MacAttack

MacAttack is a GUI tool designed for testing and brute forcing your own IPTV stalker portals. This tool is not for hacking purposes. It helps you understand how hackers could exploit vulnerabilities in your portals.

Note: Only use MacAttack on portals you own or have explicit permission to test.


Overview

IPTV stalker portals are commonly shared in IPTV groups across platforms like Telegram, Reddit, and other forums. These portal links typically end in /c/.

MacAttack helps identify unshared and accessible MAC addresses in these portals. If a portal's page title reads stalker_portal when opened in your browser, it can likely be tested with this tool. Keep in mind that some providers secure their portals using device serial numbers, which prevents brute-forcing.


Requirements


Installation

Download the file MacAttack.exe from the Releases page.


Usage Instructions

Testing stalker portals can take varying amounts of time depending on the portal. Here's how to use the tool effectively:


MacAttack Tab

For testing portal security:

  1. Navigate to the Proxies tab.
    • Enable proxies.
    • Populate the proxy list with valid proxies.
  2. Go to the MacAttack tab.
    • Enter your portal's URL in the provided box.
    • Set the desired speed (1-100).
  3. Click Start to begin the test.

Mac VideoPlayer Tab

For accessing and testing playlists:

  1. Enter your portal's URL in the first box.
  2. Input the MAC address in the second box.
  3. Click Get playlist to retrieve available content.
  4. Double-click items in the playlist to view them.

Tutorial Video

For a detailed walkthrough, watch this video tutorial.

MacAttack Tutorial


Screenshots

Example Interface:

Screenshot 1 Screenshot 2


Disclaimer: MacAttack is strictly a testing tool. Unauthorized use on others' portals may violate laws or terms of service. Always ensure you have permission to test a portal.