Storm-Breaker
Locator
Storm-Breaker | Locator | |
---|---|---|
5 | 1 | |
2,928 | 41 | |
2.4% | - | |
4.9 | 0.0 | |
about 2 months ago | about 3 years ago | |
HTML | CSS | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Storm-Breaker
-
Isn't every device obsolete if Storm-Breaker exists?
Storm-Breaker is a tool that let's the user see device information by making the victim enter a site. No permissions required. To me this is absolutely worrying and arises one question: if it needs no permissions, doesn't it completely bypass all security models? Think about it. We are fighting against tracking, fingerprinting and access to our data. And then, this site proves it's possible to bypass all that.
- Storm-Breaker: Herramienta de ingeniería social con Ngrok 🏹
-
I need desperate help with the Git Clone command!
sudo git clone https://github.com/ultrasecurity/Storm-Breaker.git
-
Shadow breaker aracını kullanarak Tek link ile hedef telefonun kamerasını/mikrofonunu/konumunu ele geçirme (Kurulum kodları yorumlarda)
$ git clone https://github.com/ultrasecurity/Storm-Breaker$ cd Storm-Breaker$ sudo bash linux-installer.sh$ python3 -m pip install -r requirments.txt$ sudo python3 Storm-Breaker.py
- Storm-Breaker: Herramienta de ingeniería social con Ngrok 🧙♂️
Locator
What are some alternatives?
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
seeker - Accurately Locate Smartphones using Social Engineering
fbspider - Scraping Facebook information
termux-desktop - Setup A Beautiful Desktop/GUI In Termux
URL-obfuscator - Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
WARP-UNLIMITED-ADVANCED - Get unlimited amount of data in Cloudflare's WARP VPN🔥
PuttyorMalware - Using bitsadmin to download our malware and to bypass defender
longtongue - Customized Password/Passphrase List inputting Target Info
Blooket-Cheats - The best Blooket Hacks made by someone who actually knows what they're doing