Skip to content

dedsec1121fk/DedSec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DedSec Tools: Unlock the Power of Cybersecurity and Development

Overview

Welcome to DedSec’s suite of tools, crafted for developers, cybersecurity enthusiasts, and anyone looking to streamline their workflows. Whether it's real-time communication, personalized terminal environments, or cybersecurity education, DedSec's tools have you covered. Here's what each tool offers:


1. DedSec Chat: Real-Time Communication for Teams

DedSec Chat is a Flask-based, real-time web communication tool designed for small teams and classrooms. It includes:

  • Automatic nickname generation.
  • Support for up to 8 users.
  • Theme customization for a personalized experience.

Why you need it: Ideal for fast, secure, and engaging communication in small teams or educational settings.


2. Fox Chat: Versatile Communication Solution

Fox Chat is designed for larger teams or more robust performance, offering:

  • Support for concurrent users beyond the 8-user limit.
  • Integration with advanced frameworks for enhanced scalability.
  • Real-time message delivery with a reliable backend.

Why you need it: Perfect for organizations needing a scalable and reliable communication platform.


3. Back Camera: Precision Monitoring Tool

Back Camera provides remote access to the back camera of a device. Features include:

  • Real-time photo capture via HTTP requests.
  • Serveo tunneling support for easy remote access.
  • Automatic image saving for later review.

Why you need it: Ideal for remote monitoring, security audits, or projects requiring automated back-camera capture.


4. Front Camera: Interactive Engagement Tool

Front Camera enables remote activation of a device’s front camera. Key features include:

  • Remote front camera activation via HTTP requests.
  • IP logging for access tracking.
  • Secure integration with a web interface.

Why you need it: Best for interactive sessions, video experiments, or facial data collection projects.


5. Sound Recording: Remote Audio Capture

Sound Recording captures audio remotely from a target device. Features include:

  • Start and stop recording commands via HTTP requests.
  • Save recordings in compressed audio formats for efficient storage.
  • Remote access capabilities via Serveo tunneling.

Why you need it: Great for conducting interviews, creating voice logs, or experimenting with sound data.


6. Gallery: Remote Media Management

Gallery allows secure access to a device's stored media. Key features include:

  • Remote browsing of images and videos.
  • Media retrieval and downloading options.
  • Advanced filtering based on file type or date.

Why you need it: Perfect for media recovery, forensic analysis, or remote data access scenarios.


7. Location: Real-Time Geolocation Tracker

Location is a web-based tool for capturing and logging device geolocation data in real time. It includes:

  • Integration with GPS and IP-based geolocation to collect detailed location data.
  • Automatic reverse geocoding to convert coordinates into readable addresses.
  • Remote logging and secure storage of geolocation data in JSON format.
  • Serveo tunneling for remote access to the location service.

Why you need it: Perfect for developers and educators requiring detailed geolocation tracking and logging, with applications in cybersecurity, analytics, and remote monitoring.


8. Donation Phishing: Cybersecurity Education Tool

Donation Phishing simulates phishing attacks for educational purposes. It includes:

  • A secure web form interface to collect simulated user data.
  • Serveo tunneling support for remote demonstrations.
  • Logging of submitted data for analysis and education.

Why you need it: Essential for cybersecurity educators teaching phishing tactics.


9. DedSec Database: Simplified File Management

DedSec Database is a web-based file management tool offering:

  • Secure file upload, download, listing, and deletion.
  • Remote access through Serveo or other tunneling tools.
  • Simplified user interface for managing files from any browser.

Why you need it: Perfect for securely managing files in educational or development environments.


10. OSINTDS: Automated Open-Source Intelligence

OSINTDS automates open-source intelligence (OSINT) tasks, including:

  • Collecting emails, phone numbers, and social media profiles.
  • Cross-platform intelligence gathering using APIs and scraping.
  • Validation and deduplication of collected data.

Why you need it: Saves time in cybersecurity investigations by automating tedious OSINT tasks.


11. T-Login: Secure Authentication for Termux

T-Login secures your Termux environment with:

  • Username and password authentication using SHA-256 hashing.
  • Automation of login script creation.
  • Improved security for sensitive terminal environments.

Why you need it: A must-have for securing Termux setups.


12. Customization: Personalize Your Termux Terminal

Customization enhances your Termux experience by:

  • Updating .bashrc and PS1 prompt.
  • Adding ASCII art or custom messages to the MOTD.
  • Logging errors for troubleshooting.

Why you need it: Great for creating a unique and functional Termux experience.


13. NAIOVUM: Automated Neovim Setup for Termux

NAIOVUM simplifies Neovim setup in Termux, including:

  • Installing plugins and configurations automatically.
  • Adding Python support for developers.
  • Ensuring proper setup of all dependencies.

Why you need it: Simplifies the often-complicated process of setting up Neovim in Termux.


Conclusion

DedSec’s tools offer something for everyone, enhancing productivity, security, and customization in your workflows. These tools are essential for developers, cybersecurity enthusiasts, and anyone looking to streamline their setup.

Disclaimer

These tools are intended for ethical hacking and educational purposes only. They should not be used for unauthorized surveillance, accessing, or storing personal information without explicit consent. Users must ensure they have proper authorization before using these tools in any environment. The developers are not responsible for any misuse or illegal activity conducted with the software.

By using these tools, you acknowledge understanding and agreement with this disclaimer, accepting full responsibility for your actions.

About

Read the text below to see all programs descriptions.

Resources

License

Stars

Watchers

Forks

Languages