Skip to content
This repository has been archived by the owner on Feb 9, 2024. It is now read-only.

NullPulse/SocialMediaHackingToolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

NOTE -> not maintained!!!

click here if you want to ask something.


 ________  ___ _   _ 
/  ___|  \/  || | | |
\ `--.| .  . || |_| |
 `--. \ |\/| ||  _  |
/\__/ / |  | || | | |
\____/\_|  |_/\_| |_/
   
Social Media Hacking Toolkit
  

perform different types of attacks on many social media

please read at least the section regarding trustability


Disclaimer

The SocialMediaHackingToolkit on GitHub is for educational purposes only. I take no responsibility for its usage by third parties, and any illegal activities are strictly prohibited. Users must comply with security and privacy policies of social media platforms and obtain proper authorization. The toolkit may contain potentially harmful materials. Use at your own risk, adhering to relevant laws and regulations.

tested on Yes No
Ubuntu X
Arch X
Void X
Debian X
Kali X
Windows 7 X
Windows 11 X
Termux X

Installation

this section explains how to install and run the tool on:
ubuntu, arch, void, kali, windows 10+


first of all if you are on linux create an account here

Ubuntu / Debian

git clone https://github.com/NullPulse/SocialMediaHackingToolkit

cd SocialMediaHackingToolkit

cd dependencies

sudo dpkg -i windscribe-cli.deb

windscirbe login 

cd ../cmd

pip3 install -r requirements.txt

cd ..

chmod +x linux.sh

./linux.sh

Arch

git clone https://github.com/NullPulse/SocialMediaHackingToolkit

cd SocialMediaHackingToolkit

yay install windscribe-cli

systemctl start windscribe-cli

windscribe login

cd ../cmd

pip3 install -r requirements.txt

cd ..

chmod +x linux.sh

./linux.sh

Void

git clone https://github.com/NullPulse/SocialMediaHackingToolkit

cd SocialMediaHackingToolkit

cd dependencies

sudo dpkg -i windscribe-cli

xbps-rindex -a windscribe-cli.xbps

windscirbe login 

cd ../cmd

pip3 install -r requirements.txt && cd..

chmod +x linux.sh

./linux.sh

Kali Linux

git clone https://github.com/NullPulse/SocialMediaHackingToolkit

cd SocialMediaHackingToolkit

cd dependencies

sudo dpkg -i windscribe-cli.deb

windscirbe login 

cd ../cmd

pip3 install -r requirements.txt

cd ..

chmod +x linux.sh

./linux.sh

Termux

git clone https://github.com/NullPulse/SocialMediaHackingToolkit

cd SocialMediaHackingToolkit

cd cmd

pip3 install -r requirements.txt

cd ..

chmod +x linux.sh

./linux.sh

Windows

# download zip file of the repository

# extract zip file and open terminal into "SocialMediaHacking" folder

cd cmd

pip install -r requirements.txt

cd ..

start windows.bat

Technical Description

this section explains how the different functionalities of the program work and provides an analysis of their operations.


Mass report

To achieve the mass reporting functionality, the program utilizes the report_headers dictionary. These headers are essential for making HTTP requests and providing necessary information to the server. Here is the used headers:

"Accept": "*/*",
"Accept-Encoding": "gzip, deflate",
"Accept-Language": "tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3",
"Cache-Control": "no-cache",
"Connection": "keep-alive",
"Content-Type": "application/x-www-form-urlencoded",
"DNT": "1",
"Host": "help.instagram.com",
"Origin": "help.instagram.com",
"Pragma": "no-cache",
"Referer": "https://help.instagram.com/contact/497253480400030",
"TE": "Trailers",

These headers are included in the HTTP request to ensure proper communication and provide necessary details to the Instagram Help Center API.

The program's code interacts with the Instagram Help Center's contact form API by sending a POST request to the specified URL.

Brute force

The insta_bruteforce function performs a brute force attack on an Instagram account using a provided username and a wordlist of passwords. Here's an overview of how it works:

  1. The function takes three parameters: username (target Instagram account), wordlist (filename of the password wordlist), and vpn (VPN usage flag).

  2. It reads the wordlist file and stores the passwords in memory.

  3. For each password in the wordlist, the function performs the following steps:

    • Sends a POST request to the Instagram login API with the provided username and password.
    • If the response indicates a successful login, it displays the password and terminates the program.
    • If the login attempt fails, it moves on to the next password.
  4. If an exception occurs during the process (e.g., network error), it moves on to the next password.

  5. If the VPN flag is set to True, it attempts to change the IP address.

2nd method, currently in use

  try:
    L.login(USER, PASSWORD)
    return 1
  except Exception as e:
    if "Checkpoint" in str(e):
      return 1
    elif "incorrect" in str(e):
      return 0
    elif "blocked" in str(e):
      return 0
    else:
      return 0

This function checks if the password is exact, if verification is requested then the password is exact but the user uses two-factor verification, on the other hand if verification is not requested the password is exact


Errors

this section discusses common errors that can occur in the program and explores their underlying causes.

  • Error 0x00: Letter Instead of Numeric Value

    This error occurs when a letter is mistakenly inserted instead of a required numerical value. It commonly happens due to user input or data processing issues where a non-numeric character is provided instead of a valid numeric value.

  • Error 0x01: Number Out of Range

    Error 0x01 is triggered when a number outside the expected range is entered within a specific determinant or range. This error is usually caused by user input or a miscalculation resulting in a value that exceeds the allowed range.

  • Error 0x02: Incorrect Number in Determinant or Range

    The occurrence of error 0x02 indicates that a number outside the designated determinant or range has been entered. This error typically occurs when a number is provided that falls outside the expected boundaries, and it can be caused by user input or an error in calculations.

  • Error 0x03: VPN Usage on Windows

    Error 0x03 is encountered when attempting to use a VPN on a Windows system. This error suggests compatibility issues or incorrect configuration while trying to establish a VPN connection on the Windows operating system.


Trustability

you can verify that the program works by testing it on your profile, open the wordlist and put your profile password in the first place, then start the program and enter your instagram profile nuckname and you will see that the password will come out as correct.

active features Bruteforce Mass report Phishing
Instagram X X
Facebook X
Gmail X
Twitter X X



Issues and Suggestions

If you have encountered an issue with SocialMediaHackingToolkit or would like to suggest an improvement, please report it in our Issues section.
Please provide as much detail as possible about the issue or suggestion so that we can resolve or implement it as soon as possible.
Thank you for your contribution!


Star History

Star History Chart