARGED CC: 5313640078968082|09|2022|095
⋊Response: $1 Charged ✅
CHARGED CC: 5313640032362729|04|2028|089
⋊Response: $1 Charged ✅
CHARGED CC: 5313640052264342|08|2025|034
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049004058|10|2027|405
⋊Response: $1 Charged ✅
CHARGED CC: 5313640022692002|11|2025|418
⋊Response: $1 Charged ✅
CHARGED CC: 5313640039697416|10|2027|177
⋊Response: $1 Charged ✅
CHARGED CC: 5313640054352103|07|2029|721
⋊Response: $1 Charged ✅
CHARGED CC: 5313640078375056|03|2028|938
⋊Response: $1 Charged ✅
CHARGED CC: 5313640073513305|10|2022|655
⋊Response: $1 Charged ✅
CHARGED CC: 4762231720912915|01|2023|303
⋊Response: $1 Charged ✅
CHARGED CC: 5313640043275993|10|2028|143
⋊Response: $1 Charged ✅
CHARGED CC: 5313640041590856|05|2029|196
⋊Response: $1 Charged ✅
CHARGED CC: 5313640074683883|07|2027|432
⋊Response: $1 Charged ✅
CHARGED CC: 5313640050329360|11|2029|622
⋊Response: $1 Charged ✅
CHARGED CC: 5313640038198424|12|2027|099
⋊Response: $1 Charged ✅
CHARGED CC: 5313640046680421|02|2023|673
⋊Response: $1 Charged ✅
CHARGED CC: 5313640048695542|05|2029|616
⋊Response: $1 Charged ✅
CHARGED CC: 5313640061910265|12|2024|493
⋊Response: $1 Charged ✅
CHARGED CC: 5313640065896965|12|2027|485
⋊Response: $1 Charged ✅
CHARGED CC: 5313640034579320|10|2029|142
⋊Response: $1 Charged ✅
CHARGED CC: 5313640044461543|02|2025|929
⋊Response: $1 Charged ✅
CHARGED CC: 5313640039200617|10|2026|229
⋊Response: $1 Charged ✅
CHARGED CC: 5313640058546239|06|2027|131
⋊Response: $1 Charged ✅
CHARGED CC: 5313640031479482|04|2023|376
⋊Response: $1 Charged ✅
CHARGED CC: 5313640022393254|11|2023|622
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049031507|06|2029|637
⋊Response: $1 Charged ✅
CHARGED CC: 5313640067598593|05|2026|459
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049459518|03|2027|898
⋊Response: $1 Charged ✅
CHARGED CC: 5313640077325672|03|2023|144
⋊Response: $1 Charged ✅
CHARGED CC: 5313640024618757|11|2027|984
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049905551|02|2028|460
⋊Response: $1 Charged ✅
CHARGED CC: 5313640066468301|04|2024|189
⋊Response: $1 Charged ✅
CHARGED CC: 5313640060753377|08|2022|649
⋊Response: $1 Charged ✅
CHARGED CC: 5313640058240494|10|2029|350
⋊Response: $1 Charged ✅
CHARGED CC: 5313640045756354|12|2023|241
⋊Response: $1 Charged ✅
CHARGED CC: 5313640034008767|10|2026|093
⋊Response: $1 Charged ✅
CHARGED CC: 5313640078968082|09|2022|095
⋊Response: $1 Charged ✅
CHARGED CC: 5313640032362729|04|2028|089
⋊Response: $1 Charged ✅
CHARGED CC: 5313640052264342|08|2025|034
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049004058|10|2027|405
⋊Response: $1 Charged ✅
CHARGED CC: 5313640022692002|11|2025|418
⋊Response: $1 Charged ✅
CHARGED CC: 5313640039697416|10|2027|177
⋊Response: $1 Charged ✅
CHARGED CC: 5313640054352103|07|2029|721
⋊Response: $1 Charged ✅
CHARGED CC: 5313640078375056|03|2028|938
⋊Response: $1 Charged ✅
CHARGED CC: 5313640073513305|10|2022|655
⋊Response: $1 Charged ✅
CHARGED CC: 4762231720912915|01|2023|303
⋊Response: $1 Charged ✅
CHARGED CC: 5313640043275993|10|2028|143
⋊Response: $1 Charged ✅
CHARGED CC: 5313640041590856|05|2029|196
⋊Response: $1 Charged ✅
CHARGED CC: 5313640074683883|07|2027|432
⋊Response: $1 Charged ✅
CHARGED CC: 5313640050329360|11|2029|622
⋊Response: $1 Charged ✅
CHARGED CC: 5313640038198424|12|2027|099
⋊Response: $1 Charged ✅
CHARGED CC: 5313640046680421|02|2023|673
⋊Response: $1 Charged ✅
CHARGED CC: 5313640048695542|05|2029|616
⋊Response: $1 Charged ✅
CHARGED CC: 5313640061910265|12|2024|493
⋊Response: $1 Charged ✅
CHARGED CC: 5313640065896965|12|2027|485
⋊Response: $1 Charged ✅
CHARGED CC: 5313640034579320|10|2029|142
⋊Response: $1 Charged ✅
CHARGED CC: 5313640044461543|02|2025|929
⋊Response: $1 Charged ✅
CHARGED CC: 5313640039200617|10|2026|229
⋊Response: $1 Charged ✅
CHARGED CC: 5313640058546239|06|2027|131
⋊Response: $1 Charged ✅
CHARGED CC: 5313640031479482|04|2023|376
⋊Response: $1 Charged ✅
CHARGED CC: 5313640022393254|11|2023|622
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049031507|06|2029|637
⋊Response: $1 Charged ✅
CHARGED CC: 5313640067598593|05|2026|459
⋊Response: $1 Charged ✅
CHARGED CC: 5313640049459518|03|2027|898
⋊Response: $1 Charged ✅
CHARGED CC: 5313640077325672|03|2023|144
⋊Response: $1 Charged ✅
CHARGED CC: 5313640024618757|11|2027|984
⋊Response: $1 Charged ✅
😃Get Free .XYZ .DEV .APP Domain 1 Year😱😱
🔗 | Link : https://shareus.in/?i=2HsyKf
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
➤ | Sᴇɴᴅ Sᴄʀᴇᴇɴsʜᴏᴛ : @SIR_AYUSH_BOT
➤ | Pʀᴏᴏғs Hᴇʀᴇ : @HELL_PROOFS
🔗 | Link : https://shareus.in/?i=2HsyKf
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
➤ | Sᴇɴᴅ Sᴄʀᴇᴇɴsʜᴏᴛ : @SIR_AYUSH_BOT
➤ | Pʀᴏᴏғs Hᴇʀᴇ : @HELL_PROOFS
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CCNUM 4520010051711077
EXP 22/10
NAME Dalia Di Michele
CVV 864
CCNUM 5356664244846764
EXP 25/12
NAME Mr Tom Sharp
CVV 736
CCNUM 4334436956297589
EXP 24/11
CVV 544
CCNUM 4334433239396981
EXP 24/07
CVV 409
CCNUM 5356668054963957
EXP 25/06
NAME Libby Thompson
CVV 468
EXP 22/10
NAME Dalia Di Michele
CVV 864
CCNUM 5356664244846764
EXP 25/12
NAME Mr Tom Sharp
CVV 736
CCNUM 4334436956297589
EXP 24/11
CVV 544
CCNUM 4334433239396981
EXP 24/07
CVV 409
CCNUM 5356668054963957
EXP 25/06
NAME Libby Thompson
CVV 468
👍1
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
5129935017534118
EXP 24/06
CVV 003
Write your comment here Max 250 chars
Save comment
COUNTRY UNITED STATES
BANK SANTANDER BANK, NA
LEVEL ENHANCED
TYPE DEBIT
ZIP 03060
STATE New Hampshire
5311063467325842
EXP 24/02
NAME Christine M Santiago
CVV 178
Write your comment here Max 250 chars
Save comment
COUNTRY UNITED STATES
BANK BANCORP BANK, THE
LEVEL PREPAID RELOADABLE
TYPE DEBIT
ZIP 03060
STATE New Hampshire
SPAM @LIVEE_CC_CARD
EXP 24/06
CVV 003
Write your comment here Max 250 chars
Save comment
COUNTRY UNITED STATES
BANK SANTANDER BANK, NA
LEVEL ENHANCED
TYPE DEBIT
ZIP 03060
STATE New Hampshire
5311063467325842
EXP 24/02
NAME Christine M Santiago
CVV 178
Write your comment here Max 250 chars
Save comment
COUNTRY UNITED STATES
BANK BANCORP BANK, THE
LEVEL PREPAID RELOADABLE
TYPE DEBIT
ZIP 03060
STATE New Hampshire
SPAM @LIVEE_CC_CARD
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CVV CC: 379223082401002|06|2023|8038
Result: CVV LIVE
CVV CC: 371782641362011|02|27|3822
Result: CVV LIVE
CVV CC: 371782641362011|02|2027|3822
Result: CVV LIVE
Result: CVV LIVE
CVV CC: 371782641362011|02|27|3822
Result: CVV LIVE
CVV CC: 371782641362011|02|2027|3822
Result: CVV LIVE
*🔰Chrome Zero-day Abused to Spread Spyware to Target Journalists*🔰
The spyware vendor from Israel, Candiru, was discovered abusing a zero-day vulnerability in Google Chrome to spy on journalists and high-interest individuals from the Middle East, using a spyware called DevilsTongue.
*The abuse of zero-day*
Avast researchers spotted the vulnerability and reported it to Google. Further, they disclosed the details after examining DevilsTongue attacks on their clients.
Candiru started abusing the zero-day in March and targeting users in Palestine, Turkey, Yemen, and Lebanon.
The flaw, tracked as CVE-2022-2294, is a high-severity heap-based buffer overflow in WebRTC. Its successful exploitation may lead to code execution on the targeted device.
After being reported to Google, the tech firm patched the exploited zero-day on July 4, which has been under active exploitation in cyberattacks.
Since the bug exists in WebRTC, it also impacts Safari browser but the exploit found only work on Windows.
*Attack vectors*
The spyware operators have used watering holes and spear-phishing tactics in their attacks.
This attack requires no interaction with the victim, such as clicking on a link or downloading a file.
Instead, a user is made to open an already compromised website or the one created by hackers in a Chromium-based browser or Chrome.
In one instance, the attackers infected a website used by a news agency in Lebanon and inserted JavaScript snippets to enable XSS attacks, and redirected targets to the exploit server.
In the Lebanon case, the zero-day allowed shellcode execution inside a renderer process and further chained with a sandbox escape flaw that Avast failed to recover for investigation.
*What was the target?*
After the initial infection, the DevilsTongue spyware used a BYOVD (bring your own driver) step to elevate the privileges and achieve read and write rights to the infected device's memory. Researchers believe the cybercriminals used the spyware to learn about what news stories the targeted journalist are working on.
*Conclusion*
The recent report sheds light on the dangers of services offered by commercial spyware vendors. These vendors are developing or buying zero-day exploits to target people asked by their clients. Thus, always protect data with powerful encryption and update devices with the latest security updates.
The spyware vendor from Israel, Candiru, was discovered abusing a zero-day vulnerability in Google Chrome to spy on journalists and high-interest individuals from the Middle East, using a spyware called DevilsTongue.
*The abuse of zero-day*
Avast researchers spotted the vulnerability and reported it to Google. Further, they disclosed the details after examining DevilsTongue attacks on their clients.
Candiru started abusing the zero-day in March and targeting users in Palestine, Turkey, Yemen, and Lebanon.
The flaw, tracked as CVE-2022-2294, is a high-severity heap-based buffer overflow in WebRTC. Its successful exploitation may lead to code execution on the targeted device.
After being reported to Google, the tech firm patched the exploited zero-day on July 4, which has been under active exploitation in cyberattacks.
Since the bug exists in WebRTC, it also impacts Safari browser but the exploit found only work on Windows.
*Attack vectors*
The spyware operators have used watering holes and spear-phishing tactics in their attacks.
This attack requires no interaction with the victim, such as clicking on a link or downloading a file.
Instead, a user is made to open an already compromised website or the one created by hackers in a Chromium-based browser or Chrome.
In one instance, the attackers infected a website used by a news agency in Lebanon and inserted JavaScript snippets to enable XSS attacks, and redirected targets to the exploit server.
In the Lebanon case, the zero-day allowed shellcode execution inside a renderer process and further chained with a sandbox escape flaw that Avast failed to recover for investigation.
*What was the target?*
After the initial infection, the DevilsTongue spyware used a BYOVD (bring your own driver) step to elevate the privileges and achieve read and write rights to the infected device's memory. Researchers believe the cybercriminals used the spyware to learn about what news stories the targeted journalist are working on.
*Conclusion*
The recent report sheds light on the dangers of services offered by commercial spyware vendors. These vendors are developing or buying zero-day exploits to target people asked by their clients. Thus, always protect data with powerful encryption and update devices with the latest security updates.
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CHARGED CC: 5262053008837693|09|2027|508
➜Response: Charged ✅
CHARGED CC: 5262053008837669|03|2031|520
➜Response: Charged ✅
CHARGED CC: 5262053008837552|05|2023|757
➜Response: Charged ✅
CHARGED CC: 5262053008838816|11|2031|748
➜Response: Charged ✅
CHARGED CC: 5262053008834708|07|2031|625
➜Response: Charged ✅
CHARGED CC: 5262053008837693|05|2025|241
➜Response: Charged ✅
CHARGED CC: 5262053008836240|01|2025|832
➜Response: Charged ✅
CHARGED CC: 5262053008836141|11|2029|430
➜Response: Charged ✅
➜Response: Charged ✅
CHARGED CC: 5262053008837669|03|2031|520
➜Response: Charged ✅
CHARGED CC: 5262053008837552|05|2023|757
➜Response: Charged ✅
CHARGED CC: 5262053008838816|11|2031|748
➜Response: Charged ✅
CHARGED CC: 5262053008834708|07|2031|625
➜Response: Charged ✅
CHARGED CC: 5262053008837693|05|2025|241
➜Response: Charged ✅
CHARGED CC: 5262053008836240|01|2025|832
➜Response: Charged ✅
CHARGED CC: 5262053008836141|11|2029|430
➜Response: Charged ✅
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
INPUT: 5348600018877735|05|2027|717
OUTPUT: Approved ✅
➤ Response : $1 Charged ✅
➤ Receipt
OUTPUT: Approved ✅
➤ Response : $1 Charged ✅
➤ Receipt
India’s cyber-security agency 🇮🇳
The Indian Computer Emergency Response Team or CERT-In has warned of high vulnerabilities in the Apple Watch ecosystem.
The vulnerabilities would can allow hackers to bypass the company’s security measures that have been built into Apple’s WatchOS.
In an advisory, CERT-In has said that users should update their Watch OS to the latest security versions rolled out by the company. The vulnerabilities have been reported in versions of WatchOS prior to the 8.7 version.
🐞👁This Vulnerability might allow attackers:-
- To run arbitrary code and bypass security restrictions on the device.
- Could make use of this security flaw to execute commands on your device remotely.
- Allowing the attackers access to private information on the smartwatch.
The Indian Computer Emergency Response Team or CERT-In has warned of high vulnerabilities in the Apple Watch ecosystem.
The vulnerabilities would can allow hackers to bypass the company’s security measures that have been built into Apple’s WatchOS.
In an advisory, CERT-In has said that users should update their Watch OS to the latest security versions rolled out by the company. The vulnerabilities have been reported in versions of WatchOS prior to the 8.7 version.
🐞👁This Vulnerability might allow attackers:-
- To run arbitrary code and bypass security restrictions on the device.
- Could make use of this security flaw to execute commands on your device remotely.
- Allowing the attackers access to private information on the smartwatch.
🥰1
*Topics*
*How to become an ethical hacker*
*How to do packet forging attack (Practical)*
*How to hack social media accounts using Tab Napping (Practical)*
*How to setup Whonix Gateway (Practical)*
Timing 5:00 PM
https://chat.whatsapp.com/FVL8m3bA3CX9kpOhXrbit5
*How to become an ethical hacker*
*How to do packet forging attack (Practical)*
*How to hack social media accounts using Tab Napping (Practical)*
*How to setup Whonix Gateway (Practical)*
Timing 5:00 PM
https://chat.whatsapp.com/FVL8m3bA3CX9kpOhXrbit5
WhatsApp.com
WhatsApp Group Invite
👍1
Freelearningtech pinned «*Topics* *How to become an ethical hacker* *How to do packet forging attack (Practical)* *How to hack social media accounts using Tab Napping (Practical)* *How to setup Whonix Gateway (Practical)* Timing 5:00 PM https://chat.whatsapp.com/FVL8m3bA3CX9kpOhXrbit5»
🔱Selling RDP for cheap!
🔰Ram - 4,8,16,32,64
🔰AZURE , GOOGLE CLOUD PORTALS AVAILABLE IN CHEAP
🔥Pay as you available in cheap price !
📩Dm - @Carbon_neutralXx to buy
⚠️Very limited stock selling . So please do fast and done the deal
‼️Escrow Accepted ‼️
🔰Ram - 4,8,16,32,64
🔰AZURE , GOOGLE CLOUD PORTALS AVAILABLE IN CHEAP
🔥Pay as you available in cheap price !
📩Dm - @Carbon_neutralXx to buy
⚠️Very limited stock selling . So please do fast and done the deal
‼️Escrow Accepted ‼️
👍2
*SMS-Attack*
A social engineering toolkit for performing smishing, and other sms attacks.
It was created by TheNooB and Spider Anongreyhat
*Note:*
*You can only send 1 sms daily*
*How to Install on termux*
apt update && apt upgrade
apt install python3
apt install git
apt install pip
git clone https://github.com/spider863644/SMS-Attack
pip install -r requirements.txt
python3 sms.py
*How to install on Linux*
sudo apt update && apt upgrade
sudo apt install python3
sudo apt install git
sudo apt install pip
git clone https://github.com/spider863644/SMS-Attack
sudo pip install -r requirements.txt
python3 sms.py
*Important Note:*
*If you are finding it difficult to send sms, just connect to a strong VPN and switch it to "USA"*
A social engineering toolkit for performing smishing, and other sms attacks.
It was created by TheNooB and Spider Anongreyhat
*Note:*
*You can only send 1 sms daily*
*How to Install on termux*
apt update && apt upgrade
apt install python3
apt install git
apt install pip
git clone https://github.com/spider863644/SMS-Attack
pip install -r requirements.txt
python3 sms.py
*How to install on Linux*
sudo apt update && apt upgrade
sudo apt install python3
sudo apt install git
sudo apt install pip
git clone https://github.com/spider863644/SMS-Attack
sudo pip install -r requirements.txt
python3 sms.py
*Important Note:*
*If you are finding it difficult to send sms, just connect to a strong VPN and switch it to "USA"*
GitHub
GitHub - spider863644/SMS-Attack: A social engineering toolkit for performing smishing, and other sms attacks
A social engineering toolkit for performing smishing, and other sms attacks - spider863644/SMS-Attack
Cypher Rat New UPDATE
- New Tool: Request Admin Rights at runtime
- Admin rights: Help the apk to bypass battery optimization and keep app alive on background
+
Make Apk Harder To remove
- General Fix and improvement
- - - - - - - - - - - - - - -
Click Here to Download
https://www.mediafire.com/file/g1yqn616des7v3n/CypherRat-Update-7-24.rar/file
RAR PASSWORD: craxsrat.com
——————————
- New Tool: Request Admin Rights at runtime
- Admin rights: Help the apk to bypass battery optimization and keep app alive on background
+
Make Apk Harder To remove
- General Fix and improvement
- - - - - - - - - - - - - - -
Click Here to Download
https://www.mediafire.com/file/g1yqn616des7v3n/CypherRat-Update-7-24.rar/file
RAR PASSWORD: craxsrat.com
——————————
MediaFire
CypherRat-Update-7-24
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.
👍1
SocialSploit
SocialSploit is a Termux tool which using for make phishing page for access someone socialmedia Account like username , password....!
$ apt update -y
$ apt upgrade -y
$ apt install git
$ git clone https://github.com/Cesar-Hack-Gray/SocialSploit
$ cd SocialSploit
$ bash install.sh
$ ./Sploit
SocialSploit is a Termux tool which using for make phishing page for access someone socialmedia Account like username , password....!
$ apt update -y
$ apt upgrade -y
$ apt install git
$ git clone https://github.com/Cesar-Hack-Gray/SocialSploit
$ cd SocialSploit
$ bash install.sh
$ ./Sploit
GitHub
GitHub - Cesar-Hack-Gray/SocialSploit
Contribute to Cesar-Hack-Gray/SocialSploit development by creating an account on GitHub.