Kali Linux

Nivistealer : Steal Victim Images Exact Location Device Info And Much More

Nivistealer is a tool to Steal Victim Images Exact Location Device Info And Much More.

Features

  • Steal Victim Ip
  • Steal Device Info
  • Steal Network and Battery Info
  • Uses Device Gps to steal exact location
  • Steal pic from front camera
  • Steal text from victim clipboard (added recently)
  • Send logs to discord also save them locally in a txt file
  • Works on android, windows,linux,mac os
  • Uses iframe to load live website to make phishing attack more reliable

How to use?

Method 0

  • Click the above button or click here to run on repl.it
  • Login/Signup on repl.it
  • After it clones the repo edit this line with your repl url
  • Now click Run

Method 1 

  • Clone or Download this repo
  • Create a account on any webhosting site that provide ssl . I suggest a free webhosting site called 000webhost.com
  • Now upload index.html,sunni.php,post.php on your webhosting site
  • Now open index.html and replace this with your discord webhook url
  • Boom !!! . Now send the phishing link to your victim . Logs will be send to your discord webhook and also saved to sensitiveinfo.txt file

Method 2

  • Clone the repo and navigate to python_flask directory
  • open your terminal and type pip3 install colorama pip3 install flask
  • Now edit this line with your url
  • Now type python nivistealer.py Boom !!!
  • Images and log file will be saved locally on your directory

Donate

  • BTC

bc1q37nqagapyt7nnu38p4pqu4hq2xgmumwklzn24l

  • ETH

0xF3eBc9bA1bCD30C3efbAd298A73663691F4DB803

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

8 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

8 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

8 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

8 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

8 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

11 hours ago