/DedSec

Read the text below to see all programs descriptions for the DedSec project.Read the Legal_Terms.txt file before doing anything!

Primary LanguagePythonOtherNOASSERTION

DedSec Project

Introduction

The DedSec Project is a versatile collection of tools aimed at advancing cybersecurity, secure communication, and automation. It offers a range of features for anonymous data collection, real-time monitoring, and personal environment customization, all designed to be used ethically and responsibly. Whether you're looking to test phishing defenses, build private servers, or communicate anonymously, DedSec has tools tailored for your needs.

Disclaimer: The tools in this repository are strictly for educational and ethical use. Misuse or unauthorized deployment may lead to legal consequences.


Features

1. Secure Communication

  • DedSec's Chat: Enables anonymous chatting for 8 to unlimited users. No chats are saved, ensuring complete privacy.
  • Fox Chat: Advanced messaging with encryption and theme customization, designed for cross-platform use.

2. Camera Tools

  • Camera Phish: Share a link to capture continuous images from the front or back camera (user's choice). Images are saved automatically in Internal Storage/Download/Camera-Phish.

3. Audio Recording

  • Sound Recording: Share a link to record high-quality audio. Recordings are saved in Internal Storage/Download/Recordings.

4. Geolocation Tools

  • Live Location Tracker: Retrieve real-time GPS coordinates and street details via shared links.

5. Database Management

  • DedSec Database: Build and manage personal databases or servers. Includes efficient search, retrieval, and export features for organized data management.

6. Phishing Simulations

  • Donation Phishing: Create phishing templates for controlled simulations, improving awareness and security measures.

7. OSINT Tools

  • OSINTDS: Automates the collection of open-source data from public sources, customizable for targeted intelligence.

8. Authentication Framework

  • T-Login: Secure multi-user authentication with encryption, session tracking, and audit logging.

9. Customization

  • Customization Tool: Modify terminal settings like color schemes, fonts, and layouts. Save and load profiles to automate repetitive tasks.

Why DedSec?

With DedSec, users can:

  • Ethically Collect Data: Use secure links to gather images, recordings, or location details for testing and analysis.
  • Communicate Anonymously: Chat without leaving a trace.
  • Simulate Attacks: Conduct phishing tests to identify and improve system weaknesses.
  • Customize Workflows: Personalize environments for efficiency.
  • Gather Intelligence: Automate OSINT tasks for research and analysis.

Storage Paths

  • Images: Internal Storage/Download/Camera-Phish
  • Audio: Internal Storage/Download/Recordings

Legal & Ethical Usage

  1. Obtain explicit permission from system owners before deployment.
  2. Follow all applicable local, national, and international laws.
  3. DedSec is designed for ethical use only—misuse is strictly prohibited.

DedSec empowers innovation, education, and cybersecurity research. Use it to make a positive impact!