This repository is no longer maintained. The last update was in 2020, and there are no plans for future updates or support. The content here is provided "as-is" without any guarantees.
For any questions, please join the discord server or contact rdWei.
I'll only respond to those proposals that are a good match for my schedule and interests, thank you.
________ ___ _ _ / ___| \/ || | | | \ `--.| . . || |_| | `--. \ |\/| || _ | /\__/ / | | || | | | \____/\_| |_/\_| |_/ β Social Media Hacking Toolkit
perform different types of attacks on many social media
please read at least the section regarding trustability
The SocialMediaHackingToolkit on GitHub is for educational purposes only. I take no responsibility for its usage by third parties, and any illegal activities are strictly prohibited. Users must comply with security and privacy policies of social media platforms and obtain proper authorization. The toolkit may contain potentially harmful materials. Use at your own risk, adhering to relevant laws and regulations.
tested on | Yes | No |
---|---|---|
Ubuntu | X | |
Arch | X | |
Void | X | |
Debian | X | |
Kali | X | |
Windows 7 | X | |
Windows 11 | X | |
Termux | X |
first of all if you are on linux create an account here
git clone https://github.com/rdWei/SocialMediaHackingToolkit
cd SocialMediaHackingToolkit
cd dependencies
sudo dpkg -i windscribe-cli.deb
windscirbe login
cd ../cmd
pip3 install -r requirements.txt
cd ..
chmod +x linux.sh
./linux.sh
git clone https://github.com/rdWei/SocialMediaHackingToolkit
cd SocialMediaHackingToolkit
yay install windscribe-cli
systemctl start windscribe-cli
windscribe login
cd ../cmd
pip3 install -r requirements.txt
cd ..
chmod +x linux.sh
./linux.sh
git clone https://github.com/rdWei/SocialMediaHackingToolkit
cd SocialMediaHackingToolkit
cd dependencies
sudo dpkg -i windscribe-cli
xbps-rindex -a windscribe-cli.xbps
windscirbe login
cd ../cmd
pip3 install -r requirements.txt && cd..
chmod +x linux.sh
./linux.sh
git clone https://github.com/rdWei/SocialMediaHackingToolkit
cd SocialMediaHackingToolkit
cd dependencies
sudo dpkg -i windscribe-cli.deb
windscirbe login
cd ../cmd
pip3 install -r requirements.txt
cd ..
chmod +x linux.sh
./linux.sh
git clone https://github.com/rdWei/SocialMediaHackingToolkit
cd SocialMediaHackingToolkit
cd cmd
pip3 install -r requirements.txt
cd ..
chmod +x linux.sh
./linux.sh
# download zip file of the repository
# extract zip file and open terminal into "SocialMediaHacking" folder
cd cmd
pip install -r requirements.txt
cd ..
start windows.bat
this section explains how the different functionalities of the program work and provides an analysis of their operations.
To achieve the mass reporting functionality, the program utilizes the report_headers dictionary. These headers are essential for making HTTP requests and providing necessary information to the server. Here is the used headers:
"Accept": "*/*",
"Accept-Encoding": "gzip, deflate",
"Accept-Language": "tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3",
"Cache-Control": "no-cache",
"Connection": "keep-alive",
"Content-Type": "application/x-www-form-urlencoded",
"DNT": "1",
"Host": "help.instagram.com",
"Origin": "help.instagram.com",
"Pragma": "no-cache",
"Referer": "https://help.instagram.com/contact/497253480400030",
"TE": "Trailers",
These headers are included in the HTTP request to ensure proper communication and provide necessary details to the Instagram Help Center API.
The program's code interacts with the Instagram Help Center's contact form API by sending a POST request to the specified URL.
The insta_bruteforce function performs a brute force attack on an Instagram account using a provided username and a wordlist of passwords. Here's an overview of how it works:
-
The function takes three parameters: username (target Instagram account), wordlist (filename of the password wordlist), and vpn (VPN usage flag).
-
It reads the wordlist file and stores the passwords in memory.
-
For each password in the wordlist, the function performs the following steps:
- Sends a POST request to the Instagram login API with the provided username and password.
- If the response indicates a successful login, it displays the password and terminates the program.
- If the login attempt fails, it moves on to the next password.
-
If an exception occurs during the process (e.g., network error), it moves on to the next password.
-
If the VPN flag is set to True, it attempts to change the IP address.
try:
L.login(USER, PASSWORD)
return 1
except Exception as e:
if "Checkpoint" in str(e):
return 1
elif "incorrect" in str(e):
return 0
elif "blocked" in str(e):
return 0
else:
return 0
This function checks if the password is exact, if verification is requested then the password is exact but the user uses two-factor verification, on the other hand if verification is not requested the password is exact
this section discusses common errors that can occur in the program and explores their underlying causes.
-
Error 0x00: Letter Instead of Numeric Value
This error occurs when a letter is mistakenly inserted instead of a required numerical value. It commonly happens due to user input or data processing issues where a non-numeric character is provided instead of a valid numeric value.
-
Error 0x01: Number Out of Range
Error 0x01 is triggered when a number outside the expected range is entered within a specific determinant or range. This error is usually caused by user input or a miscalculation resulting in a value that exceeds the allowed range.
-
Error 0x02: Incorrect Number in Determinant or Range
The occurrence of error 0x02 indicates that a number outside the designated determinant or range has been entered. This error typically occurs when a number is provided that falls outside the expected boundaries, and it can be caused by user input or an error in calculations.
-
Error 0x03: VPN Usage on Windows
Error 0x03 is encountered when attempting to use a VPN on a Windows system. This error suggests compatibility issues or incorrect configuration while trying to establish a VPN connection on the Windows operating system.
you can verify that the program works by testing it on your profile, open the wordlist and put your profile password in the first place, then start the program and enter your instagram profile nuckname and you will see that the password will come out as correct.
active features | Bruteforce | Mass report | Phishing |
---|---|---|---|
X | X | ||
X | |||
Gmail | X | ||
X | X |
If you have encountered an issue with SocialMediaHackingToolkit or would like to suggest an improvement, please report it in our Issues section.
Please provide as much detail as possible about the issue or suggestion so that we can resolve or implement it as soon as possible.
Thank you for your contribution!