Skip to content

Know who your victims are by obtaining their browsers, devices, and personal informations, alone with their exact location and some of their active photos

License

Notifications You must be signed in to change notification settings

evilfeonix/HUNTER

Repository files navigation

02

Geo-Phone

  

Know who your victims are, where they lives, device they used and language they understand, by using our increadible hacking tool named HUNTER!

Hunter!, a social engineering tool that similate phishing attack, it focus on gathering information by hacking and maniplating victims to makes them reveals much more of their information to attacker,

With Hunter, you can easily know much about your victims, and plan a successful feature attack, examples.

  • See if their browser is vulnerable to other cyber attacks
  • Used our word-gen to generate a list of password based on victims information

Features:

  1. Hunter detect the date and time victims visit our malicious link
  2. Hunter force victims to reveals their full names to attacker
  3. Hunter display victims full name and their device ip address
  4. Hunter force victims to enable access to camera and GPS location
  5. Hunter hack victims front camera, takes several pic, send them to attacker
  6. Hunter uses geo to convert victims exact location into home address
  7. Hunter used google map to mapped victims exact location
  8. Hunter track down victims movement in our malicious website
  9. Hunter report any error concerning accessing camera and GPS location

Tips: If Hunter report accessing GPS location error, then use geo-phone or ip-info-fetcher to mapped victims approximately location based on their phone number or ip address, recommended to used geo-phone.

OS used:

  • Termux
  • Kali Linux

Requeirments:

  1. php.
  2. ssh.
  3. bash.

Installation and usage:

git clone https://github.com/evilfeonix/HUNTER.git
cd HUNTER
sed -i 's/\r$//' hunter.sh
chmod u+x hunter.sh
./hunter.sh

Template served by Hunter:

  1. Applicant Form: allows victims to enter their personal information
  2. Festival Wishing: wish victims a festival day and grab their personal information
  3. Live Youtube Video: use youtube video to foolish victims and grab their information
  4. Custom Social Platform: pretend to be a lagitimate platform and grab their information

Important: If you select Festival Wishing template, we will ask you to enter "festival name", if the festival name include space (eg."New Year"), then replace it with underscore (eg."New_Year"), if not, the script will produce an error.

Tunnel server served by Hunter:

  1. Localhost: malicious link can only be active in local machine (use it to exprienced how this tool works).
  2. Serveo.net: use this to make the malicious link accessible around the world.
  3. LocalTunnel: use this to make the malicious link accessible around the world (npm is required).
  4. Localhost.run: use this to make the malicious link accessible around the world.

Information hunted by this tool in summary:

  • Browser information: name, version, language, appName, appCodeName, cookieEnable
  • Device information: name, version, model, platform, architecture, date & time in full format, Number of CPU Cores
  • Personal information: fullname, age, gender, phone number, email address, state, LGA, home address, national ID number, occupation
  • Location Information: city, region, country, timezone, latitude, longitude, exact address and map location
  • And other information that can not be listed here.

Support and encourage us:

  • By following us on github and other of our platforms
  • By subscribing to our youtube channels
  • By donating, funding our bank account
  • By giving our program a star
  • By forking this our program

Please shire this tool in order platforms.

Tutorial:

we also provide a youtube video tutorial that cover buth installation and usage of this tool.
click the link below to watch the complete tutorial link here, and also dont forget to subscribing to our youtube channels.

Thanks for your supports, Happy Hacking!
Happy Hunting Victims Informations
🚀🚀🚀!.

About

Know who your victims are by obtaining their browsers, devices, and personal informations, alone with their exact location and some of their active photos

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published