An app to remote control SocialFish. This app is an open-source project to remote control the application, it does not work independently.
Also Read – PFQ : Functional Network Framework for Multi-Core Architectures
Setting Up
Fernando H. E. Bellincanta edited this page 16 hours ago · 8 revisions
PREREQUISITES
Python 3.6 or >
pip3
PYTHON 3 PREREQUISITES
CLONE
$ git clone https://github.com/UndeadSec/SocialFish.git
SETUP PYTHON3 & PIP3
$ sudo apt-get install python3 python3-pip python3-dev -y
SETUP PYTHON3 REQUIREMENTS
$ cd SocialFish
$ python3 -m pip install -r requirements.txt
CHANGE APP SECRET KEY
File: SocialFish/core/config.py
APP_SECRET_KEY = ”
Usage
RUN SF AND SET YOUR WEB LOGIN
$ cd SocialFish
$ python3 SocialFish.py youruser yourpassword
DISCLAIMER
TO BE USED FOR EDUCATIONAL PURPOSES ONLY
The use of the it is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.
“DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.” Taken from LICENSE.
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…