😱 Hackers Hack Your Microphone | 👉 நீங்கள் பேசுவதை ஒட்டு கேக்கலாம்| Worked 1000% | தமிழில்

                                               Your Microphone Not Safe..!!



_________________________________________👇_________________________________________


👉Watch This END Don't Skip..!! 👇



 Or 👉Watch On 4K UHDYoutube


_________________________________________________________________________________________________


Tool Info : 👇

[√] Description :

A python phishing script for login phishing, image phishing, video phishing and many more


[+] Installation Method & Cmd

Install primary dependencies (git, python)
  • For Debian (Ubuntu, Kali-Linux, Parrot)
    • sudo apt install git python3 php openssh-client -y
  • For Arch (Manjaro)
    • sudo pacman -S git python3 php openssh --noconfirm
  • For Redhat(Fedora)
    • sudo dnf install git python3 php openssh -y
  • For Termux
    • pkg install git python3 php openssh -y
Clone this repository
  • git clone https://github.com/KasRoudra/MaxPhisher
Enter the directory
  • cd MaxPhisher
Install all modules
  • pip3 install -r files/requirements.txt
Run the tool
  • python3 maxphisher.py

Or, directly run

wget https://raw.githubusercontent.com/KasRoudra/MaxPhisher/main/MaxPhisher.py && python3 maxphisher.py

____________________________________________________________________________________________

Support

OSSupport Level
LinuxExcellent
AndroidExcellent
iPhoneAlpha (Recommended docker)
MacOSAlpha (Recommended docker)
WindowsUnsupported (Use docker/virtual-box/vmware)
BSDNever tested


Features:

  • Multi platform (Supports most linux)
  • 100+ templates
  • Concurrent 4 tunneling (Ngrok, Cloudflared and LocalXpose, LocalHostRun)
  • OTP Support
  • Credentials mailing
  • Easy to use
  • Possible error diagnoser
  • Built-in masking of URL
  • Custom masking of URL
  • URL Shadowing
  • Portable file (Can be run from any directory)
  • Get IP Address and many other details along with login credentials


[!] Disclaimer

This tool is developed for educational purposes. Here it demonstrates how phishing works. If anybody wants to gain unauthorized access to someones social media, he/she may try out this at his/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author is not responsible for any misuse of MaxPhisher!






Post a Comment

Previous Post Next Post