> Then open the configuration file in any text editor. In this case, I used Leafpad
kali> leafpad config
π¦ We will need to edit the IPADDRESS variable and the SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").
Step 10: Launch the Platform
Now we are ready to launch the Smartphone Pentest Framework. Just enter
kali> ./framework.py
And that should open the Framework menu as shown below.
Finish! Now we are ready to start hacking smartphones!
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
kali> leafpad config
π¦ We will need to edit the IPADDRESS variable and the SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").
Step 10: Launch the Platform
Now we are ready to launch the Smartphone Pentest Framework. Just enter
kali> ./framework.py
And that should open the Framework menu as shown below.
Finish! Now we are ready to start hacking smartphones!
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ AFTER ALL THOSE TUTORIALS TIME TO SEND IMPORTANTS TERMUX-LINUX HACKING TOOLS :)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Best Proxy Grabber Tool!
t.me/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/HttpLiveProxyGrabber
2) cd HttpLiveProxyGrabber
3) python ProxGrab.py
simply then choose options
π¦ Best Proxy Grabber Tool!
t.me/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/HttpLiveProxyGrabber
2) cd HttpLiveProxyGrabber
3) python ProxGrab.py
simply then choose options
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Fast instagram cracking :
very fast!
work with proxylist
only work on python2.7
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/instagramCracker
2) cd instagramCracker
3)python CheckProxy.py
4)python instagram.py
π¦ Fast instagram cracking :
very fast!
work with proxylist
only work on python2.7
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/instagramCracker
2) cd instagramCracker
3)python CheckProxy.py
4)python instagram.py
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacking Tools β‘οΈ:)
fb.com/undercodeTesting
+] MD5 Hash Cracker
[+] Zone-h Poster
[+] Zone-h Url Grabber
[+] Sqli Finder [With ip Address]
[+] Whois Tools
[+] Dorker
[+] Reverse ip
[+] zip/rar password Cracker
[+] telegram/instagram username checker
[+] ICG wordpress Scanner
[+] Email Crawler
[+] Base64 encode/Decode
[+] Wordpress Hash BruteForce
[+] pyc decompiler
[+] CMs Checker
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/ToolB0x
2) cd ToolB0x
3) run as pthon ToolB0x.py
color.py
E N J O Y
π¦ Works for Termux-win-any linux
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacking Tools β‘οΈ:)
fb.com/undercodeTesting
+] MD5 Hash Cracker
[+] Zone-h Poster
[+] Zone-h Url Grabber
[+] Sqli Finder [With ip Address]
[+] Whois Tools
[+] Dorker
[+] Reverse ip
[+] zip/rar password Cracker
[+] telegram/instagram username checker
[+] ICG wordpress Scanner
[+] Email Crawler
[+] Base64 encode/Decode
[+] Wordpress Hash BruteForce
[+] pyc decompiler
[+] CMs Checker
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/ToolB0x
2) cd ToolB0x
3) run as pthon ToolB0x.py
color.py
E N J O Y
π¦ Works for Termux-win-any linux
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code
π¦FEATURES :
apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4shadoww/hakkuframework
2) cd hakkuframework
3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku
> Installation can be done by simple running command: sudo ./install -i
> use for learn not for harm :(
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code
π¦FEATURES :
apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4shadoww/hakkuframework
2) cd hakkuframework
3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku
> Installation can be done by simple running command: sudo ./install -i
> use for learn not for harm :(
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - 4shadoww/hakkuframework: Hakku Framework penetration testing
Hakku Framework penetration testing. Contribute to 4shadoww/hakkuframework development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script ππ»
π¦ πβπππΈπππππΈπππβ & βπβ :
$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM
> termux-linux
π¦updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script ππ»
π¦ πβπππΈπππππΈπππβ & βπβ :
$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM
> termux-linux
GitHub
GitHub - 4L13199/LITESPAM: Berisi Tools Spammer Dengan Berbagai Macam jenis Dengan Limit Tinggi Bahkan Unlimited
Berisi Tools Spammer Dengan Berbagai Macam jenis Dengan Limit Tinggi Bahkan Unlimited - 4L13199/LITESPAM
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) If your Instagram account was disabled, youβll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119
or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.
2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.
3) If you donβt see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) If your Instagram account was disabled, youβll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119
or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.
2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.
3) If you donβt see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4w4k3/BeeLogger.git
Running:
2) cd BeeLogger
3) sudo su
4) chmod +x install.sh
5) ./install.sh
6) python bee.py
π¦Features :
> Send logs each 120 seconds.
> Send logs when chars > 50.
> Send logs with GMAIL.
> Some Phishing methods are included.
> Multiple Session disabled.
> Auto Persistence.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4w4k3/BeeLogger.git
Running:
2) cd BeeLogger
3) sudo su
4) chmod +x install.sh
5) ./install.sh
6) python bee.py
π¦Features :
> Send logs each 120 seconds.
> Send logs when chars > 50.
> Send logs with GMAIL.
> Some Phishing methods are included.
> Multiple Session disabled.
> Auto Persistence.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
Hacking signs
1) battery charge. If the smartphoneβs battery began to run down quickly, reducing the deviceβs operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;
2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;
3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;
4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the deviceβs microphone or even listening to conversations;
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
Hacking signs
1) battery charge. If the smartphoneβs battery began to run down quickly, reducing the deviceβs operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;
2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;
3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;
4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the deviceβs microphone or even listening to conversations;
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β