The DedSec Project is a versatile collection of tools aimed at advancing cybersecurity, secure communication, and automation. It offers a range of features for anonymous data collection, real-time monitoring, and personal environment customization, all designed to be used ethically and responsibly. Whether you're looking to test phishing defenses, build private servers, or communicate anonymously, DedSec has tools tailored for your needs.
Disclaimer: The tools in this repository are strictly for educational and ethical use. Misuse or unauthorized deployment may lead to legal consequences.
- DedSec's Chat: Enables anonymous chatting for 8 users. No chats are saved, ensuring complete privacy,files can be shared.
- Fox Chat: Enables anonymous chatting for unlimited users. No chats are saved, ensuring complete privacy,files can be shared.
- Camera Phish: Share a link to capture continuous images from the front or back camera (user's choice). Images are saved automatically in
Internal Storage/Download/Camera-Phish
.
- Sound Recording: Share a link to record high-quality audio. Recordings are saved in
Internal Storage/Download/Recordings
.
- Live Location Tracker: Retrieve real-time GPS coordinates and street details via shared links.
- DedSec Database: Build and manage personal databases or servers. Includes efficient search, retrieval, and export features for organized data management.
- Donation Phishing: Create phishing templates for controlled simulations, improving awareness and security measures.
- OSINTDS: Automates the collection of open-source data from public sources, customizable for targeted intelligence.
- T-Login: Secure multi-user authentication with encryption, session tracking, and audit logging.
- Customization Tool: Modify terminal settings like color schemes, fonts, and layouts. Save and load profiles to automate repetitive tasks.
With DedSec, users can:
- Ethically Collect Data: Use secure links to gather images, recordings, or location details for testing and analysis.
- Communicate Anonymously: Chat without leaving a trace.
- Simulate Attacks: Conduct phishing tests to identify and improve system weaknesses.
- Customize Workflows: Personalize environments for efficiency.
- Gather Intelligence: Automate OSINT tasks for research and analysis.
- Images:
Internal Storage/Download/Camera-Phish
- Audio:
Internal Storage/Download/Recordings
- Obtain explicit permission from system owners before deployment.
- Follow all applicable local, national, and international laws.
- DedSec is designed for ethical use only—misuse is strictly prohibited.
DedSec empowers innovation, education, and cybersecurity research. Use it to make a positive impact!