cyb3rw0lf
cyb3rw0lf
+1 especially for "download all" feature, or the ability to download directly the highest res without going to the sub-menu.
In the meanwhile the `Linux_arm64` package seems to be working fine: ``` curl -sSL https://raw.githubusercontent.com/sundowndev/phoneinfoga/master/support/scripts/install | sed -e 's/os=.*/os="Linux_arm64"/' | bash ```
I managed to install it in a VM and check which file is triggering the AV and it's `offsetfinder.exe` https://www.virustotal.com/gui/file/650f2281cc2704400cdec8d46c33b963f19e68b3744a92f2ab5dce5b781d2b9f/detection    
The offsetfinder.exe from version `5.11.2.29` is not reported as malicious from bitdefender scan and have only 4 matches on VirusTotal compared with 19 of the new version. https://www.virustotal.com/gui/file/0d0cb5fbb79c9c94eb66d7f22006a47731a99409d79ca2ff41bfaca01acfac47/detection  
also would be great to find a solution where we can use regular color code recognized by the color palette in most editors, instead of partial ones like I'm using...
For me it worked forcing the kali vm to join the all-dhcp-agent multicast group with this command `sudo atk6-fake_mld6 wlan0 add ff02::1:2` atk6-fake_mld6 is part of thc-ipv6 tools https://www.kali.org/tools/thc-ipv6/ In...
Same as for buster, please try reinstalling ``` cd /usr/share/OnionSearch sudo python3 setup.py install ```
This should fix it, please try: ``` cd /usr/share/buster sudo python3 setup.py install ```
The problem is the `breachcomp_path` variable is not reset after first iteration and from second target the search is broken. I sent pull request #165