Kali Linux

Nivistealer : Steal Victim Images Exact Location Device Info And Much More

Nivistealer is a tool to Steal Victim Images Exact Location Device Info And Much More.

Features

  • Steal Victim Ip
  • Steal Device Info
  • Steal Network and Battery Info
  • Uses Device Gps to steal exact location
  • Steal pic from front camera
  • Steal text from victim clipboard (added recently)
  • Send logs to discord also save them locally in a txt file
  • Works on android, windows,linux,mac os
  • Uses iframe to load live website to make phishing attack more reliable

How to use?

Method 0

  • Click the above button or click here to run on repl.it
  • Login/Signup on repl.it
  • After it clones the repo edit this line with your repl url
  • Now click Run

Method 1 

  • Clone or Download this repo
  • Create a account on any webhosting site that provide ssl . I suggest a free webhosting site called 000webhost.com
  • Now upload index.html,sunni.php,post.php on your webhosting site
  • Now open index.html and replace this with your discord webhook url
  • Boom !!! . Now send the phishing link to your victim . Logs will be send to your discord webhook and also saved to sensitiveinfo.txt file

Method 2

  • Clone the repo and navigate to python_flask directory
  • open your terminal and type pip3 install colorama pip3 install flask
  • Now edit this line with your url
  • Now type python nivistealer.py Boom !!!
  • Images and log file will be saved locally on your directory

Donate

  • BTC

bc1q37nqagapyt7nnu38p4pqu4hq2xgmumwklzn24l

  • ETH

0xF3eBc9bA1bCD30C3efbAd298A73663691F4DB803

R K

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

4 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

6 days ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

6 days ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

1 week ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

1 week ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago