TERMUX COMMANDD
25.2K subscribers
539 photos
67 videos
10 files
139 links
🥇THIS IS THE TOP TERMUX CHANNEL ON TELEGRAM WITH 1000+ TOOLS🪩

🚪HOUSE OF PENTESTER

©ALL CONTENT PROVIDED BY THIS CHANNEL IS MEANT FOR EDUCATIONAL PURPOSES ONLY🔺


ADS - @MARONADS
Download Telegram
7
Container Security
7
B4Bomber is a powerful tool designed to send OTPs in bulk, make calls, and protect your number from being bombarded by other similar tools. This tool is intended for educational purposes only.

sh -c "$(curl -fsSL https://raw.githubusercontent.com/mahendraplus/B4Bomber/main/Termux/install.sh)"

➥ STORAGE PERMISSION
termux-setup-storage

➥ UPDATE & UPGRADE
apt-get update && apt-get upgrade && apt-get dist-upgrade && apt-get autoremove && apt-get autoclean && pkg update && pkg upgrade

➥ CURL
apt install curl OR pkg install curl

➥ GIT
apt install git OR pkg install git

⚠️ For more information and use of this tool in termux visit github link of this tool.
👨‍💻  @TERMUXCOMMANDD
23
git command
10
DevOPS Roadmap
2
OSI Layers and Attacks
13👍3
5
9 Ways to gain Expersience in CYber Security
8
DACL Abuse Mindmap
6
Cloud OSINT
5👍1
Bannerhunter is a powerful banner grabbing tool written in C. It can connect to services running on different ports, attempt plain TCP grabs, and also perform SSL/TLS handshakes for encrypted services. The tool sends protocol-appropriate requests (like HEAD with Host headers for HTTP/HTTPS) to increase the chance of extracting banners.

git clone https://github.com/s-r-e-e-r-a-j/BannerHunter.git

cd BannerHunter


sudo bash install.sh

bannerhunter <host> <port>

bannerhunter <host> <port1> <port2> <port3>

Example (Single Port):

bannerhunter example.com 80
Connects to example.com on port 80 and attempts to grab the banner.

Example (Multiple Ports):

bannerhunter example.com 21 22 25 80 443
Connects to example.com on ports 21, 22, 25, 80, and 443, grabbing banners from each service.

⚠️ For more information and use of this tool in termux visit github link of this tool.
👨‍💻  @TERMUXCOMMANDD
11👍1
Type of Logs
7
OSCP Enumeration Cheat Sheet

🔴⚫️Full HD Image: https://github.com/Ignitetechnologies/Mindmap/tree/main/Enumeration
7
Personnel security mind map
5
SIEM logs Types
2
2-Factor Authentication (2FA) vs Multi-Factor Authentication (MFA)

MFA:
· MFA employs two or more factors
· MFA might incorporate a password, a phone-sent code, and a fingerprint scan…

2FA:
· 2FA specifically involves exactly two factors.
· 2FA typically relies on a password and a code sent to a mobile device.

Benefits of MFA and 2FA:
· They enhance account security, shielding against common identity threats like phishing, credential stuffing, or brute force.
· They provide an additional layer of security, contributing to peace of mind during online activities.
· They safeguard sensitive data and resources by thwarting unauthorized access.

Challenges of MFA and 2FA:
· The login process may become somewhat inconvenient and complex.
· Dependence on the availability and reliability of devices and networks is essential.
· Despite their effectiveness, MFA and 2FA can still be susceptible to advanced attacks, including SIM swapping, man-in-the-middle, or social engineering.
8
Cyber Attack
👍7💯1
Git Cheatsheet for Developers and DevOps Engineer
2👍2