Kali Linux

Nivistealer : Steal Victim Images Exact Location Device Info And Much More

Nivistealer is a tool to Steal Victim Images Exact Location Device Info And Much More.

Features

  • Steal Victim Ip
  • Steal Device Info
  • Steal Network and Battery Info
  • Uses Device Gps to steal exact location
  • Steal pic from front camera
  • Steal text from victim clipboard (added recently)
  • Send logs to discord also save them locally in a txt file
  • Works on android, windows,linux,mac os
  • Uses iframe to load live website to make phishing attack more reliable

How to use?

Method 0

  • Click the above button or click here to run on repl.it
  • Login/Signup on repl.it
  • After it clones the repo edit this line with your repl url
  • Now click Run

Method 1 

  • Clone or Download this repo
  • Create a account on any webhosting site that provide ssl . I suggest a free webhosting site called 000webhost.com
  • Now upload index.html,sunni.php,post.php on your webhosting site
  • Now open index.html and replace this with your discord webhook url
  • Boom !!! . Now send the phishing link to your victim . Logs will be send to your discord webhook and also saved to sensitiveinfo.txt file

Method 2

  • Clone the repo and navigate to python_flask directory
  • open your terminal and type pip3 install colorama pip3 install flask
  • Now edit this line with your url
  • Now type python nivistealer.py Boom !!!
  • Images and log file will be saved locally on your directory

Donate

  • BTC

bc1q37nqagapyt7nnu38p4pqu4hq2xgmumwklzn24l

  • ETH

0xF3eBc9bA1bCD30C3efbAd298A73663691F4DB803

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago