Know who your victims are, where they lives, device they used and language they understand, by using our increadible hacking tool named HUNTER
!
Hunter!, a social engineering tool that similate phishing attack, it focus on gathering information by hacking and maniplating victims to makes them reveals much more of their information to attacker,
With Hunter, you can easily know much about your victims, and plan a successful feature attack, examples.
- See if their browser is vulnerable to other cyber attacks
- Used our
word-gen
to generate a list of password based on victims information
- Hunter detect the date and time victims visit our malicious link
- Hunter force victims to reveals their full names to attacker
- Hunter display victims full name and their device ip address
- Hunter force victims to enable access to camera and GPS location
- Hunter hack victims front camera, takes several pic, send them to attacker
- Hunter uses geo to convert victims exact location into home address
- Hunter used google map to mapped victims exact location
- Hunter track down victims movement in our malicious website
- Hunter report any error concerning accessing camera and GPS location
Tips: If Hunter report accessing GPS location error, then use
geo-phone
orip-info-fetcher
to mapped victims approximately location based on their phone number or ip address, recommended to usedgeo-phone
.
- Termux
- Kali Linux
- php.
- ssh.
- bash.
git clone https://github.com/evilfeonix/HUNTER.git
cd HUNTER
sed -i 's/\r$//' hunter.sh
chmod u+x hunter.sh
./hunter.sh
- Applicant Form: allows victims to enter their personal information
- Festival Wishing: wish victims a festival day and grab their personal information
- Live Youtube Video: use youtube video to foolish victims and grab their information
- Custom Social Platform: pretend to be a lagitimate platform and grab their information
Important: If you select
Festival Wishing
template, we will ask you to enter "festival name", if the festival name include space (eg."New Year"), then replace it with underscore (eg."New_Year"), if not, the script will produce an error.
- Localhost: malicious link can only be active in local machine (use it to exprienced how this tool works).
- Serveo.net: use this to make the malicious link accessible around the world.
- LocalTunnel: use this to make the malicious link accessible around the world (npm is required).
- Localhost.run: use this to make the malicious link accessible around the world.
- Browser information: name, version, language, appName, appCodeName, cookieEnable
- Device information: name, version, model, platform, architecture, date & time in full format, Number of CPU Cores
- Personal information: fullname, age, gender, phone number, email address, state, LGA, home address, national ID number, occupation
- Location Information: city, region, country, timezone, latitude, longitude, exact address and map location
- And other information that can not be listed here.
- By following us on github and other of our platforms
- By subscribing to our youtube channels
- By donating, funding our bank account
- By giving our program a star
- By forking this our program
Please shire this tool in order platforms.
we also provide a youtube video tutorial that cover buth installation and usage of this tool.
click the link below to watch the complete tutorial link here
, and also dont forget to subscribing to our youtube channels.
Thanks for your supports, Happy Hacking!
Happy Hunting Victims Informations
🚀🚀🚀!.