HiddenEyeReborn is my their try on doing multi-featured tool for human mistakes exploitation. Currently, HE: RE
has mainly phishing features. But we are planning on adding more, you can follow development progress by looking at (REMIND ME TO DO ROADMAP) or Projects Tab on GitHub.
Installation
HE: RE
is available on PyPI and can be installed using pip:
pip install hiddeneye-reborn
That’s all it takes! HE: RE is now available as a terminal command or as a package to your projects.
Basic Usage
to be written
Documentation
to be written https://hiddeneye-reborn.readthedocs.io
FAQ
HiddenEye
is no longer maintained?Disclaimer
The use of the HiddenEye: Reborn
and/or its resources is complete responsibility of the end-user. Developers assume no liabiity and are not responsible for any misuse or damage caused by HiddenEye: Reborn
. Some of your actions may be illegal and you can not use this software to test someone without written permission from person or company.
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…
While file extensions in Linux are optional and often misleading, the file command helps decode what a…
The touch command is one of the quickest ways to create new empty files or update timestamps…
Handling large numbers of files is routine for Linux users, and that’s where the find command shines.…
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy…
Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make…