Method Earn money in paypal
๐ฆUse For learn Not For Stealing
T.me/UnderCodeTestinGOfficial
1.Download the text plus application create a virtual number
2. Download bigtoken from play store
3. Download termux
4. Register in bigtoken with your virtual number and with this referral code so they don't give you ban: PUMECMF00 (Important)
5. Download this:
https://www.mediafire.com/file/iem8zh356sfb2hs/bigtoken.zip/file
and extract it in downloads
6. Go to termux and enter the following commands
$ pkg update && pkg upgrade
$ pkg install php
$ pkg install nano
$ pkg install git
$ termux-setup-storage
$ cd storage
$ cd downloads
$ ls
$ cd bigtoken
$ php bot.php
7. Enter your email and password with which you created the bigtoken account
8. Press the letter: "Y" and enter
9. Press the number: "2" and enter
Do not take more than 25 dollars in a week since they could give you ban
Do the method every 24 hours to avoid suspicion
๐ฆTESTED
@ KADRINO
-------UNDER๐ฎ๐D๐-----
๐ฆUse For learn Not For Stealing
T.me/UnderCodeTestinGOfficial
1.Download the text plus application create a virtual number
2. Download bigtoken from play store
3. Download termux
4. Register in bigtoken with your virtual number and with this referral code so they don't give you ban: PUMECMF00 (Important)
5. Download this:
https://www.mediafire.com/file/iem8zh356sfb2hs/bigtoken.zip/file
and extract it in downloads
6. Go to termux and enter the following commands
$ pkg update && pkg upgrade
$ pkg install php
$ pkg install nano
$ pkg install git
$ termux-setup-storage
$ cd storage
$ cd downloads
$ ls
$ cd bigtoken
$ php bot.php
7. Enter your email and password with which you created the bigtoken account
8. Press the letter: "Y" and enter
9. Press the number: "2" and enter
Do not take more than 25 dollars in a week since they could give you ban
Do the method every 24 hours to avoid suspicion
๐ฆTESTED
@ KADRINO
-------UNDER๐ฎ๐D๐-----
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Extract Password from Hash
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
A) DSInternals PowerShell
> The DSInternals PowerShell Module provides easy-to-use cmdlets that are built on top of its Framework. The main features include offline ntds.dit file manipulation and querying domain controllers through the Directory Replication Service (DRS) Remote Protocol.
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/MichaelGrafnetter/DSInternals
2) cd DSInternals
3) Now Extract the DSInternals directory to your PowerShell modules directory, e.g. C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DSInternals or C:\Users\John\Documents\WindowsPowerShell\Modules\DSInternals.
(Optional) If you copied the module to a different directory than advised in the previous step, you have to manually import it using the Import-Module cmdlet.
๐ฆHow It Works ?
This method is only applicable to Windows users. To extract NTLM hashes you can take the help of the following commands Example:
1) Save-Module DSInternals -Path C:\Windows\System32\WindowsPowershell\v1.0\Modules
Install-Module DSInternals
Import-Module DSInternals
1...
2...
3...
2) Save-Module DSInternals -Path C:\Windows\System32\WindowsPowershell\v1.0\Modules
Install-Module DSInternals
Import-Module DSInternals)
๐ฆTested On:
>Win 10
e n j o y
Written ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Extract Password from Hash
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
A) DSInternals PowerShell
> The DSInternals PowerShell Module provides easy-to-use cmdlets that are built on top of its Framework. The main features include offline ntds.dit file manipulation and querying domain controllers through the Directory Replication Service (DRS) Remote Protocol.
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/MichaelGrafnetter/DSInternals
2) cd DSInternals
3) Now Extract the DSInternals directory to your PowerShell modules directory, e.g. C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DSInternals or C:\Users\John\Documents\WindowsPowerShell\Modules\DSInternals.
(Optional) If you copied the module to a different directory than advised in the previous step, you have to manually import it using the Import-Module cmdlet.
๐ฆHow It Works ?
This method is only applicable to Windows users. To extract NTLM hashes you can take the help of the following commands Example:
1) Save-Module DSInternals -Path C:\Windows\System32\WindowsPowershell\v1.0\Modules
Install-Module DSInternals
Import-Module DSInternals
1...
2...
3...
2) Save-Module DSInternals -Path C:\Windows\System32\WindowsPowershell\v1.0\Modules
Install-Module DSInternals
Import-Module DSInternals)
๐ฆTested On:
>Win 10
e n j o y
Written ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆAll in one 2019 recon, scanning,
parsing, and creating malicious payloads and listeners with Metasploit. For use with Kali Linux
and the Penetration Testers Framework (PTF).
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/leebaird/discover /opt/discover/
> All scripts must be ran from this location.
2) cd /opt/discover/
3) chmod 777 update.sh
4) ./update.sh
๐ฆRECON
1. Domain
2. Person
3. Parse salesforce
๐ฆSCANNING
4. Generate target list
5. CIDR
6. List
7. IP, range, or domain
8. Rerun Nmap scripts and MSF aux
๐ฆWEB
9. Insecure direct object reference
10. Open multiple tabs in Firefox
11. Nikto
12. SSL
๐ฆMISC
13. Parse XML
14. Generate a malicious payload
15. Start a Metasploit listener
@ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAll in one 2019 recon, scanning,
parsing, and creating malicious payloads and listeners with Metasploit. For use with Kali Linux
and the Penetration Testers Framework (PTF).
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/leebaird/discover /opt/discover/
> All scripts must be ran from this location.
2) cd /opt/discover/
3) chmod 777 update.sh
4) ./update.sh
๐ฆRECON
1. Domain
2. Person
3. Parse salesforce
๐ฆSCANNING
4. Generate target list
5. CIDR
6. List
7. IP, range, or domain
8. Rerun Nmap scripts and MSF aux
๐ฆWEB
9. Insecure direct object reference
10. Open multiple tabs in Firefox
11. Nikto
12. SSL
๐ฆMISC
13. Parse XML
14. Generate a malicious payload
15. Start a Metasploit listener
@ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to create a fake AP and sniff data.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/xdavidhu/mitmAP
2) cd mitmAP
3) python mitmAP.py
๐ฆHow it Works:
1) SSLstrip2 for HSTS bypass
2) Image capture with Driftnet
3) TShark for command line .pcap capture
๐ฆFeatures:
> SSLstrip2
> Driftnet
> Tshark
> Full featured access point, with configurable speed limit
> mitmproxy
> Wireshark
> DNS Spoofing
> Saving results to file
@ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to create a fake AP and sniff data.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/xdavidhu/mitmAP
2) cd mitmAP
3) python mitmAP.py
๐ฆHow it Works:
1) SSLstrip2 for HSTS bypass
2) Image capture with Driftnet
3) TShark for command line .pcap capture
๐ฆFeatures:
> SSLstrip2
> Driftnet
> Tshark
> Full featured access point, with configurable speed limit
> mitmproxy
> Wireshark
> DNS Spoofing
> Saving results to file
@ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/codingo/Reconnoitre.git
> After you have done this run setup.py with the following:
2) python3 setup.py install
3) After setup has run Reconnoitre will now be in your path (as reconnoitre) and you can launch it anywhere using:
reconnoitre <args>
๐ฆCommands:
Argument Description
-h, --help Display help message and exit
-t TARGET_HOSTS Set either a target range of addresses or a single host to target. May also be a file containing hosts.
-o OUTPUT_DIRECTORY Set the target directory where results should be written.
-w WORDLIST Optionally specify your own wordlist to use for pre-compiled commands, or executed attacks.
--pingsweep Write a new target.txt file in the OUTPUT_DIRECTORY by performing a ping sweep and discovering live hosts.
--dns, --dnssweep Find DNS servers from the list of target(s).
--snmp Find hosts responding to SNMP requests from the list of target(s).
--services Perform a service scan over the target(s) and write recommendations for further commands to execute.
--hostnames Attempt to discover target hostnames and write to hostnames.txt.
--virtualhosts Attempt to discover virtual hosts using the specified wordlist. This can be expended via discovered hostnames.
--ignore-http-codes Comma separated list of http codes to ignore with virtual host scans.
--ignore-content-length Ignore content lengths of specificed amount. This may become useful when a server returns a static page on every virtual host guess.
--quiet Supress banner and headers and limit feedback to grepable results.
--quick Move to the next target after performing a quick scan and writing first-round recommendations.
--no-udp Disable UDP service scanning, which is ON by default.
@ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/codingo/Reconnoitre.git
> After you have done this run setup.py with the following:
2) python3 setup.py install
3) After setup has run Reconnoitre will now be in your path (as reconnoitre) and you can launch it anywhere using:
reconnoitre <args>
๐ฆCommands:
Argument Description
-h, --help Display help message and exit
-t TARGET_HOSTS Set either a target range of addresses or a single host to target. May also be a file containing hosts.
-o OUTPUT_DIRECTORY Set the target directory where results should be written.
-w WORDLIST Optionally specify your own wordlist to use for pre-compiled commands, or executed attacks.
--pingsweep Write a new target.txt file in the OUTPUT_DIRECTORY by performing a ping sweep and discovering live hosts.
--dns, --dnssweep Find DNS servers from the list of target(s).
--snmp Find hosts responding to SNMP requests from the list of target(s).
--services Perform a service scan over the target(s) and write recommendations for further commands to execute.
--hostnames Attempt to discover target hostnames and write to hostnames.txt.
--virtualhosts Attempt to discover virtual hosts using the specified wordlist. This can be expended via discovered hostnames.
--ignore-http-codes Comma separated list of http codes to ignore with virtual host scans.
--ignore-content-length Ignore content lengths of specificed amount. This may become useful when a server returns a static page on every virtual host guess.
--quiet Supress banner and headers and limit feedback to grepable results.
--quick Move to the next target after performing a quick scan and writing first-round recommendations.
--no-udp Disable UDP service scanning, which is ON by default.
@ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019 tool that discovers valid subdomains for websites.
> Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/projectdiscovery/subfinder/releases/
2) Download .tar
3) tar -xzvf subfinder-linux-amd64.tar
4) mv subfinder-linux-amd64 /usr/bin/subfinder
5)subfinder
๐ฆIf you want to build it yourself, you can go get the repo
> go get -v github.com/projectdiscovery/subfinder/cmd/subfinder
> If you wish to upgrade the package you can use:
> go get -u -v github.com/projectdiscovery/subfinder/cmd/subfinder
๐ฆRunning:
1) If you are using docker, you need to first create your directory structure holding subfinder configuration file. After modifying the default config.yaml file, you can run:
2) mkdir $HOME/.config/subfinder
3) cp config.yaml $HOME/.config/subfinder/config.yaml
4) nano $HOME/.config/subfinder/config.yaml
5) docker run -v $HOME/.config/subfinder:/root/.config/subfinder -it ice3man/subfinder -d freelancer.com
๐ฆHow To Use:
1) Running Subfinder
To run the tool on a target, just use the following command.
2) subfinder -d freelancer.com
This will run the tool against freelancer.com. There are a number of configuration options that you can pass along with this command. The verbose switch (-v) can be used to display verbose information.
[CERTSPOTTER] www.fi.freelancer.com
[DNSDUMPSTER] hosting.freelancer.com
[DNSDUMPSTER] support.freelancer.com
[DNSDUMPSTER] accounts.freelancer.com
[DNSDUMPSTER] phabricator.freelancer.com
[DNSDUMPSTER] cdn1.freelancer.com
[DNSDUMPSTER] t1.freelancer.com
[DNSDUMPSTER] wdc.t1.freelancer.com
[DNSDUMPSTER] dal.t1.freelancer.com
The -o command can be used to specify an output file.
> subfinder -d freelancer.com -o output.txt
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019 tool that discovers valid subdomains for websites.
> Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/projectdiscovery/subfinder/releases/
2) Download .tar
3) tar -xzvf subfinder-linux-amd64.tar
4) mv subfinder-linux-amd64 /usr/bin/subfinder
5)subfinder
๐ฆIf you want to build it yourself, you can go get the repo
> go get -v github.com/projectdiscovery/subfinder/cmd/subfinder
> If you wish to upgrade the package you can use:
> go get -u -v github.com/projectdiscovery/subfinder/cmd/subfinder
๐ฆRunning:
1) If you are using docker, you need to first create your directory structure holding subfinder configuration file. After modifying the default config.yaml file, you can run:
2) mkdir $HOME/.config/subfinder
3) cp config.yaml $HOME/.config/subfinder/config.yaml
4) nano $HOME/.config/subfinder/config.yaml
5) docker run -v $HOME/.config/subfinder:/root/.config/subfinder -it ice3man/subfinder -d freelancer.com
๐ฆHow To Use:
1) Running Subfinder
To run the tool on a target, just use the following command.
2) subfinder -d freelancer.com
This will run the tool against freelancer.com. There are a number of configuration options that you can pass along with this command. The verbose switch (-v) can be used to display verbose information.
[CERTSPOTTER] www.fi.freelancer.com
[DNSDUMPSTER] hosting.freelancer.com
[DNSDUMPSTER] support.freelancer.com
[DNSDUMPSTER] accounts.freelancer.com
[DNSDUMPSTER] phabricator.freelancer.com
[DNSDUMPSTER] cdn1.freelancer.com
[DNSDUMPSTER] t1.freelancer.com
[DNSDUMPSTER] wdc.t1.freelancer.com
[DNSDUMPSTER] dal.t1.freelancer.com
The -o command can be used to specify an output file.
> subfinder -d freelancer.com -o output.txt
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux exploite databse /see bugs in server + auto nmap and much more via simple automate script
twitter.com/UnderCodeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/kuburan/txtool
2) cd txtool
3) apt install python2
4) ./install.py
5) txtool
6) for ssh backdoor access, txtool used paramiko python library that required PyNacl if you have an error installing PyNacl, follow my steps:
> apt-get install --assume-yes libsodium libsodium-dev
> SODIUM_INSTALL=system pip2 install pynacl
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux exploite databse /see bugs in server + auto nmap and much more via simple automate script
twitter.com/UnderCodeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/kuburan/txtool
2) cd txtool
3) apt install python2
4) ./install.py
5) txtool
6) for ssh backdoor access, txtool used paramiko python library that required PyNacl if you have an error installing PyNacl, follow my steps:
> apt-get install --assume-yes libsodium libsodium-dev
> SODIUM_INSTALL=system pip2 install pynacl
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGenerate combos based on Keywords with Termux
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update&&apt upgrade -y
2) termux-setup-storage
3) pkg install php git -y
4) git clone https://github.com/Juni0r007/PasTerm.git
5) cd PasTerm
6) Ejecutamos el archivo *.php
7) chmod +x pasterm.php;
chmod +x pasterm.class.php
8) php pasterm.php
๐ฆVid Tutorial:
> https://www.youtube.com/watch?v=0k9D20r2Q3U
Thats All
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGenerate combos based on Keywords with Termux
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update&&apt upgrade -y
2) termux-setup-storage
3) pkg install php git -y
4) git clone https://github.com/Juni0r007/PasTerm.git
5) cd PasTerm
6) Ejecutamos el archivo *.php
7) chmod +x pasterm.php;
chmod +x pasterm.class.php
8) php pasterm.php
๐ฆVid Tutorial:
> https://www.youtube.com/watch?v=0k9D20r2Q3U
Thats All
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Install Java Jdk on Termux for many requirements and usefull!& without root
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1)pkg update
2) pkg upgrade
3) pkg install wget
4) wget https://raw.githubusercontent.com/MasterDevX/java/master/installjava
5) bash installjava
6) Now sucessfull installed jdk termux
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Install Java Jdk on Termux for many requirements and usefull!& without root
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1)pkg update
2) pkg upgrade
3) pkg install wget
4) wget https://raw.githubusercontent.com/MasterDevX/java/master/installjava
5) bash installjava
6) Now sucessfull installed jdk termux
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆfsstat displays the details associated with a file system. The output of this command is file system specific. At a minimum, the range of meta-data values (inode numbers) and content units (blocks or clusters) are given. Also given are details from the Super Block, such as mount times and and features. For file systems that use groups (FFS and EXT2FS), the layout of each group is listed.
>For a FAT file system, the FAT table is displayed in a condensed format. Note that the data is in sectors and not in clusters.
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Its kali pre-installed tool
2) To Run
> fsstat [-f fstype ] [-i imgtype] [-o imgoffset] [-b dev_sector_size] [-tvV] image [images]
๐ฆCommands :
-t type
Print the file system type only.
-f fstype
Specify the file system type. Use โ-f listโ to list the supported file system types. If not given, autodetection methods are used.
-i imgtype
Identify the type of image file, such as raw. Use โ-i listโ to list the supported types. If not given, autodetection methods are used.
-o imgoffset
The sector offset where the file system starts in the image.
-b dev_sector_size
The size, in bytes, of the underlying device sectors. If not given, the value in the image format is used (if it exists) or 512-bytes is assumed.
-v
Verbose output of debugging statements to stderr
-V
Display version
Written By Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆfsstat displays the details associated with a file system. The output of this command is file system specific. At a minimum, the range of meta-data values (inode numbers) and content units (blocks or clusters) are given. Also given are details from the Super Block, such as mount times and and features. For file systems that use groups (FFS and EXT2FS), the layout of each group is listed.
>For a FAT file system, the FAT table is displayed in a condensed format. Note that the data is in sectors and not in clusters.
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Its kali pre-installed tool
2) To Run
> fsstat [-f fstype ] [-i imgtype] [-o imgoffset] [-b dev_sector_size] [-tvV] image [images]
๐ฆCommands :
-t type
Print the file system type only.
-f fstype
Specify the file system type. Use โ-f listโ to list the supported file system types. If not given, autodetection methods are used.
-i imgtype
Identify the type of image file, such as raw. Use โ-i listโ to list the supported types. If not given, autodetection methods are used.
-o imgoffset
The sector offset where the file system starts in the image.
-b dev_sector_size
The size, in bytes, of the underlying device sectors. If not given, the value in the image format is used (if it exists) or 512-bytes is assumed.
-v
Verbose output of debugging statements to stderr
-V
Display version
Written By Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Simple Termux(root) /Kali/parrot tools To scan port , Brute force protocol Service ,scan website , exploit system , exploit sql injection website and also have other characteristics
Twitter.com/UnderCodeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/joker25000/DZGEN
2) The installation the tool
3) cd DZGEN
4) chmod +x DZGEN
5) ./DZGEN
6) Run DZGEN tool in terminal
> DZGEN
๐ฆTested By UnderCode
> kali
> debian
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Simple Termux(root) /Kali/parrot tools To scan port , Brute force protocol Service ,scan website , exploit system , exploit sql injection website and also have other characteristics
Twitter.com/UnderCodeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/joker25000/DZGEN
2) The installation the tool
3) cd DZGEN
4) chmod +x DZGEN
5) ./DZGEN
6) Run DZGEN tool in terminal
> DZGEN
๐ฆTested By UnderCode
> kali
> debian
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGit Best Tools Hacking For Kali Linux 2018
t.me/iOSDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Ha3MrX/GitTool
2) cd GitTool
3) chmod +x gittool.sh
4) ./gittool.sh
๐ฆVid Tutorial
> https://www.youtube.com/watch?v=APkZOXJ2rnk
๐ฆFeatures:
See screanshaot below iam sure you will like this tool
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGit Best Tools Hacking For Kali Linux 2018
t.me/iOSDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Ha3MrX/GitTool
2) cd GitTool
3) chmod +x gittool.sh
4) ./gittool.sh
๐ฆVid Tutorial
> https://www.youtube.com/watch?v=APkZOXJ2rnk
๐ฆFeatures:
See screanshaot below iam sure you will like this tool
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
IOS JAILBREAK BY UNDERCODE TESTING OFFICIAL
WELCOME TO UNDERCODE TESTING
FOR IOS JAILBREAK NEWS & TRICKS
๐ ถ๐ ธ๐๐ ป๐ฐ๐ฑ
@UndercOdeTesting
๐๐พ๐๐๐๐ฑ๐ ด
@UnderCodeTestingCompany
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTestingCompany
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestingCompany
๐๐๐ ธ๐๐๐ ด๐
@UndercOdeTC
UNDERCODE.ORG
FOR IOS JAILBREAK NEWS & TRICKS
๐ ถ๐ ธ๐๐ ป๐ฐ๐ฑ
@UndercOdeTesting
๐๐พ๐๐๐๐ฑ๐ ด
@UnderCodeTestingCompany
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTestingCompany
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestingCompany
๐๐๐ ธ๐๐๐ ด๐
@UndercOdeTC
UNDERCODE.ORG
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUnderstand before attack how it works
> How do hackers or remote attackers obtain the WPA or WPA2 Handshake from a wireless access point easily?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Communication Negotiation
When the connection is first established between two modems, the negotiation of communication restrictions and boundaries occurs for a brief period of time. Afterwards, the infamous "squealing" noise that people hear from old, dial-up modems sporting speaker outputs (it's a sound that modifies its pitch a hundred times every second) once the connection has been successfully made is the aural manifestation of two modems engaging in the handshake process. Thereafter, once everything has been agreed upon in regards to parameters, they're (the parameters) are used to offer streamlined information transmission over the channel as a function of its capacity and quality.
๐ฆFree High Quality WiFi
Although handshakes are more often than not what hackers need to capture in order to gain unauthorized access to systems and networksโor at the very least, get free, high-quality WiFi superior to those found in coffee shops and librariesโit's a necessary and unavoidable step to ensuring smooth connections from two otherwise different and normally mismatched systems. In turn, a Wired Protected Access or WPA handshake to keep intruders or unauthorized users from accessing the network (e.g., a four-way Temporal Key Integrity Protocol or TKIP handshake, with TKIP referring to one of many encryption algorithms that WPA supports).
๐ฆWPA Handshake Exploit
As for using WPA handshakes as exploits for security breaches, there are a variety of methods suited for this hacking task. Any hacker who wants to capture a four-way TKIP handshake without any help will probably have to observe Internet traffic for hours-on-end, patiently stalking for a client to link to a network. As easier way to capture handshakes for hacking purposes involves the use of a hacking tool called Aircrack-ng and forced deauthentication of a connected client PC in order to make him reconnect back up to the server exactly when you want him to connect.
๐ฆAuthentication Capture
Ironically enough, it's during the procedure wherein the encrypted WPA key is re-exchanged that a connection is most vulnerable for hacker attackโthe very process needed to protect a network can open it up to attack, like barging into a house while someone is in the middle of bolting the locks on his doors. Once the full authentication handshake has been captured from the client and an access point, the hacker can easily decrypt the information behind the handshake, thus allowing him the key to access the previously impenetrable network.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUnderstand before attack how it works
> How do hackers or remote attackers obtain the WPA or WPA2 Handshake from a wireless access point easily?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Communication Negotiation
When the connection is first established between two modems, the negotiation of communication restrictions and boundaries occurs for a brief period of time. Afterwards, the infamous "squealing" noise that people hear from old, dial-up modems sporting speaker outputs (it's a sound that modifies its pitch a hundred times every second) once the connection has been successfully made is the aural manifestation of two modems engaging in the handshake process. Thereafter, once everything has been agreed upon in regards to parameters, they're (the parameters) are used to offer streamlined information transmission over the channel as a function of its capacity and quality.
๐ฆFree High Quality WiFi
Although handshakes are more often than not what hackers need to capture in order to gain unauthorized access to systems and networksโor at the very least, get free, high-quality WiFi superior to those found in coffee shops and librariesโit's a necessary and unavoidable step to ensuring smooth connections from two otherwise different and normally mismatched systems. In turn, a Wired Protected Access or WPA handshake to keep intruders or unauthorized users from accessing the network (e.g., a four-way Temporal Key Integrity Protocol or TKIP handshake, with TKIP referring to one of many encryption algorithms that WPA supports).
๐ฆWPA Handshake Exploit
As for using WPA handshakes as exploits for security breaches, there are a variety of methods suited for this hacking task. Any hacker who wants to capture a four-way TKIP handshake without any help will probably have to observe Internet traffic for hours-on-end, patiently stalking for a client to link to a network. As easier way to capture handshakes for hacking purposes involves the use of a hacking tool called Aircrack-ng and forced deauthentication of a connected client PC in order to make him reconnect back up to the server exactly when you want him to connect.
๐ฆAuthentication Capture
Ironically enough, it's during the procedure wherein the encrypted WPA key is re-exchanged that a connection is most vulnerable for hacker attackโthe very process needed to protect a network can open it up to attack, like barging into a house while someone is in the middle of bolting the locks on his doors. Once the full authentication handshake has been captured from the client and an access point, the hacker can easily decrypt the information behind the handshake, thus allowing him the key to access the previously impenetrable network.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆANY PAGES FOR CREATE VIRTUAL NUMBERS๐ฆ
t.me/UnderCodeTestingOfficial
To receive your messages of confirmation!
โฉโฉ1. Receivefreesms.net
2. Sms-receive.net
3. Receive-a-sms.comโฉ
4. โฆHs3x.comโฉ
5. Receive-sms-now.com - (There are Russian numbers)
6. Smsreceivefree.com
7. Receivesmsonline.com
8. Getsms.org - (ะ ัั.ะฝะพะผะตัะฐ)
9. Tempsms.ru - (Rus.number)
10. Numberforsms.com - (There are Russian numberps)
11. Sonetel.com
12. Smska.us - (Rus.number)
13. Sellaite.com
14. Sms.ink - (Rus.numera)
15. Proovl.com
16. Onlinesim.ru
17. Zadarma.com - (There are Russian numbers)
18. Smsc.ru - (You need to register, there are Russian and Ukrainian numbers)
19. Freevirtualnumber.skycallbd.com
20. Getfreesmsnumber.com
21. Receive-smsonline.net - Yearly design
22. Receivefreesms.com
23. Receivesmsverification.com
24. Sms-online.co
25. Ireceivesmsonline.com
26. Receive-sms-online.com - (There are a number of scores)
27. Receive-sms-free.com
28. Esendex.com.au - (Registration required)
29. Receivesmsonline.in
๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ
@kadrino (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆANY PAGES FOR CREATE VIRTUAL NUMBERS๐ฆ
t.me/UnderCodeTestingOfficial
To receive your messages of confirmation!
โฉโฉ1. Receivefreesms.net
2. Sms-receive.net
3. Receive-a-sms.comโฉ
4. โฆHs3x.comโฉ
5. Receive-sms-now.com - (There are Russian numbers)
6. Smsreceivefree.com
7. Receivesmsonline.com
8. Getsms.org - (ะ ัั.ะฝะพะผะตัะฐ)
9. Tempsms.ru - (Rus.number)
10. Numberforsms.com - (There are Russian numberps)
11. Sonetel.com
12. Smska.us - (Rus.number)
13. Sellaite.com
14. Sms.ink - (Rus.numera)
15. Proovl.com
16. Onlinesim.ru
17. Zadarma.com - (There are Russian numbers)
18. Smsc.ru - (You need to register, there are Russian and Ukrainian numbers)
19. Freevirtualnumber.skycallbd.com
20. Getfreesmsnumber.com
21. Receive-smsonline.net - Yearly design
22. Receivefreesms.com
23. Receivesmsverification.com
24. Sms-online.co
25. Ireceivesmsonline.com
26. Receive-sms-online.com - (There are a number of scores)
27. Receive-sms-free.com
28. Esendex.com.au - (Registration required)
29. Receivesmsonline.in
๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ
@kadrino (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)
๐ฆInstallisation & Run:
1) Download & Install AhMyth via 2 popular ways
A- using directly use the source code from GitHub
B- use the binaries they provide
๐ฆ SO LET S START: WITH METHODE 1 (A)
1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.
> Java โ it's used to generate the APK backdoor.
> Electron โ it's used to start the desktop application.
(https://github.com/electron/electron)
> Electron-builder and Electron-packer โ they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)
2) After instlling Those requestsOpen Terminal & Type:
> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
3) cd AhMyth-Android-RAT/AhMyth-Server
4) > npm start
5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.
> sudo npm start --unsafe-perm
๐ฆIF USING METHODE B (From Binaries):
1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ use the binaries
2) Download or clone
> https://github.com/AhMyth/AhMyth-Android-RAT/releases
THEY HAVE FOR WINDOWS & LINUX
3) After installing :
> Build an APK
Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป
> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.
4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.
5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)
6) For Auto install (same network adress)
If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.
7) WELL DONE GET THEIR SMS EXAMPLE
If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent
8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....
๐ฆTESTED BY undercOde on
> Win
> DEBIAN
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)
๐ฆInstallisation & Run:
1) Download & Install AhMyth via 2 popular ways
A- using directly use the source code from GitHub
B- use the binaries they provide
๐ฆ SO LET S START: WITH METHODE 1 (A)
1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.
> Java โ it's used to generate the APK backdoor.
> Electron โ it's used to start the desktop application.
(https://github.com/electron/electron)
> Electron-builder and Electron-packer โ they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)
2) After instlling Those requestsOpen Terminal & Type:
> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
3) cd AhMyth-Android-RAT/AhMyth-Server
4) > npm start
5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.
> sudo npm start --unsafe-perm
๐ฆIF USING METHODE B (From Binaries):
1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ use the binaries
2) Download or clone
> https://github.com/AhMyth/AhMyth-Android-RAT/releases
THEY HAVE FOR WINDOWS & LINUX
3) After installing :
> Build an APK
Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป
> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.
4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.
5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)
6) For Auto install (same network adress)
If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.
7) WELL DONE GET THEIR SMS EXAMPLE
If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent
8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....
๐ฆTESTED BY undercOde on
> Win
> DEBIAN
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTopic termux/kali onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Turmex and other Linux distributions. onex can install any third party tool or any hacking tool for you.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
6) onex -h or onex help for help.
๐ฆOptions :
> onex install [tool_name] install any tool.
> onex -i [tool_name] install any tool.
> onex search [tool_name] search any tool.
> onex -s [tool_name] search any tool.
> onex list list all tools.
> onex list -a list all tools.
> onex -l list all tools.
> onex -l -a list all tools.
> onex help get help.
> onex -h get help.
type
> onex star: to start onex menu mode.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTopic termux/kali onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Turmex and other Linux distributions. onex can install any third party tool or any hacking tool for you.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
6) onex -h or onex help for help.
๐ฆOptions :
> onex install [tool_name] install any tool.
> onex -i [tool_name] install any tool.
> onex search [tool_name] search any tool.
> onex -s [tool_name] search any tool.
> onex list list all tools.
> onex list -a list all tools.
> onex -l list all tools.
> onex -l -a list all tools.
> onex help get help.
> onex -h get help.
type
> onex star: to start onex menu mode.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ