Kali Linux

Nivistealer : Steal Victim Images Exact Location Device Info And Much More

Nivistealer is a tool to Steal Victim Images Exact Location Device Info And Much More.

Features

  • Steal Victim Ip
  • Steal Device Info
  • Steal Network and Battery Info
  • Uses Device Gps to steal exact location
  • Steal pic from front camera
  • Steal text from victim clipboard (added recently)
  • Send logs to discord also save them locally in a txt file
  • Works on android, windows,linux,mac os
  • Uses iframe to load live website to make phishing attack more reliable

How to use?

Method 0

  • Click the above button or click here to run on repl.it
  • Login/Signup on repl.it
  • After it clones the repo edit this line with your repl url
  • Now click Run

Method 1 

  • Clone or Download this repo
  • Create a account on any webhosting site that provide ssl . I suggest a free webhosting site called 000webhost.com
  • Now upload index.html,sunni.php,post.php on your webhosting site
  • Now open index.html and replace this with your discord webhook url
  • Boom !!! . Now send the phishing link to your victim . Logs will be send to your discord webhook and also saved to sensitiveinfo.txt file

Method 2

  • Clone the repo and navigate to python_flask directory
  • open your terminal and type pip3 install colorama pip3 install flask
  • Now edit this line with your url
  • Now type python nivistealer.py Boom !!!
  • Images and log file will be saved locally on your directory

Donate

  • BTC

bc1q37nqagapyt7nnu38p4pqu4hq2xgmumwklzn24l

  • ETH

0xF3eBc9bA1bCD30C3efbAd298A73663691F4DB803

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

5 hours ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

4 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

4 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

4 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

5 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

1 week ago