π TikTok Social Media Open Source Intellegence Tool π
Tik Tok OSINT gives the user lots of meta-data about the user.
πΉProfile Name
πΉProfile Image
πΉFollowers
πΉFollowing
πΉBio data
πΉVerification Boolean
πΉFan count
πΉLike count
πΉVideo Count
πΉUser ID
π Usage :
Tik Tok OSINT gives the user lots of meta-data about the user.
πΉProfile Name
πΉProfile Image
πΉFollowers
πΉFollowing
πΉBio data
πΉVerification Boolean
πΉFan count
πΉLike count
πΉVideo Count
πΉUser ID
π Usage :
python3 tiktokOSINT.py --username USERNAMEHERE --downloadProfilePic
π USB FILE STEALER π
The program steals files from removable storage media that connect to a computer
1. The program in the background process steals files from connected removable USB devices.
2. Even if the owner of the removable device observes the actions through the monitor, he will not see how the software copies files from his removable media in the background.
3. To select which files to search for and quietly copy from removable media that has just been copied, you need to fill in the search mask, by default, it is already pre-filled.
The program steals files from removable storage media that connect to a computer
1. The program in the background process steals files from connected removable USB devices.
2. Even if the owner of the removable device observes the actions through the monitor, he will not see how the software copies files from his removable media in the background.
3. To select which files to search for and quietly copy from removable media that has just been copied, you need to fill in the search mask, by default, it is already pre-filled.
πMs office password finder π
Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders
Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders
π WhatsApp Media Decrypt π
A recent high-profile forensic investigation reported that βdue to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader .enc file to determine if it contained any malicious code in addition to the delivered video.
A recent high-profile forensic investigation reported that βdue to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader .enc file to determine if it contained any malicious code in addition to the delivered video.
π Shelly Backdoor π
Simple Backdoor Manager with Python (based on weevely)
π Installation & usage π
π How to use ?
π See the Below Image π
Simple Backdoor Manager with Python (based on weevely)
π Installation & usage π
git clone https://github.com/tegal1337/Shelly
cd Shelly
python3 shell.py
sudo pip install -r requirements.txt
π How to use ?
π See the Below Image π
π Facebook account BruteForce attack π
Tool to bruteforce facebook passwords similar to instainsane in terms.
πInstallation & usage π
Tool to bruteforce facebook passwords similar to instainsane in terms.
πInstallation & usage π
git clone https://github.com/thelinuxchoice/facebash
cd facebash
chmod +x install.sh
sudo ./install.sh
chmod +x facebash.sh
service tor start
sudo ./facebash.sh
π See-SURF : Python Based Scanner To Find Potential SSRF Parameters π
πΉSee-SURF is a Python based scanner to find potential SSRF parameters in a web application. SSRF being one of the critical vulnerabilities out there in web, i see there was no tool which would automate finding potential vulnerable parameters.
πΉ See-SURF can be added to your arsenal for recon while doing bug hunting/web security testing.
π Installation
π Usage : see the below screenshots..
πΉSee-SURF is a Python based scanner to find potential SSRF parameters in a web application. SSRF being one of the critical vulnerabilities out there in web, i see there was no tool which would automate finding potential vulnerable parameters.
πΉ See-SURF can be added to your arsenal for recon while doing bug hunting/web security testing.
π Installation
git clone https://github.com/In3tinct/See-SURF.git
cd See-SURF/
pip3 install BeautifulSoup4
pip3 install requests
π Usage : see the below screenshots..