β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Min Linux Steam Requirements-from git sources :
team for Linux requires the following:
1 GHz Pentium 4 or AMD Opteron with:
1) x86-64 (AMD64) instruction set
2) CMPXCHG16B instruction support (cx16 in /proc/cpuinfo flags)
3) SSE3 instruction support (pni in /proc/cpuinfo flags)
4) 512 megabytes of RAM and 5 gigabytes of hard drive space, or better
5) Internet connection (Cable/DSL speeds recommended)
6) Latest Ubuntu LTS, fully updated
7) 64-bit (x86-64, AMD64) Linux kernel
8) 64-bit (x86-64, AMD64) and 32-bit (i386, IA32) graphics drivers and glibc
9) Latest graphics driver
10) NVidia driver support - For recent cards (e.g. series 8), you will need to install 310.x. For older cards, driver 304.x supports the NVidia 6 and 7 GPU series. To access these drivers, first update your cache and then install the specific driver you need from the list in Additional Drivers.
11) AMD driver support - For recent cards (e.g. series 5 and above), we recommend installing the 12.11 driver. For older cards, Catalyst 13.1 Legacy supports the HD 2400 Pro card and is the latest for the 2 and 4 GPU series.
12) Intel HD 3000/4000 driver support - you will need to use the latest Mesa drivers, Mesa 9 or later.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Min Linux Steam Requirements-from git sources :
team for Linux requires the following:
1 GHz Pentium 4 or AMD Opteron with:
1) x86-64 (AMD64) instruction set
2) CMPXCHG16B instruction support (cx16 in /proc/cpuinfo flags)
3) SSE3 instruction support (pni in /proc/cpuinfo flags)
4) 512 megabytes of RAM and 5 gigabytes of hard drive space, or better
5) Internet connection (Cable/DSL speeds recommended)
6) Latest Ubuntu LTS, fully updated
7) 64-bit (x86-64, AMD64) Linux kernel
8) 64-bit (x86-64, AMD64) and 32-bit (i386, IA32) graphics drivers and glibc
9) Latest graphics driver
10) NVidia driver support - For recent cards (e.g. series 8), you will need to install 310.x. For older cards, driver 304.x supports the NVidia 6 and 7 GPU series. To access these drivers, first update your cache and then install the specific driver you need from the list in Additional Drivers.
11) AMD driver support - For recent cards (e.g. series 5 and above), we recommend installing the 12.11 driver. For older cards, Catalyst 13.1 Legacy supports the HD 2400 Pro card and is the latest for the 2 and 4 GPU series.
12) Intel HD 3000/4000 driver support - you will need to use the latest Mesa drivers, Mesa 9 or later.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Modify the configuration file
After entering the project interface, click "Help"-> "Edit Custom VM Optionsβ¦" in the top menu bar of Idea. If you are prompted to create a file, click "Yes".
After entering the project interface, click "Help"-> "Edit Custom VM Optionsβ¦" in the top menu bar of Idea. If you are prompted to create a file, click "Yes".
π¦ At the end of the opened vmoptions edit window,
> add:-javaagent: idea\jetbrains-agent.jar
> add:-javaagent: idea\jetbrains-agent.jar
π¦ Please carefully check whether the patch path is correct. If it is wrong, the Idea will not open. At this time, you can delete the Idea folder in the user configuration directory:
1) windwos: C: \ Users \ user name \
2) macos: ~ / Library / Preferences /
3) ubuntu: ~
> After modifying the configuration file, restart Idea
4) Enter the activation code
After restarting Idea, click "Help"-> "Registerβ¦" in the menu bar, there are two activation methods:
> Choose the last license server activation method, fill in the address: http://jetbrains-license-server(it should be automatically filled in), or click the button: "Discover Server" to automatically fill in the address and complete the activation
5) If the server activation method cannot be activated, you can also select Activation code to activate, copy the activation code below :
pastebin.com/r8A6W7am
6) View the validity period
When your activation is complete, there will be a small registration prompt box in the lower right corner of Idea. The general content is: You copy is Licensed to XXX, it will tell you: Brother, you have activated successfully, and the source of the activation code is : XXX.
7) To check the validity period, click: Help-> About Here you can see the version number, license source, validity period, and some environments of your Idea
There is no time limit for server activation, which is permanently valid
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
1) windwos: C: \ Users \ user name \
2) macos: ~ / Library / Preferences /
3) ubuntu: ~
> After modifying the configuration file, restart Idea
4) Enter the activation code
After restarting Idea, click "Help"-> "Registerβ¦" in the menu bar, there are two activation methods:
> Choose the last license server activation method, fill in the address: http://jetbrains-license-server(it should be automatically filled in), or click the button: "Discover Server" to automatically fill in the address and complete the activation
5) If the server activation method cannot be activated, you can also select Activation code to activate, copy the activation code below :
pastebin.com/r8A6W7am
6) View the validity period
When your activation is complete, there will be a small registration prompt box in the lower right corner of Idea. The general content is: You copy is Licensed to XXX, it will tell you: Brother, you have activated successfully, and the source of the activation code is : XXX.
7) To check the validity period, click: Help-> About Here you can see the version number, license source, validity period, and some environments of your Idea
There is no time limit for server activation, which is permanently valid
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Pastebin
license by undercode - Pastebin.com
The latest IDEA permanent activation tutorial
> How activate pycharm for free Lastest version
> How activate pycharm for free Lastest version
π¦CAN'T SAY CRACKED BY UNDERCODE XD, ALREADY REPORTING FOR THEIR TEAM(jetbrain) AND IN NEXT UPDATE THEY WILL PATCH IT I GUESS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to evaluate OS security ?
---- With the development of the network, enterprises are connecting their local area networks to wide area networks or connecting their internal networks to the Internet. This gives more and more people (internal and external) access to internal network resources. As a result of this exposure, companies urgently need to address network security issues.
---- A major part of providing effective security is to evaluate how well the existing security mechanism is integrated with the enterprise's network security strategy-that is, to judge whether the security strategy is effectively implemented. The increasing complexity of the network makes the implementation of security policies more and more difficult.
---- Evaluating the effectiveness of each network security component is necessary to ensure effective network security. The two main components that provide network security are: firewall and operating system (OS).
---- Many companies put their energies on the firewall, and according to the report provided by Aberdeen Group, the most easily overlooked security holes are those that exist in the operating environment. Some vendors are committed to providing reliable versions of the operating environment, while most only provide optional, installable security services.
---- The operating system's security mechanism helps protect the machine running the OS from unauthorized access. Special protection for unauthorized access to specific information, specific machine instructions, and UNIX superuser instructions within the machine. Most firewalls and the Internet itself are built on a standard, unsecured UNIX operating environment. This is why everyone is not surprised by the existence of security threats. UNIX is very insecure, it is difficult to configure, and configuration errors may cause vulnerabilities.
---- The following two factors make the OS security mechanism very important:
---- (1) A second line of defense is provided behind the firewall. Hackers often break through or bypass firewalls, and OS security policies can effectively protect the system against such intruders.
---- (2) Defense against intruders in the enterprise. Internal intruders are already inside the firewall, and the FBI report indicates that more than 60% of computer crimes come from inside the enterprise. In most cases, the offenders are angry employees or contractors.
---- Evaluating OS security is quite difficult, especially UNIX, because it has many variants and vendors. Assessing the security of a UNIX system requires mastering the following three aspects:
---- (1) UNIX system settings
---- (2) Weaknesses caused by different versions of UNIX applications, including sending mail, FTP, NFS (Network File System) and TFTP (Simple File Transfer Protocol)
---- (3) Provided by different manufacturers Security patches-The
operating system is constantly patching BUGS and adding features to make the evaluation more complicated. These updates introduce new security vulnerabilities. What is needed at this time is a method for automatically evaluating operating system vulnerabilities and automatically implementing security policies. Only in this way can the gap between security strategy and security implementation be effectively assessed and shortened.
---- OS security scanning? The file just provides the required solution. The scanning software runs on each machine and probes each machine through a series of tests to dig out potential weaknesses. This software evaluates the stand-alone security environment from the perspective of the operating system and generates a detailed report of the vulnerabilities it finds, and proposes solutions.
π¦ How to evaluate OS security ?
---- With the development of the network, enterprises are connecting their local area networks to wide area networks or connecting their internal networks to the Internet. This gives more and more people (internal and external) access to internal network resources. As a result of this exposure, companies urgently need to address network security issues.
---- A major part of providing effective security is to evaluate how well the existing security mechanism is integrated with the enterprise's network security strategy-that is, to judge whether the security strategy is effectively implemented. The increasing complexity of the network makes the implementation of security policies more and more difficult.
---- Evaluating the effectiveness of each network security component is necessary to ensure effective network security. The two main components that provide network security are: firewall and operating system (OS).
---- Many companies put their energies on the firewall, and according to the report provided by Aberdeen Group, the most easily overlooked security holes are those that exist in the operating environment. Some vendors are committed to providing reliable versions of the operating environment, while most only provide optional, installable security services.
---- The operating system's security mechanism helps protect the machine running the OS from unauthorized access. Special protection for unauthorized access to specific information, specific machine instructions, and UNIX superuser instructions within the machine. Most firewalls and the Internet itself are built on a standard, unsecured UNIX operating environment. This is why everyone is not surprised by the existence of security threats. UNIX is very insecure, it is difficult to configure, and configuration errors may cause vulnerabilities.
---- The following two factors make the OS security mechanism very important:
---- (1) A second line of defense is provided behind the firewall. Hackers often break through or bypass firewalls, and OS security policies can effectively protect the system against such intruders.
---- (2) Defense against intruders in the enterprise. Internal intruders are already inside the firewall, and the FBI report indicates that more than 60% of computer crimes come from inside the enterprise. In most cases, the offenders are angry employees or contractors.
---- Evaluating OS security is quite difficult, especially UNIX, because it has many variants and vendors. Assessing the security of a UNIX system requires mastering the following three aspects:
---- (1) UNIX system settings
---- (2) Weaknesses caused by different versions of UNIX applications, including sending mail, FTP, NFS (Network File System) and TFTP (Simple File Transfer Protocol)
---- (3) Provided by different manufacturers Security patches-The
operating system is constantly patching BUGS and adding features to make the evaluation more complicated. These updates introduce new security vulnerabilities. What is needed at this time is a method for automatically evaluating operating system vulnerabilities and automatically implementing security policies. Only in this way can the gap between security strategy and security implementation be effectively assessed and shortened.
---- OS security scanning? The file just provides the required solution. The scanning software runs on each machine and probes each machine through a series of tests to dig out potential weaknesses. This software evaluates the stand-alone security environment from the perspective of the operating system and generates a detailed report of the vulnerabilities it finds, and proposes solutions.
---- System Security Scanner (S3) from ISS is a security assessment tool that facilitates the management and implementation of security policies. It enables companies to implement security policies across heterogeneous operating platforms. Currently, S3 supports most popular UNIX versions, including Linux, SunOS4.1.3, Solaris, HP-UX, and AIX. It helps companies automatically conduct security assessment and maintenance on their operating system platforms. With this effective tool, companies can make full use of the potential of the network and continuously enhance their competitivenessβwithout worrying about security.
WRitten by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
WRitten by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to limit the speed of others by wireless router
A) Router settings
1. First log in to your router to set the URL. The editor is 192.168.1.253. Β» DEFAULT IP After entering it in the browser, a login window will appear. Enter the login password to log in!
2. First of all, we can first look at the IP addresses on our router, click on the IP and MAC binding-ARP mapping table in the left navigation! !
3. Then we can see the IP address segment on the router, most of them start with 192.168.1.100! ! Look at the IP address so it's time to set it!
4. Then click on the IP broadband control in the left navigation. Then click on the control rules! !
5. The editor here has already been set, click the button to add a new item without setting!
6. The most important thing is that this rule is set. Your own IP can avoid this rule. For example, you can set the address range to 192.168.1.2-192.168.1.253, and then set your own IP to 192.168.1.254, which is basically Can control the speed of others in all routers! Set the port segment to 20-65535. This editor is also inquiring online. I don't know why. Haha! ! Then it is to control the network speed. Here is a good control according to the size of your network cable, there is no need to set too dead. It's okay to be average! !
7. After setting, click OK! ! Then restart the router! ! You can restart the router directly in the system settings in the router settings page navigation! !
B) Settings on the computer
1. After setting the router, of course, you need your own IP to avoid this rule! Let's check our IP address and DNS first! This is helpful for setting up! Click "Start"-"Run"! Then enter CMD!
2. After clicking OK, enter the code in this black box: ipconfig / all and then remember your DNS address! !
3. Then right-click on Network Neighborhood-Properties! Then right click on Local Area Connection-Properties! Then the following picture will appear! Click Internet Protocol. Then click on properties! !
4. Then set a fixed IP. IP address setting needs to avoid your setting rules in the router! Then the gateway is the address set by your router! DNS is the address that CMD just came out! After entering, click OK! !
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to limit the speed of others by wireless router
A) Router settings
1. First log in to your router to set the URL. The editor is 192.168.1.253. Β» DEFAULT IP After entering it in the browser, a login window will appear. Enter the login password to log in!
2. First of all, we can first look at the IP addresses on our router, click on the IP and MAC binding-ARP mapping table in the left navigation! !
3. Then we can see the IP address segment on the router, most of them start with 192.168.1.100! ! Look at the IP address so it's time to set it!
4. Then click on the IP broadband control in the left navigation. Then click on the control rules! !
5. The editor here has already been set, click the button to add a new item without setting!
6. The most important thing is that this rule is set. Your own IP can avoid this rule. For example, you can set the address range to 192.168.1.2-192.168.1.253, and then set your own IP to 192.168.1.254, which is basically Can control the speed of others in all routers! Set the port segment to 20-65535. This editor is also inquiring online. I don't know why. Haha! ! Then it is to control the network speed. Here is a good control according to the size of your network cable, there is no need to set too dead. It's okay to be average! !
7. After setting, click OK! ! Then restart the router! ! You can restart the router directly in the system settings in the router settings page navigation! !
B) Settings on the computer
1. After setting the router, of course, you need your own IP to avoid this rule! Let's check our IP address and DNS first! This is helpful for setting up! Click "Start"-"Run"! Then enter CMD!
2. After clicking OK, enter the code in this black box: ipconfig / all and then remember your DNS address! !
3. Then right-click on Network Neighborhood-Properties! Then right click on Local Area Connection-Properties! Then the following picture will appear! Click Internet Protocol. Then click on properties! !
4. Then set a fixed IP. IP address setting needs to avoid your setting rules in the router! Then the gateway is the address set by your router! DNS is the address that CMD just came out! After entering, click OK! !
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BEST 2020 LINUX IDE RECOMMENDED BY UNDERCODE :
https://netbeans.org/features/cpp/index.html
http://www.codeblocks.org/
https://www.eclipse.org/cdt/
https://www.gnu.org/software/emacs/
https://www.qt.io/ide/
https://www.adacore.com/gnatpro/toolsuite/gps
http://anjuta.org/
https://www.geany.org/
https://www.kdevelop.org/
https://code.visualstudio.com/
https://www.jetbrains.com/clion/
https://www.sublimetext.com/
https://atom.io/
http://bluefish.openoffice.nl/
http://codelite.org/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BEST 2020 LINUX IDE RECOMMENDED BY UNDERCODE :
https://netbeans.org/features/cpp/index.html
http://www.codeblocks.org/
https://www.eclipse.org/cdt/
https://www.gnu.org/software/emacs/
https://www.qt.io/ide/
https://www.adacore.com/gnatpro/toolsuite/gps
http://anjuta.org/
https://www.geany.org/
https://www.kdevelop.org/
https://code.visualstudio.com/
https://www.jetbrains.com/clion/
https://www.sublimetext.com/
https://atom.io/
http://bluefish.openoffice.nl/
http://codelite.org/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦CUSTOMIZE - CREATE YOUR OWN TERMUX USING THOSE TOOLS > oFFICIAL
> This project contains scripts and patches to build packages for the Termux Android application.
>The packages available here are only from main set. We have some additional repositories:
1) https://github.com/termux/game-packages
Game packages, e.g. angband or moon-buggy.
2) https://github.com/termux/science-packages
Science-related packages like gap and gnucap.
3) https://github.com/termux/termux-root-packages
Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).
4) https://github.com/termux/unstable-packages
Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.
5) https://github.com/termux/x11-packages
Packages that require X11 Windows System.
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦CUSTOMIZE - CREATE YOUR OWN TERMUX USING THOSE TOOLS > oFFICIAL
> This project contains scripts and patches to build packages for the Termux Android application.
>The packages available here are only from main set. We have some additional repositories:
1) https://github.com/termux/game-packages
Game packages, e.g. angband or moon-buggy.
2) https://github.com/termux/science-packages
Science-related packages like gap and gnucap.
3) https://github.com/termux/termux-root-packages
Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).
4) https://github.com/termux/unstable-packages
Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.
5) https://github.com/termux/x11-packages
Packages that require X11 Windows System.
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦TOPIC TERMUX SCRIPTS
> WE ALREADY POST ALL USAGE AND TERMUX-LINUX POPULAR SCRIPTS THIS LIST MAY HELPS NEW TERMUX USERS Β» THIS SOURCE WIKI β
Termux App βοΈ
Android terminal and Linux environment - app repository.
Aidlearning Framework βοΈ
AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. Now support VSCode,Jupyter, pyToApk! One-click install.π
Termux Packages βοΈ
Android terminal and Linux environment - packages repository.
Hiddeneye βοΈ
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services Android-Support-Available
Tool X βοΈ
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Snoop βοΈ
Snoop β ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½Ρ ΡΠ°Π·Π²Π΅Π΄ΠΊΠΈ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΠΎΡΠΊΡΡΡΡΡ Π΄Π°Π½Π½ΡΡ (OSINT world)
Hacktronian βοΈ
All in One Hacking Tool for Linux
Atilo βοΈ
Linux installer for termux
Termuxarch
You can use setupTermuxArch.bash π² to install Arch Linux in Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/TermuxArch/docs/install
Anlinux App
AnLinux allow you to run Linux on Android without root access.
Gbt βοΈ
Highly configurable prompt builder for Bash, ZSH and PowerShell written in Go.
Termux Api βοΈ
Termux add-on app which exposes device functionality as API to command line programs.
Termux Adb βοΈ
Install ADB & FastBoot Tools in Termux!
Termux Archlinux βοΈ
You can use setupTermuxArch.bash to install Arch Linux in Termux on Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/termux-archlinux/
Zphisher βοΈ
Automated Phishing Tool
Easyhack βοΈ
Hack the World using Termux
Bombers βοΈ
SMS/Email/Whatsapp bombers Collection π£
Gcctermux βοΈ
Gcc for termux with fortran scipy etc... Use apt for newest updates instructions in README.txt
Termux Styling βοΈ
Termux add-on app for customizing the terminal font and color theme.
Hackerpro βοΈ
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Telegram Scraper βοΈ
telegram group scraper tool. fetch all information about group members
Covid19 Tracker Cli βοΈ
A curl-based command line tracker for Novel Coronavirus or COVID-19 pandemic. It Supports terminal for linux and macos, command prompt for windows, and termux for android with real-time updates. curl -L covid19.trackercli.com
Lightnovel Crawler βοΈ
An app to download novels from online sources and generate e-books.
Buildapks βοΈ
Really quickly build APKs on handheld device (smartphone and tablet) in Amazon, Android, Chromebook, PRoot and Windowsπ² See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Txtool βοΈ
an easy pentesting tool.
Termux Api Package βοΈ
Termux package containing scripts to call functionality in Termux:API.
Termux Boot βοΈ
Termux add-on app allowing programs to be run at boot.
Debian On Termux
HOWTO install plain Debian 10 (buster) on your non-rooted Android smartphone
Termux Style
Simple Program for customizing the termux font and color theme...
Andronixorigin
This is the official repository for the back end of the Andronix app π.
π£ Impulse Denial-of-service ToolKit
Proot
An chroot-like implementation using ptrace.
Termuxalpine
Use TermuxAlpine.sh calling to install Alpine Linux in Termux on
Android. This setup script will attempt to set Alpine Linux up in your Termux environment.
Anlinux Resources
Image and Script for LinuxOnAndroid App
Nexphisher
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
X11 Packages
Packages using the X Window System.
Termux Widget
Termux add-on app which adds shortcuts to commands on the home screen.
Termux Desktop
Setup A Beautiful Desktop/GUI In Termux
Termux.github.io
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦TOPIC TERMUX SCRIPTS
> WE ALREADY POST ALL USAGE AND TERMUX-LINUX POPULAR SCRIPTS THIS LIST MAY HELPS NEW TERMUX USERS Β» THIS SOURCE WIKI β
Termux App βοΈ
Android terminal and Linux environment - app repository.
Aidlearning Framework βοΈ
AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. Now support VSCode,Jupyter, pyToApk! One-click install.π
Termux Packages βοΈ
Android terminal and Linux environment - packages repository.
Hiddeneye βοΈ
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services Android-Support-Available
Tool X βοΈ
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Snoop βοΈ
Snoop β ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½Ρ ΡΠ°Π·Π²Π΅Π΄ΠΊΠΈ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΠΎΡΠΊΡΡΡΡΡ Π΄Π°Π½Π½ΡΡ (OSINT world)
Hacktronian βοΈ
All in One Hacking Tool for Linux
Atilo βοΈ
Linux installer for termux
Termuxarch
You can use setupTermuxArch.bash π² to install Arch Linux in Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/TermuxArch/docs/install
Anlinux App
AnLinux allow you to run Linux on Android without root access.
Gbt βοΈ
Highly configurable prompt builder for Bash, ZSH and PowerShell written in Go.
Termux Api βοΈ
Termux add-on app which exposes device functionality as API to command line programs.
Termux Adb βοΈ
Install ADB & FastBoot Tools in Termux!
Termux Archlinux βοΈ
You can use setupTermuxArch.bash to install Arch Linux in Termux on Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/termux-archlinux/
Zphisher βοΈ
Automated Phishing Tool
Easyhack βοΈ
Hack the World using Termux
Bombers βοΈ
SMS/Email/Whatsapp bombers Collection π£
Gcctermux βοΈ
Gcc for termux with fortran scipy etc... Use apt for newest updates instructions in README.txt
Termux Styling βοΈ
Termux add-on app for customizing the terminal font and color theme.
Hackerpro βοΈ
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog
Telegram Scraper βοΈ
telegram group scraper tool. fetch all information about group members
Covid19 Tracker Cli βοΈ
A curl-based command line tracker for Novel Coronavirus or COVID-19 pandemic. It Supports terminal for linux and macos, command prompt for windows, and termux for android with real-time updates. curl -L covid19.trackercli.com
Lightnovel Crawler βοΈ
An app to download novels from online sources and generate e-books.
Buildapks βοΈ
Really quickly build APKs on handheld device (smartphone and tablet) in Amazon, Android, Chromebook, PRoot and Windowsπ² See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Txtool βοΈ
an easy pentesting tool.
Termux Api Package βοΈ
Termux package containing scripts to call functionality in Termux:API.
Termux Boot βοΈ
Termux add-on app allowing programs to be run at boot.
Debian On Termux
HOWTO install plain Debian 10 (buster) on your non-rooted Android smartphone
Termux Style
Simple Program for customizing the termux font and color theme...
Andronixorigin
This is the official repository for the back end of the Andronix app π.
π£ Impulse Denial-of-service ToolKit
Proot
An chroot-like implementation using ptrace.
Termuxalpine
Use TermuxAlpine.sh calling to install Alpine Linux in Termux on
Android. This setup script will attempt to set Alpine Linux up in your Termux environment.
Anlinux Resources
Image and Script for LinuxOnAndroid App
Nexphisher
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
X11 Packages
Packages using the X Window System.
Termux Widget
Termux add-on app which adds shortcuts to commands on the home screen.
Termux Desktop
Setup A Beautiful Desktop/GUI In Termux
Termux.github.io
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦WIKILEAKS DARKWEB- .ONION 2020 SITES
7/24 & 24/24 ONLINE
http://6sgjmi53igmg7fm7.onion/index.php?title=Main_Page β
Bugged Planet
http://faerieuaahqvzgby.onion/ β Fairie Underground
http://2r2tz6wzqh7gaji7.onion/ β Kavkaz Center
http://tnysbtbxsf356hiy.onion/ β The New Yorker Strongbox
http://duskgytldkxiuqc6.onion/ β Example rendezvous points page
http://rrcc5uuudhh4oz3c.onion/ β The Intel Exchange Forum :: Information and discussion on various topics, ranging from Illegal Activities and Alternative Energy, to Conspiracy Theories and Hacking. Same people from SnapBBS on a fully secure, moderated and categorized forum.
http://opnju4nyz7wbypme.onion/weblog/index.html β A7B blog :: a blog dedicated to the restoration of a limited constitutional republic in the USA
http://assmkedzgorodn7o.onion/ β Anonymous, safe, secure, crowdfunded assassinations.
http://duskgytldkxiuqc6.onion/comsense.html β Commo Sense by Thomas Paine
http://nwycvryrozllb42g.onion/ β Destination Unknown
http://zbnnr7qzaxlk5tms.onion/ β Wiki Leaks
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦WIKILEAKS DARKWEB- .ONION 2020 SITES
7/24 & 24/24 ONLINE
http://6sgjmi53igmg7fm7.onion/index.php?title=Main_Page β
Bugged Planet
http://faerieuaahqvzgby.onion/ β Fairie Underground
http://2r2tz6wzqh7gaji7.onion/ β Kavkaz Center
http://tnysbtbxsf356hiy.onion/ β The New Yorker Strongbox
http://duskgytldkxiuqc6.onion/ β Example rendezvous points page
http://rrcc5uuudhh4oz3c.onion/ β The Intel Exchange Forum :: Information and discussion on various topics, ranging from Illegal Activities and Alternative Energy, to Conspiracy Theories and Hacking. Same people from SnapBBS on a fully secure, moderated and categorized forum.
http://opnju4nyz7wbypme.onion/weblog/index.html β A7B blog :: a blog dedicated to the restoration of a limited constitutional republic in the USA
http://assmkedzgorodn7o.onion/ β Anonymous, safe, secure, crowdfunded assassinations.
http://duskgytldkxiuqc6.onion/comsense.html β Commo Sense by Thomas Paine
http://nwycvryrozllb42g.onion/ β Destination Unknown
http://zbnnr7qzaxlk5tms.onion/ β Wiki Leaks
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π1