Pinned Repositories
fakeap
Fake-AP to perform Evil Twin Attack
Fucking-Rat
This is a just fucking asshole android rat where app coded in Java and server in python
ighack
Hack Instagram From Termux With Help of Tor
infog
Information Gathering Tool
instagen
Instagram Account Generator
keydroid
Android Keylogger + Reverse Shell
L3MON-1
L3MON - Remote Android Managment Suite Termux, Kali LInux, Ubuntu by EFX Tv
SpyMax-4.0-Activated-Cracked-Download
SpyMax 4.0 is and RAT Software For Remote Android Device and has alot of Features (Remote cam, Remote files and live Seceen Recoing, and More Features. This RAT Software Requires NetFrameWork 3.5 and 4 and 4.5 (For Educational Purposes Only)
whatshack
Script to generate Android App to get all WhatsApp media (images, audios, videos)
Wi-Fi-Hacking-Sploit-Master
WiFi Hacking Sploit Master is a password cracker for an admin page of a WiFi router
gituu4567's Repositories
gituu4567/Wi-Fi-Hacking-Sploit-Master
WiFi Hacking Sploit Master is a password cracker for an admin page of a WiFi router
gituu4567/888RAT-Cracked-for-Free-1
THIS IS A RAT TO HACKING ANDROID AND WINDOWS DEVICE !
gituu4567/888rat-free-download
888 RAT Pro Options : File Manager Remote Desktop Web cam capture Sound capture Get password (all last browser 2 method – microsoft and Downloader and Outlook) proccess Manager remote Cmd Online Keylogger Form graber log + images remote chat download and execut Upload and execut Open Url UAC exploit Delete Cookis (chrome + firefox) Speaker ( Virus speak what you write ) outluk Delete Profile and pass open cd and close 888 RAT Pro Browser Support : Firefox Internet Explorer Google Chrome Chrome Canary/SXS CoolNovo Browser Opera Browser Apple Safari Flock Browser SeaMonkey Browser SRWare Iron Browser Comodo Dragon Browser 888 RAT Pro Email Support : Microsoft Outlook Express Microsoft Outlook 2002/XP/2003/2007/2010/2013 Mozilla Thunderbird Windows Live Mail 2012 IncrediMail Opera Mail The Bat! Foxmail v6.x – v7.x Windows Live Messenger MSN Messenger Google Talk GMail Notifier PaltalkScene IM Pidgin (Formerly Gaim) Messenger Miranda Messenger BUG Fixes ( First of all update your old users with new Rat server , if you not update you will find problems ) 888 RAT Pro v1.0.9 Improvement List : 1 - Add label explain features in builder area 2 - Fix scanner davices bug display ip 3 - deleted hid instalation becose some system not run server in startup becose folder is hiden 4 - Now you can use Ms17-10 Not just LAN but WAN also mean via wirless 5 - Add in server area a auto change from system to user previlage without upload server & run as user for exploit MS17-010 ( so faster ) 6 - Add Cookis Stealer in password area , now you able to have any session just with steal & inject cookies to your brwoser , no pass , no grab the good that you can bypass 2FA autentification & not need user or a password , also work any website for browser Chrome Firfox & Opera (Native) 7- Add Browser Decrypter for [ Chrome , Opera ] All vesion in password area (Native) 8 - Add in rat client a Arp scanne method on Ms17-010 it is fast mthod to scanne a network the first method was ping scanne now we have tow methods 9 - Add in Ms17-010 scanner custome range from to in the past was num 1 also add label to know self ip in lan network 10 - Replaced old FireFox get pass with new one fast & stable ( same way as old just improuved ) 11 - Some bug fix and delete show ip in duckdns & no-ip updaters for security reasons & improuve hiden info in option area 12 - Add search option on cookies stealer . 13 - Message manager i am prouved now it is a list view with all messages logs 14 - Added new persistence method Schtasks ( we keep old vbs method ) now tow method avalible 15 - Remove server from Zone.Identifier in install , the warn message of windows when you run server detected as unknow app (in install only ) 16 - Add detect target time & self ip on the machin in scanner MS17_010 17 - Change No ip updater from hiden execution to execut via browser (not hiden) more stable becose som browser block update in hidden mode 18 - Add Regedit Manager in windows system area explore files , add value , delete value , Decode value type Binary and Base64 and CryptProtectData 19 - Fix GetObject Error for Speaker in funny area also for Get Av name. 888 RAT Pro Installation Note : Always Disable Your Antivirus Before Using RAT Install Java JRE And Java JDK If Not Installed Yet Always Bind Apk With Server
gituu4567/admin-panel-retriever
gituu4567/Android-RATList
Android - Remote Access Trojan List
gituu4567/AndroRAT-2
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
gituu4567/anonymous_sms
Use it for need not for revange
gituu4567/Apktool
A tool for reverse engineering Android apk files
gituu4567/atom
:atom: The hackable text editor
gituu4567/CamPhish
Grab cam shots from target's phone front camera or PC webcam just sending a link.
gituu4567/DROIDJACK-4.4-CRACKED-
DOWNLOAD DROIDJACK CRACKED VERSION 4.4 FOR FREE.......
gituu4567/FAMA
Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser
gituu4567/hack_clock
A matrix LED WiFi clock.
gituu4567/Infoga
Infoga - Email OSINT
gituu4567/LITESPAM
Berisi Tools Spammer Dengan Berbagai Macam jenis Dengan Limit Tinggi Bahkan Unlimited
gituu4567/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
gituu4567/multitor
Create multiple TOR instances with a load-balancing.
gituu4567/MyServer
MyServer is your own localhost web server. you can setup PHP, Apache, Nginx and MySQL servers on your android devices or linux like Ubuntu etc. MyServer is Developed for android terminal like Termux or GNURoot Debian terminal.
gituu4567/OpenMF
An Open Source Mobile Forensics Investigation Tool for Android Platform
gituu4567/riposte
Python package for wrapping applications inside a tailored interactive shell
gituu4567/RoguePhisher
Advanced phishing toll with 30+ templates and updated URL Redirection
gituu4567/SMSSpoof
Spoof who an SMS is from using an SMS API
gituu4567/SocialFishMobile
:iphone: :fish: An app to remote control SocialFish.
gituu4567/Tekster
An SMS tool for sending texts Anonymously.
gituu4567/The-Complete-Practical-Certified-Ethical-Hacking-Course-in-English
Welcome this comprehensive course on Ethical Hacking! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts! This course is highly practical but it won't neglect the theory, so we'll start with ethical hacking basics and the different fields in penetration testing, installing the needed software (works on Windows, Linux and Mac OS X) and then we'll dive and start hacking systems straight away. From here onwards you'll learn everything by example, by analysing and exploiting computer systems such as networks, servers, clients, websites .....etc, so we'll never have any boring dry theoretical lectures. The course is divided into a number of sections, each section covers a penetration testing / hacking field, in each of these sections you'll first learn how the target system works, the weaknesses of this system, and how to practically exploit theses weaknesses and hack into it, not only that but you'll also learn how to secure this system from the discussed attacks. This course will take you from a beginner to a more advanced level by the time you finish, you will have knowledge about most penetration testing fields. The course is divided into four main sections: 1. Network Hacking - This section will teach you how to test the security of networks, both wired and wireless. First, you will learn some basic network terminology, how networks work, and how devices communicate with each other. Then it will branch into three sub sections: Pre-connection attacks: in this subsection you'll learn what can you do before even connecting to a network, and even before having internet access; you'll start by learning how to gather information about the networks around you, discover the devices connected to them, and how to control connections around you (ie: deny/allow devices from connecting to networks) even without knowing the password of the target network. Gaining Access: Now that you gathered information about the networks around you, in this subsection you will learn how to crack the key and get the password to your target network weather it uses WEP, WPA or even WPA2. Post Connection attacks: Now that you have the key, you can connect to the target network, in this subsection you will learn a number of powerful techniques that allow you to gather comprehensive information about the connected devices, see anything they do on the internet (such as login information, passwords, visited urls, images, videos ....etc), redirect requests, inject evil code in loaded pages and much more! All the attacks here work against both wireless and wired networks. You will also learn how to create a fake WiFi network, attract users to connect to it and use all of the above techniques against the connected clients. 2. Gaining Access - In this section you will learn two main approaches to gain full control or hack computer systems: Server Side Attacks: In this subsection you will learn how to gain full access to computer systems without the need for user interaction. You will learn how to gather useful information about a target computer system such as its operating system, open ports, installed services, then you'll learn how to use this information to discover weaknesses and vulnerabilitiesand exploit them to gain full control over the target. Finally you will learn how to generate different types of reports for your discoveries. Client Side Attacks - If the target system does not contain any weaknesses then the only way to gain access to it is by interacting with the users, in this subsection you'll learn how to get the target user to install a backdoor on their system without even realising, this is done by hijacking updatesor backdoornig downloadeds on the fly. Not only that but you'll also learn how to create trojans by backdooring normal files (such as an image or a pdf) and use social engineering to deliver this trojan to the target, to do this you'll learn how to spoof emails so they appear as if they're sent from the target's friend, boss or any email account they're likely to interact with. 3. Post Exploitation - In this section you will learn how to interact with the systems you compromised so far. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, spy on the target and even use the target computer as a pivot to hack other computer systems. 4. Website / Web Application Hacking - In this section you will learn how websites work, how to gather information about a target website (such as website owner, server location, used technologies ....etc) and how to discover and exploit the following dangerous vulnerabilities to hack into websites:
gituu4567/WhatsApp-Key-DB-Extractor
Allows WhatsApp users to extract their cipher key and databases on non-rooted Android devices.
gituu4567/wifi007
The Best Tool To Hack wifi in 2020
gituu4567/wifi_hack
This method can be used in linux terminals
gituu4567/Xiaomi-Dafang-Hacks
gituu4567/zphisher
Automated Phishing Tool