Skip to content

dedsec1121fk/DedSec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DedSec Tools: Unlock the Power of Cybersecurity and Development

Overview

Welcome to DedSec’s suite of tools, crafted for developers, cybersecurity enthusiasts, and anyone looking to streamline their workflows. Whether it's real-time communication, personalized terminal environments, or cybersecurity education, DedSec's tools have you covered. Here's what each tool offers:


1. DedSec Chat: Real-Time Communication for Teams

DedSec Chat is a Flask-based, real-time web communication tool designed for small teams and classrooms. It includes:

  • Automatic nickname generation.
  • Support for up to 8 users.
  • Theme customization for a personalized experience.

Why you need it: Ideal for fast, secure, and engaging communication in small teams or educational settings.


2. Fox Chat: Versatile Communication Solution

Fox Chat is designed for larger teams or more robust performance, offering:

  • Support for concurrent users beyond the 8-user limit.
  • Integration with advanced frameworks for enhanced scalability.
  • Real-time message delivery with a reliable backend.

Why you need it: Perfect for organizations needing a scalable and reliable communication platform.


3. Back Camera: Precision Monitoring Tool

Back Camera provides remote access to the back camera of a device. Features include:

  • Real-time photo capture via HTTP requests.
  • Serveo tunneling support for easy remote access.
  • Automatic image saving for later review.

Why you need it: Ideal for remote monitoring, security audits, or projects requiring automated back-camera capture.


4. Front Camera: Interactive Engagement Tool

Front Camera enables remote activation of a device’s front camera. Key features include:

  • Remote front camera activation via HTTP requests.
  • IP logging for access tracking.
  • Secure integration with a web interface.

Why you need it: Best for interactive sessions, video experiments, or facial data collection projects.


5. Sound Recording: Remote Audio Capture

Sound Recording captures audio remotely from a target device. Features include:

  • Start and stop recording commands via HTTP requests.
  • Save recordings in compressed audio formats for efficient storage.
  • Remote access capabilities via Serveo tunneling.

Why you need it: Great for conducting interviews, creating voice logs, or experimenting with sound data.


6. Location: Real-Time Geolocation Tracker

Location is a web-based tool for capturing and logging device geolocation data in real time. It includes:

  • Integration with GPS and IP-based geolocation to collect detailed location data.
  • Automatic reverse geocoding to convert coordinates into readable addresses.
  • Remote logging and secure storage of geolocation data in JSON format.
  • Serveo tunneling for remote access to the location service.

Why you need it: Perfect for developers and educators requiring detailed geolocation tracking and logging, with applications in cybersecurity, analytics, and remote monitoring.


7. Donation Phishing: Cybersecurity Education Tool

Donation Phishing simulates phishing attacks for educational purposes. It includes:

  • A secure web form interface to collect simulated user data.
  • Serveo tunneling support for remote demonstrations.
  • Logging of submitted data for analysis and education.

Why you need it: Essential for cybersecurity educators teaching phishing tactics.


8. DedSec Database: Simplified File Management

DedSec Database is a web-based file management tool offering:

  • Secure file upload, download, listing, and deletion.
  • Remote access through Serveo or other tunneling tools.
  • Simplified user interface for managing files from any browser.

Why you need it: Perfect for securely managing files in educational or development environments.


9. OSINTDS: Automated Open-Source Intelligence

OSINTDS automates open-source intelligence (OSINT) tasks, including:

  • Collecting emails, phone numbers, and social media profiles.
  • Cross-platform intelligence gathering using APIs and scraping.
  • Validation and deduplication of collected data.

Why you need it: Saves time in cybersecurity investigations by automating tedious OSINT tasks.


Conclusion

DedSec’s tools offer something for everyone, enhancing productivity, security, and customization in your workflows. These tools are essential for developers, cybersecurity enthusiasts, and anyone looking to streamline their setup.

Disclaimer

These tools are intended for ethical hacking and educational purposes only. They should not be used for unauthorized surveillance, accessing, or storing personal information without explicit consent. Users must ensure they have proper authorization before using these tools in any environment. The developers are not responsible for any misuse or illegal activity conducted with the software.

By using these tools, you acknowledge understanding and agreement with this disclaimer, accepting full responsibility for your actions.

About

Read the text below to see all programs descriptions.

Resources

License

Stars

Watchers

Forks

Languages