Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,150,590 members, 7,809,134 topics. Date: Friday, 26 April 2024 at 12:45 AM

9jaDarkWebLord's Posts

Nairaland Forum / 9jaDarkWebLord's Profile / 9jaDarkWebLord's Posts

(1) (2) (of 2 pages)

Webmasters / How To Get Unlimited Icloud Emails by 9jaDarkWebLord: 3:25pm On Jul 06, 2022
1. Go https://appleid.apple.com/account and create a Apple ID but not using @iCloud.com (For example use Hotmail, Gmail, Yahoo ect. . .)
2. Logout your current apple id and login with the Apple ID (on your iPhone) you had made on the Apple Site.
3. Then you proceed to go (on your iPhone): Settings > Accounts > Press the account you added > Press iCloud > enable “ICloud Mail” > Then they will ask you to make a @iCloud.com email (For this you can put a uncreated email that u want to reset) then boom you can do this unlimited times)

After the steps above you can also do the steps below:

1. You can also add another 3 UN CREATED ICLOUD EMAILS by logging with that @iCloud.com email you made in https://www.icloud.com/mail
2. Now look for a Settings Button > Click Preferences > Accounts
3. Now click Add an Alias and enter the email you want to use in Alias Address: and click add
4. Now you can reset the password and it will send to the “Mail” IOS App! (If the password doesn’t send leave it for a few hrs and ask someone to send it for you, it might be rate limited or apple is struggling to receive it, don't worry you will eventually get it
Webmasters / 11 Best Phishing Tools Of All Time by 9jaDarkWebLord: 2:51pm On Jan 18, 2022
You may have encountered the phishing tools or attacks in the past but you may have been just ignorant towards it. Like, a mail with “Win Free iPhone” tagline, or various pop-ups. There are multiple open-source phishing tools or simply say free phishing tools that you actually have a lot on the plate to compare and choose from. Phishing 3 is a type of social engineering attack that is employed by hackers or third-party unauthorized users to steal user data which mostly includes login credentials and credit card numbers or any other sensitive information.

Phishing tools are the majorly used in hacking for primarily three reasons:
1. Easy to use
2. You can get many Victims.
3. Anybody can use phishing without having prior knowledge of Programming or Scripts.

1) Ghost Phisher- Phishing Tools with GUI


Ghost Phisher is a Wi-fi and Ethernet safety auditing and assault software program written utilizing the Python Programming Language and the Python Qt GUI library, this system is ready to emulate entry factors and deploy.

Ghost Phisher at the moment helps the next options like HTTP Server, Inbuilt RFC 1035, DNS Server, Inbuilt RFC 2131 DHCP Server, Webpage Internet hosting and Credential Logger (Phishing), Wifi Entry-level Emulator, Session Hijacking (Passive and Ethernet Modes), ARP Cache Poisoning (MITM and DOS Assaults), Penetration utilizing Metasploit Bindings, Automated credential logging utilizing SQLite Database and, Replace Assist.

2) SPF (SpeedPhish Framework)- Electronic mail Phishing Software


One other Python program or simply say phishing tool created by Adam Compton. SPF consists of many options that permit you to rapidly configure and carry out efficient phishing assaults, together with an information entry assault vector. Whereas a tech-savvy safety skilled can have lots of enjoyable with SPF and can have the ability to run phishing campaigns towards a number of targets, it’s nonetheless primarily a pen-testing device, with many nice options (akin to e-mail tackle gathering) being of little significance for somebody performing internal phishing tests.

3) Phishing Frenzy- Electronic mail Phishing Framework


Whereas this open-source software is designed as a penetration testing device, it has many options that would make it an efficient answer for inner phishing campaigns. Maybe a very powerful characteristic is the flexibility to view detailed marketing campaign stats and simply save the info to a PDF or an XML file. You’ll be able to most likely guess the “nonetheless” half that’s arising: Phishing Frenzy is a Linux-based software, with setting up to not be dealt with by a rookie.

4) Gophish- Open Supply Phishing Supply


As an open-source phishing platform, Gophish will get it done very sophistically. It’s supported by most working methods, set up is so simple. Just downloading and extracting a ZIP folder, the interface is easy and intuitive, and the options, whereas restricted, are thoughtfully carried out. Customers are simply added, both manually or through bulk CSV importing. Electronic mail templates are simple to create (there aren’t any included although, with a community-supported repository initiated) and modify (utilizing variables permits for straightforward personalization), creating campaigns is a simple course of, and reviews are nice to have a look at and will be exported to CSV format with varied ranges of element. Main drawbacks: no consciousness of training parts and no marketing campaign scheduling choices.

5) sptoolkit Rebirth- Easy Phishing Toolkit


Whereas this answer could lack within the GUI attractiveness division in contrast with a number of the earlier entries, there’s one necessary characteristic that places it in so excessive on our record. Easy Phishing Toolkit gives a chance to mix phishing checks with safety consciousness training, with a characteristic that directs phished customers to a touchdown web page with a consciousness training video. Furthermore, there’s a monitoring characteristic for customers who accomplished the coaching. Sadly, the sptoolkit mission has been deserted again in 2013. A brand new staff is attempting to present it a brand new life, however, as of now, the documentation is scarce and scattered all around the web, making lifelike implementation in an enterprise setting a troublesome job.

6) LUCY Pentesting and Phishing Tools-


The primary industrial product on our record, LUCY gives a hassle-free model of the platform. All you want is your e-mail tackle and title, and you may obtain LUCY as a digital equipment or a Debian set up script. The online interface is engaging (if a bit complicated), and there are many options to discover: LUCY is designed as a social engineering platform that goes past phishing. The attention ingredient is there as nicely with interactive modules and quizzes.

So, why didn’t we place LUCY increased up the record? As a result of we’re speaking about free phishing simulators, and the neighborhood model of LUCY has too many limitations to be successfully utilized in an enterprise setting. Some necessary options aren’t accessible beneath neighborhood license, akin to exporting marketing campaign stats, performing file (attachment) assaults, and, most significantly, marketing campaign scheduling choices. With that, the free model of LUCY offers you a style of what the paid model is able to however doesn’t go a lot farther than that.

7) King Phisher-


With this open-source answer from SecureState, we’re getting into the class of extra refined merchandise in phishing tools. The King Phisher Toolkit is not available on any website but only on Github so make sure you download it from a legit place only. King Phisher’s options are plentiful, together with the flexibility to run a number of campaigns concurrently, geolocation of phished customers, net cloning capabilities, and many others. A separate template repository incorporates templates for each message and server pages. The consumer interface is clear and easy. What will not be that straightforward, nonetheless, is set up and configuration? King Fisher server is just supported on Linux, with further setup and configuration steps required relying on the flavor and present configuration.

cool Social-Engineer Toolkit-


One other device from TrustedSec, which, because the title suggests, was designed for performing varied social engineering assaults. For phishing, SET permits for sending spear-phishing emails in addition to operating mass mailer campaigns, in addition to some extra superior choices, akin to flagging your message with excessive significance and including an inventory of goal emails from a file. SET is Python-based, with no GUI. As a penetration testing device, it is rather efficient. As a phishing simulation answer, it is rather restricted and doesn’t embrace any reporting or marketing campaign administration options.

9) SpearPhisher Beta-


This is one of the many phishing tools which isn’t attempting to deceive anybody (apart from its phishing targets). Developed by TrustedSec, SpearPhisher says all of it proper within the description: “An Easy Phishing Electronic mail Era Software.” With an emphasis on ‘easy.’ Designed for non-technical customers, SpearPhisher is a Home windows-based program with a simple GUI. It means that you can rapidly craft a phishing email with personalized From Electronic mail, From Title, and Topic fields and features a WYSIWYG HTML editor and a possibility to incorporate one attachment. You’ll be able to ship the crafted email to a number of recipients through including email addresses to To, CC, and BCC fields. This system has been in Beta since 2013, so it’s not prone to see any updates within the close to future.

10) Wireshark: Phishing Tools-


Wireshark is the world’s foremost community protocol analyzer. It permits you to see what’s occurring in your community at a microscopic stage. It’s the de facto customary throughout many industries and academic establishments. Wireshark improvement thrives because of the contributions of networking consultants throughout the globe. It’s the continuation of a mission that began in 1998. Wireshark comes with graphical instruments to visualize the statistics.

This makes it simple to identify normal tendencies and to current findings to less-technical administration. Given the big quantity of visitors that crosses a typical enterprise community, Wireshark’s instruments that will help you filter that visitors are what make it particularly helpful. Seize filters will accumulate solely the forms of visitors you are serious about, and show filters will assist you to zoom in on the visitors you need to examine. The community protocol analyzer gives search instruments, together with common expressions and colored highlighting, to make it simple to search out what you are in search of.

11) Metasploit: Phishing Tools-


The Metasploit penetration testing framework has at all times been about discovering methods to use IT, in an effort to enhance the protection. The brand new Metasploit 4.5 launch from safety vendor Rapid7 goes a step additional than its predecessors, providing a brand new phishing engine and up to date exploit modules. The objective of Metasploit’s phishing engine is to allow an enterprise to check all the varied layers of its IT protection. weak configurations and weak passwords can even probably be present in Metasploit itself. Metasploit 4.5 features an Internet Interface Login Utility that can be utilized by a researcher to check the safety of a Metasploit setup.

Conclusion-
As there are lots of Phishing tools in the market considering, their paid and free versions. Offcourse, your selection of phishing tools depends upon the type of usage of the tool. There are lots of applications that require a phishing tool, for example, testing purposes.
Webmasters / [GET] Free Primevideo Account by 9jaDarkWebLord: 4:02pm On Jun 01, 2021
Tools.surf is providing free access to [url]primevideo.com[/url] through their extension.

Here is the premium plan coupon for them.

Steps to get it.
→ Register your account at https://app.tools.surf
→ Confirm your account.
→ Then go to this link https://app.tools.surf/order/60816e019b61b53c40a90cfe?coupon=KYWZSP6YDCLDWKP
→ Click on pay. No payment required.
Webmasters / Re: Get Paid Backconnect Rotating Proxies For Free by 9jaDarkWebLord: 7:06am On Jan 26, 2021
Emeka71:
So simple.
Thanks
Webmasters / Re: Get Paid Backconnect Rotating Proxies For Free by 9jaDarkWebLord: 7:06am On Jan 26, 2021
Miakellz:
How do we earn from this please?

You can use to boost site traffic, YouTube views etc.
Webmasters / Get Paid Backconnect Rotating Proxies For Free by 9jaDarkWebLord: 6:14pm On Jan 25, 2021
1) First Off We Will Go To This Website:- https://cosmoproxy.com/

2) Now Scroll Down, You will See A Box Saying “Free Test”, Click on it

3) After Clicking On It, You Will See A Dialogue Box Appear, Fill in the Details

Email Id - Enter Your Working Email ID ( Don’t Add Yopmail, or temp mail, only ADD Gmail )

Skype ID - Leave The Skype ID Blank

Authorized Ip Address:- Now Go To https://whatismyipaddress.com and check your current IP and fill it there,

(Don’t Use On VPN, Enter True IP not Fake Because It Binds The Proxies With Your IP )

How Did You Find US:- Enter Google

Complete Captcha and Click Get It Now

4) Now You Will Receive An Email From Them Containing The Proxies, and it will be activated in 10 minutes, use after 10 minutes and they are valid for 1 hour.

Repeat this as many times u want you want

1 Like

Webmasters / Whatsapp + Instagram + SMS Bombing | Windows Compatible BOMBER by 9jaDarkWebLord: 10:04pm On Jan 15, 2021
Features
++SMS Bombing
++WhatsApp Bombing
++Instagram Bombing

Compatible with all Linux & Windows (Kali Linux is not compatible)

Before Running bomberthon.py

Windows :
pip install -r requirements.txt

Linux :
pip3 install -r requirements.txt

sudo chmod +x geckodriver

Requirements
++Python 3.x
++Chrome (if you are on windows)
++Firefox (if you are on linux) (pre-installed)
++Selenium
++Requests

Run
Windows :
python bomberthon.py

Linux :
python3 bomberthon.py

Screenshots


Webmasters / [COUPON] Dark Web: Complete Introduction To The Deep/dark Web 2021 | Udemy by 9jaDarkWebLord: 4:47pm On Jan 12, 2021
Webmasters / Give A Mask To Phishing URL by 9jaDarkWebLord: 12:44pm On Jan 12, 2021
MaskPhish is a simple script to hide phishing URL under a normal looking URL.

Legal Disclaimer:
Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Installing (Tested on Kali Linux, Termux & Ubuntu):
git clone https://github.com/jaykali/maskphish
cd maskphish
bash maskphish.sh

1 Like

Webmasters / Re: Unlimited Gmail Accounts Creator. by 9jaDarkWebLord: 8:55pm On Jan 11, 2021
BaEnki:
Nice share, thanks!

However, I realized that accounts created with it won’t be usable with Google related services.

I don’t seems to get any help online(or maybe I’m not searching the right place), it would be hectic creating over 1000 accounts manually.

Ok...

I can share some tools with you that you can use to create...

However, try this Termux step.

How to create unlimited gmail using termux dot trick

Step 1:- Open termux

Step2:- Type pkg install python3

Step3:- git clone https://github.com/bpnrockstar/gmail

Step4:- python3 trick.py
Webmasters / Re: Unlimited Gmail Accounts Creator. by 9jaDarkWebLord: 10:58pm On Jan 10, 2021
BaEnki:
Good morning fellow IMers,

Please which bot(paid or otherwise) would you recommend for multiple gmail accounts creation?

Please I’d like you to recommend the ones you’ve used. I need it for YouTube marketing.

Thanks.

You can use Termux to do that...
Webmasters / How To Change Your IP Address In Less Then 1 Minute by 9jaDarkWebLord: 4:57pm On Jan 09, 2021
1. Click on Start in the bottom left hand corner of screen
2. Click on Run
3. Type in command and hit ok

You should now be at an MSDOS prompt screen.

4. Type ipconfig /release just like that, and hit enter
5. Type exit and leave the prompt
6. Right-click on Network Places or My Network Places on your desktop.
7. Click on “properties”

You should now be on a screen with something titled Local Area Connection, or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on Local Area Connection and click properties
9. Double-click on the Internet Protocol (TCP/IP) from the list under the General tab
10. Click on Use the following IP address under the General tab
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press Tab and it should automatically fill in the Subnet Mask section with default numbers.
13. Hit the Ok button here
14. Hit the Ok button again

You should now be back to the Local Area Connection screen.

15. Right-click back on Local Area Connection and go to properties again.
16. Go back to the TCP/IP settings
17. This time, select Obtain an IP address automatically
18. Hit Ok
19. Hit Ok again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

You can use this trick if you're downloading some resources and you see the message of daily limit reached for IP

(1) (2) (of 2 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 49
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.