Posts

Showing posts from February, 2024

NexxClone 240702F

Skip to main content PyPI Menu  Search PyPI Search projects Search nexxclone 1.1.2 pip install nexxcloneCopy PIP instructions Latest version Released: Dec 8, 2023 A Discord Selfbot for Clone Discord Server  Project description  Project details  Release history  Download files Project description Introduction NexxClone Documentation Welcome to the documentation for NexxClone, a Python library for Discord server cloning. This documentation will guide you through the installation, usage, and features of NexxClone. Table of Contents Installation Usage Examples Contributing License Installation Installation To get started with NexxClone, you'll need to install it using pip. Make sure you have Python 3.6 or higher installed. pip install nexxclone Usage Usage To use NexxClone, you'll need a Discord bot token and the IDs of the source and destination servers. Follow the example below to get started: from nexxclone import Clone import discord def main():     # ...

Vulnerability Analysis 240502-B

OwScan scan your website for vulnerabilities.find website applications vulnerabilities and fingerprint the target web application Installation : $ apt update && apt upgrade $ apt install git $ apt install php $ git clone  https://github.com/gameye98/owscan $ cd owscan $ chmod +x *  usage : $ php owscan.php  enter target site for example : example.com. it gives you information related to your target site. CMS Map CMS map is a tool used to find the vulnerabilities of website such as joomla,dripal,wordpress with the help of this tool we can scan our site vulnerabilities and fix it,and stay safe and secure execute these commands one by one to install. Installation : $ apt update $ apt upgrade $ apt install git $ apt install python2 $ git clone  https://github.com/Dionach/CMSmap.git $ cd CMSmap $ chmod +x * usage : $ python2 cms.py -h [it shows all options how we can use this tool] Click Jacking Scanner This script scans target site is vulnerable for this attack I...

"Email Tracking Research." by: CyberPunk

Image
Email Tracking: How Email Gets Tracked CyberPunk     Tutorial Introduction Whether you’re trying to track someone or if you’re tracking some user’s actions and activity (maybe in an email campaign), methods are the same/similar. Email tracking actions:  email tracking (if it’s opened/read)  event tracking (if link is clicked)  recipient’s IP tracking Email Tracking: How Email Gets Tracked Simplified, by placing an image into the email content (HTML), sender can track some of previously mentioned parameters (opened emails, clicked links, IPs, etc). The image is often invisible, a single pixel gif (referred to as web beacon). Opening an email will trigger image load from a remote server, which will consequently lead to “email open” detection and/or tracking of a recipient’s IP (in some cases). In large email campaigns, to make a distinction between the users/emails, the loaded image name (or its parameters) usually contain some user related information (id, hash, ...

Exploitation 240502-C

CMS Detection Exploitation suite is tool for scanning wordpress, joomla, Drupal and more than 100 other CMS.Functions of CMSeek: 1. Basic CMS Detection of over 80 CMS  2. Drupal version detection  3. Advance wordpress scans 4. Detects version  5. User enumeration  6. Plugins enumeration  7. Theme enumeration 8. Detects User (3 Detection method) 9. Loop for version vulnerabilities and much more! 10. Advanced Joomla Scans  11. Version detection 12. Backup file finder 13. Core vulnerability detection 14. Directory listing check Config leak detection ...and many more Installation: $ apt update && apt upgrade $ apt install git $ apt install git $ apt install python2 $ apt install python $ git clone https://github.com/Tuhinshubhra/CMSeeK $ cd CMSeeK $ chmod +x * $ Run :  $ python cmseek.py Here select your option and Use the required option. Zarp-Local Network Tool This tool worls only in rooted phones. This is local network exploitation tool. Instal...

Phishing Tools 240502-A

Weeman Weeman is advanced phishing tool available for termux. Installation : $ apt update && upgrade $ apt install git $ apt install python2 $ git clone https://github.com/evait-security/weeman $ cd weeman $ chmod +x * Usages: $ python2 weeman.py $ set url http://target.com $ set action_url http://target.com $ run  It will provide cradential harvesting platform. Black eye This is one of the most complete Phishing tool in termux. Installation : $ apt update && upgrade $ apt install git $ apt install curl $ git clone https://github.com/An0nUD4Y/blackeye $ cd blackeye $ chmod +x *  Run:-  $ bash blackeye.sh Now, Select your desired option for phishing. SocialFish This is one of the most complete Phishing tool in termux. Installation : $ apt update && upgrade $ apt install git $ apt install curl $ git clone https://github.com/An0nUD4Y/blackeye $ cd blackeye $ chmod +x *  Run:-  $ bash blackeye.sh Now, Select your desired option for phishing. ...

The science of external controls.

The science of external controls THE SCIENCE OF EXTERNAL CONTROLS A - MONITORING (ASSET CONTROL) Every intelligence service since time began has sought methods of owning people and ensuring they stayed loyal. Two of 13 Illuminati families who are known to have developed extremely well-run bloodline intelligence groups are the Li family and the Rothschild family. The Li’s  family started its Chinese intelligence back in 1400 A.D. They had already been an ancient Chinese aristocratic family for many centuries prior to this. Some of their techniques for their agents were state of the art mind control techniques. The Rothschild’s personal spy network and their own mail service was known to be superior to the national european governments during the 19th century. Traditional spycraft has involved the ability to recruit and keep agents loyal. The professional spook manipulates his recruits for a living. He becomes adept at controlling people. For thousands of years, spy operations have h...