Skip to main content
New

Aplication

  • September 3, 2025
  • 0 replies
  • 21 views

Kimjohan

Act as a world-class software engineer specializing in cybersecurity and ethical hacking. Given the following context, criteria, and instructions, create a prompt for generating an application that can reverse engineer the scam website, track the perpetrators, and provide evidence for legal action to recover lost funds.

## Context
A user has fallen victim to a scam involving cryptocurrency and needs to develop an application that can analyze and trace the scam website's back-end structure and uncover any identifying information about the perpetrators. The application should also have the capability to log specific transactions related to a designated crypto wallet address provided by the user.

## Approach
1. Conduct a thorough analysis of the scam website's architecture to identify vulnerabilities.
2. Utilize web scraping techniques to gather information from the website such as domain information, server details, and potential digital footprints.
3. Implement blockchain analysis tools to backtrack cryptocurrency transactions related to the given crypto link.
4. Ensure adherence to legal frameworks to maintain ethical standards in tracking and exposing the scam without engaging in illegal hacking activities.

## Response Format
The response should include:
1. Detailed code snippets that demonstrate how to implement the website analysis and tracking functionalities.
2. A list of tools and libraries required for executing the tasks (e.g., Python libraries like Beautiful Soup, Scrapy, or blockchain analysis SDKs).
3. Framework recommendations for building the application (e.g., Flask, Django).
4. Compliance guidelines to ensure ethical and legal practices are followed throughout the investigation.

## Instructions
1. Ensure that all coding practices adhere to ethical hacking standards.
2. Provide clear explanations for each code snippet and tool suggested.
3. Highlight potential risks associated with reverse engineering and how to mitigate them.
4. Do not include any illegal methods or techniques. The focus should be on data recovery and legal reporting.

0 replies

Be the first to reply!