10. Study human psychology and conduct cryptographic psychology
Many well-known hackers do not use cutting-edge technology to crack passwords, but only use password psychology. They start from the user's psychology, analyze the user's information and analyze the user's psychology, so as to crack the password faster. In fact, there are many ways to obtain information. If you have a good grasp of password psychology, you can quickly crack and obtain user information.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Many well-known hackers do not use cutting-edge technology to crack passwords, but only use password psychology. They start from the user's psychology, analyze the user's information and analyze the user's psychology, so as to crack the password faster. In fact, there are many ways to obtain information. If you have a good grasp of password psychology, you can quickly crack and obtain user information.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
mega.nz
1.42 GB folder on MEGA
457 files and 12 subfolders
Forwarded from Backup Legal Mega
mega.nz
File folder on MEGA
π¦Termux tutorials - commands :
check recently termux 2 pdfs +
1) How To Install Package in Termux
pkg install <package name>
2)How To search Package
pkg search <query>
3)How To Upgrade Package
pkg upgrade
4) Uninstall
pkg uninstall <pkg name>
5) Install Mosquitto MQTT Broker
After Installation, Run Termux app. Then at the prompt type
pkg install mosquitto mosquitto
6) Install Node-Red
Prompt type :
apt update
apt upgrade
apt install coreutils nano nodejs
npm i -g --unsafe-perm node-red
node-red Then you can point a browser to localhost:1880
7) Install C language
pkg install clang
8) Install Python
pkg install python
9) Install NodeJS
pkg install nodejs
10) Install Go programming language
apt install golang
11) Install PHP language
apt install php
12) How To use SSH
pkg install dropbear
pkg install openssh
13)Find IP address
ifconfig
14) Install nano Editor
pkg install nano
15) Install Git GitHub tool
apt install git
16) Control Raspberry Pi
If you have a headless Pi, then you can Control and use Raspberry Pi via SSH using Termux. How to setup truly headless RPi β How To Use Raspberry pi in a truely headless mode
17) Install Apache2
apt update
apt upgrade
apt install apache2
Remember Apache directory is this /data/data/com.termux/files/usr/share/apache2/default-site/htdocs/
For example I have read.txt if you want to move this read.txt to Apache directory then I use this command
mv read.txt /data/data/com.termux/files/usr/share/apache2/default-site/htdocs/
To start apache2 server in Termux type this command :
apachectl
Now open browser and type localhost:8080/read.txt
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
check recently termux 2 pdfs +
1) How To Install Package in Termux
pkg install <package name>
2)How To search Package
pkg search <query>
3)How To Upgrade Package
pkg upgrade
4) Uninstall
pkg uninstall <pkg name>
5) Install Mosquitto MQTT Broker
After Installation, Run Termux app. Then at the prompt type
pkg install mosquitto mosquitto
6) Install Node-Red
Prompt type :
apt update
apt upgrade
apt install coreutils nano nodejs
npm i -g --unsafe-perm node-red
node-red Then you can point a browser to localhost:1880
7) Install C language
pkg install clang
8) Install Python
pkg install python
9) Install NodeJS
pkg install nodejs
10) Install Go programming language
apt install golang
11) Install PHP language
apt install php
12) How To use SSH
pkg install dropbear
pkg install openssh
13)Find IP address
ifconfig
14) Install nano Editor
pkg install nano
15) Install Git GitHub tool
apt install git
16) Control Raspberry Pi
If you have a headless Pi, then you can Control and use Raspberry Pi via SSH using Termux. How to setup truly headless RPi β How To Use Raspberry pi in a truely headless mode
17) Install Apache2
apt update
apt upgrade
apt install apache2
Remember Apache directory is this /data/data/com.termux/files/usr/share/apache2/default-site/htdocs/
For example I have read.txt if you want to move this read.txt to Apache directory then I use this command
mv read.txt /data/data/com.termux/files/usr/share/apache2/default-site/htdocs/
To start apache2 server in Termux type this command :
apachectl
Now open browser and type localhost:8080/read.txt
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Packt - TypeScript for JavaScript Developers
#expert - course (4 rating stars )
https://mega.nz/folder/EuB13STS#EZnpuPmLdqpZzLvgBHuCqg
#expert - course (4 rating stars )
https://mega.nz/folder/EuB13STS#EZnpuPmLdqpZzLvgBHuCqg
mega.nz
522.15 MB folder on MEGA
33 files and 7 subfolders
Scripting Metasploit to exploit a group of hosts..pdf
1.2 MB
Scripting Metasploit to exploit a group of hosts / servers ...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to install secure, robust Mosquitto MQTT broker on AWS Ubuntu ?
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Install Mosquitto
Log into the AWS Ubuntu Instance.
1οΈβ£$ sudo apt-get update
> Install iboth the mosquitto broker and the publish / subscribe clients.
2οΈβ£$ sudo apt-get install mosquitto mosquitto-clients
Example for subscribe:
3οΈβ£$ mosquittosub -h localhost -t mychanel
Example for publish:
4οΈβ£$ mosquittopub -h localhost -t mychanel "Hello World"
2) Enable Remote Access
5οΈβ£To publish or subscribe using this broker from a remote machine, we need first open port 1883 in the security group setting. Using the AWS console, go to the security group and open port 1883 to everyone.
The default config file may permit connections from localhost only. The default conf file is can be opened
6οΈβ£$ sudo vim /etc/mosquitto/conf.d/default.conf
The file should contain line following enable remote usage
listener 1883
Note that this port is currently unsecured, so if you donβt want to permit remote access:
listener 1883 localhost
Everytime you edit the conf file, you will have to restart the service for the settings to take effect.
$ sudo systemctl restart mosquitto
3) Robust MQTT
If MQTT broker crashed sometimes, disabling the real time communication. So we added a script that checked the state of the process and restarted Mosquitto in case it was down.
7οΈβ£
8οΈβ£This can script can be saved in a file say βmosquittorestart.shβ.
This file needs to be made an executable and then put in a cron job that runs every 5 minutes. The cron should be set as root.
9οΈβ£$ chmod +x mosquittorestart.sh
π$ sudo -i
1οΈβ£1οΈβ£$ crontab -e
Add the following statement
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to install secure, robust Mosquitto MQTT broker on AWS Ubuntu ?
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Install Mosquitto
Log into the AWS Ubuntu Instance.
1οΈβ£$ sudo apt-get update
> Install iboth the mosquitto broker and the publish / subscribe clients.
2οΈβ£$ sudo apt-get install mosquitto mosquitto-clients
Example for subscribe:
3οΈβ£$ mosquittosub -h localhost -t mychanel
Example for publish:
4οΈβ£$ mosquittopub -h localhost -t mychanel "Hello World"
2) Enable Remote Access
5οΈβ£To publish or subscribe using this broker from a remote machine, we need first open port 1883 in the security group setting. Using the AWS console, go to the security group and open port 1883 to everyone.
The default config file may permit connections from localhost only. The default conf file is can be opened
6οΈβ£$ sudo vim /etc/mosquitto/conf.d/default.conf
The file should contain line following enable remote usage
listener 1883
Note that this port is currently unsecured, so if you donβt want to permit remote access:
listener 1883 localhost
Everytime you edit the conf file, you will have to restart the service for the settings to take effect.
$ sudo systemctl restart mosquitto
3) Robust MQTT
If MQTT broker crashed sometimes, disabling the real time communication. So we added a script that checked the state of the process and restarted Mosquitto in case it was down.
7οΈβ£
if "ps -aux | grep /usr/sbin/mosquitto | wc -l" == "1"
then
echo "mosquitto wasnt running so attempting restart" >> /home/ubuntu/cron.log
systemctl restart mosquitto
exit 0
fi
echo "$SERVICE is currently running" >> /home/ubuntu/cron.log
exit 0
8οΈβ£This can script can be saved in a file say βmosquittorestart.shβ.
This file needs to be made an executable and then put in a cron job that runs every 5 minutes. The cron should be set as root.
9οΈβ£$ chmod +x mosquittorestart.sh
π$ sudo -i
1οΈβ£1οΈβ£$ crontab -e
Add the following statement
* * * * /home/ubuntu/mosquitto_restart.shenjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Complete Conf file for reference It uses password protection, runs a MQTT on port 1883, for ubuntu-kali-
> MQTTS on port 1884, websockets on port 3033, and WSS on port 8083. Do not forget the open these ports in the security group.
allowanonymous false
passwordfile /etc/mosquitto/passwd
listener 1883
listener 1884
certfile /etc/letsencrypt/live/mqtt.example.io/cert.pem
cafile /etc/letsencrypt/live/mqtt.example.io/chain.pem
keyfile /etc/letsencrypt/live/mqtt.example.io/privkey.pem
listener 3033
protocol websockets
listener 8083
protocol websockets
certfile /etc/letsencrypt/live/mqtt.example.io/cert.pem
cafile /etc/letsencrypt/live/mqtt.example.io/chain.pem
keyfile /etc/letsencrypt/live/mqtt.example.io/privkey.pem
enjoyβ€οΈππ»
wiki source
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Complete Conf file for reference It uses password protection, runs a MQTT on port 1883, for ubuntu-kali-
> MQTTS on port 1884, websockets on port 3033, and WSS on port 8083. Do not forget the open these ports in the security group.
allowanonymous false
passwordfile /etc/mosquitto/passwd
listener 1883
listener 1884
certfile /etc/letsencrypt/live/mqtt.example.io/cert.pem
cafile /etc/letsencrypt/live/mqtt.example.io/chain.pem
keyfile /etc/letsencrypt/live/mqtt.example.io/privkey.pem
listener 3033
protocol websockets
listener 8083
protocol websockets
certfile /etc/letsencrypt/live/mqtt.example.io/cert.pem
cafile /etc/letsencrypt/live/mqtt.example.io/chain.pem
keyfile /etc/letsencrypt/live/mqtt.example.io/privkey.pem
enjoyβ€οΈππ»
wiki source
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What are all termux addons ?
#ForBeginers
<> Addons
Some extra features available. You can add them by installing addons:
1) Termux:API β Access Android and Chrome hardware features.
2) Termux:Boot β Run script(s) when your device boots.
3) Termux:Float β Run in a floating window.
4) Termux:Styling β Have color schemes and powerline-ready fonts customize the appearance of the terminal.
5) Termux:Task β An easy way to call Termux executables from Tasker and compatible apps.
6) Termux:Widget β Start small scriptlets from the home screen.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What are all termux addons ?
#ForBeginers
<> Addons
Some extra features available. You can add them by installing addons:
1) Termux:API β Access Android and Chrome hardware features.
2) Termux:Boot β Run script(s) when your device boots.
3) Termux:Float β Run in a floating window.
4) Termux:Styling β Have color schemes and powerline-ready fonts customize the appearance of the terminal.
5) Termux:Task β An easy way to call Termux executables from Tasker and compatible apps.
6) Termux:Widget β Start small scriptlets from the home screen.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Extracting the payload from a pcap file using Python.pdf
1.4 MB
Extracting the payload from a pcap file using Python so helpful
- enjoy :)
- enjoy :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Many Hackers asking what is difference between termux & Cmd or terminal apk on android & termux so popular
#ForBeginers
> forget about python and scripting let's take a look to termux features not avaible for Terminal apk app :))
1) Secure. Access remote servers using the ssh client from OpenSSH. Termux combines standard packages with accurate terminal emulation in a beautiful open source solution.
2) Feature packed. Take your pick between Bash, fish or Zsh and nano, Emacs or Vim. Grep through your SMS inbox.
3) Access API endpoints with curl and use rsync to store backups of your contact list on a remote server.
4) Customizable. Install what you want through the APT package management system known from Debian and Ubuntu GNU/Linux. Why not start with installing Git and syncing your dotfiles?
5) Explorable. Have you ever sat on a bus and wondered exactly which arguments tar accepts? Packages available in Termux are the same as those on Mac and Linux β install man pages on your phone and read them in one session while experimenting with them in another.
6) With batteries included. Can you imagine a more powerful yet elegant pocket calculator than a readline-powered Python console? Up-to-date versions of Perl, Python, Ruby and Node.js are all available.
7) Ready to scale up. Connect a Bluetooth keyboard and hook up your device to an external display if you need to β It supports keyboard shortcuts and has full mouse support.
8) Tinkerable. Develop by compiling C files with Clang and build your own projects with CMake and pkg-config. Both GDB and strace are available if you get stuck and need to debug.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
βtermux features
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Many Hackers asking what is difference between termux & Cmd or terminal apk on android & termux so popular
#ForBeginers
> forget about python and scripting let's take a look to termux features not avaible for Terminal apk app :))
1) Secure. Access remote servers using the ssh client from OpenSSH. Termux combines standard packages with accurate terminal emulation in a beautiful open source solution.
2) Feature packed. Take your pick between Bash, fish or Zsh and nano, Emacs or Vim. Grep through your SMS inbox.
3) Access API endpoints with curl and use rsync to store backups of your contact list on a remote server.
4) Customizable. Install what you want through the APT package management system known from Debian and Ubuntu GNU/Linux. Why not start with installing Git and syncing your dotfiles?
5) Explorable. Have you ever sat on a bus and wondered exactly which arguments tar accepts? Packages available in Termux are the same as those on Mac and Linux β install man pages on your phone and read them in one session while experimenting with them in another.
6) With batteries included. Can you imagine a more powerful yet elegant pocket calculator than a readline-powered Python console? Up-to-date versions of Perl, Python, Ruby and Node.js are all available.
7) Ready to scale up. Connect a Bluetooth keyboard and hook up your device to an external display if you need to β It supports keyboard shortcuts and has full mouse support.
8) Tinkerable. Develop by compiling C files with Clang and build your own projects with CMake and pkg-config. Both GDB and strace are available if you get stuck and need to debug.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
βtermux features
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Protocols names & functions :)
1) Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination.
2) Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks.
3) User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications.
4) Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
5) Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail.
6) File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc.
7) Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly.
8) Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.
9) Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer.
10) Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
(powered by wiki)\
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Protocols names & functions :)
1) Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination.
2) Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks.
3) User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications.
4) Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
5) Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail.
6) File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc.
7) Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly.
8) Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.
9) Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer.
10) Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
(powered by wiki)\
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ 2020 Web Development Bootcamp full course β18 Gbβ
- 4,7rating stars
-price $139.99
https://mega.nz/folder/Zq5miKQI#rdXFJRvgAAHvBLbe0EBPeQ
- 4,7rating stars
-price $139.99
https://mega.nz/folder/Zq5miKQI#rdXFJRvgAAHvBLbe0EBPeQ
mega.nz
13.23 GB folder on MEGA
202 files and 34 subfolders
UAC_BYPASS_WITH_ELEVATED_PRIVILEGESWORKS_ON_ALL_WINDOWS_VERSIONS.pdf
301.9 KB
UAC BYPASS WITH ELEVATED PRIVILEGESWORKS ON ALL WINDOWS VERSIONS
#Requested
#Requested
Forwarded from UNDERCODE COMMUNITY
π¦Follow Undercode Testing on :
> Twitter
> Twitter
> instagram
> Facebook
> Pinterest
> Linkedln
> Youtube
> Telegram
> Linkedln
> Youtube
> Telegram
Twitter
UNDERCODE TESTING {TRAINING} (@UndercodeTrain) | Twitter
The latest Tweets from UNDERCODE TESTING {TRAINING} (@UndercodeTrain). Expert Hacking | Training | Security | Hosting & much more ... @UndercodeNews @UndercodeTrain @iUndercode @DailyCve. Lebanon
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦EU sanctions China, North Korea and Russia for the first time on the grounds of cyber attacks :
#News
> On Thursday, the European Union announced that it would impose sanctions on six individuals and three entities from Russia and China who carried out or participated in various so-called "cyber attacks." In addition, the European Union also stated that it has locked a special technical department of Russian military intelligence, namely The General Staff of the Armed Forces of the Russian Federation GRU.
> The three organizations subject to sanctions are Russiaβs GRU, North Koreaβs Chosun Expo, and Chinaβs Haitai Technology Development Co., Ltd.
This is the first EU sanctions related to cyber attacks. Sanctions include imposing travel bans, freezing assets, and prohibiting EU personnel and entities from providing funds to sanctioned targets.
In fact, the EU has imposed sanctions on China because of "China's treatment of Hong Kong" before, in order to move closer to the Trump administration's relatively tough stance on China.
> And Borelli, the EUβs high representative for foreign and security policy, once voiced that the US increasingly uses sanctions against European companies or threats with sanctions will harm European interests. "The EU opposes sanctions imposed by third countries on the legal operations of European companies. This kind of'extraterritorial sanctions' violates international law." But obviously, after only half a month, the EU has also chosen cyber sanctions.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦EU sanctions China, North Korea and Russia for the first time on the grounds of cyber attacks :
#News
> On Thursday, the European Union announced that it would impose sanctions on six individuals and three entities from Russia and China who carried out or participated in various so-called "cyber attacks." In addition, the European Union also stated that it has locked a special technical department of Russian military intelligence, namely The General Staff of the Armed Forces of the Russian Federation GRU.
> The three organizations subject to sanctions are Russiaβs GRU, North Koreaβs Chosun Expo, and Chinaβs Haitai Technology Development Co., Ltd.
This is the first EU sanctions related to cyber attacks. Sanctions include imposing travel bans, freezing assets, and prohibiting EU personnel and entities from providing funds to sanctioned targets.
In fact, the EU has imposed sanctions on China because of "China's treatment of Hong Kong" before, in order to move closer to the Trump administration's relatively tough stance on China.
> And Borelli, the EUβs high representative for foreign and security policy, once voiced that the US increasingly uses sanctions against European companies or threats with sanctions will harm European interests. "The EU opposes sanctions imposed by third countries on the legal operations of European companies. This kind of'extraterritorial sanctions' violates international law." But obviously, after only half a month, the EU has also chosen cyber sanctions.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ABOUT 500 TERMUX TOOLS #FASTINSTALL :
1οΈβ£How to install Metasploit in Termux?
open your Termux app and type the following commands one by one and wait for each command to get finished.
pkg update && pkg upgrade -y
pkg install unstable-repo
pkg install metasploit
2οΈβ£How to install Nmap in Termux?
Open your Termux app and type the following commands:
pkg update && pkg upgrade -y
pkg install curl
pkg install nmap
3οΈβ£How to install SQLMAP in Termux
Open your Termux and type the following commands one by one in order to install SQLMAP.
pkg update && pkg upgrade -y
apt install python python2
pkg install git
git clone https://github.com/sqlmapproject/sqlmap
cd sqlmap
chmod +x sqlmap.py
python2 sqlmap.py
4οΈβ£How to install Social Engineering Toolkit in Termux
pkg update && pkg upgrade -y
apt install curl -y
curl -LO https://raw.githubusercontent.com/Hax4us/setoolkit/master/setoolkit.sh
sh setoolkit.sh
After finishing the above process type the following command
cd setoolkit
./setup.py install
./setoolkit
5οΈβ£How to install Nikto in Termux
Open your Termux and type the following commands one by one:
apt update && apt upgrade
pkg install git
pkg install perl
git clone https://github.com/sullo/nikto.git
cd nikto
cd program
6οΈβ£How to install Tool-X in Termux
Open your Termux and type the following command one by one
pkg update && pkg upgrade -y
pkg install git
git clone https://github.com/Rajkumrdusad/Tool-X.git
cd Tool-X
chmod +x install.aex
sh install.aex
./install.aex
(MORE THAN 300 TOOL)
7οΈβ£How to install Fsociety Toolkit in Termux
Open your Termux and type the below commands one by one in order to install Fsociety Toolkit.
pkg update && pkg upgrade
pkg install git
pkg install python2
git clone https://github.com/Manisso/fsociety.git
cd fsociety
chmod +x install.sh
That's it Fsociety is installed in your Termux. You can simply go to the society directory and type the following command to run the tool
8οΈβ£How to install Hydra in Termux
The installation of Hydra in Termux is very simple. Just open your Termux and type the following commands
pkg update && pkg upgrade -y
pkg install hydra
That's it Hydra has been installed in your Termux.
To see the usage of Hydra simply type the following command:
hydra -h
The above command will guide you to how to use Hydra in Termux
9οΈβ£How to install Slowloris
Open your Termux and type the following commands one by one
pkg update && pkg upgrade -y
pkg install python
pkg install slowloris
Hence the slowloris is installed in your Termux. Now simply type the below command to see how to use slowloris.
slowloris
π¦ABOUT 500 TERMUX TOOLS
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ABOUT 500 TERMUX TOOLS #FASTINSTALL :
1οΈβ£How to install Metasploit in Termux?
open your Termux app and type the following commands one by one and wait for each command to get finished.
pkg update && pkg upgrade -y
pkg install unstable-repo
pkg install metasploit
2οΈβ£How to install Nmap in Termux?
Open your Termux app and type the following commands:
pkg update && pkg upgrade -y
pkg install curl
pkg install nmap
3οΈβ£How to install SQLMAP in Termux
Open your Termux and type the following commands one by one in order to install SQLMAP.
pkg update && pkg upgrade -y
apt install python python2
pkg install git
git clone https://github.com/sqlmapproject/sqlmap
cd sqlmap
chmod +x sqlmap.py
python2 sqlmap.py
4οΈβ£How to install Social Engineering Toolkit in Termux
pkg update && pkg upgrade -y
apt install curl -y
curl -LO https://raw.githubusercontent.com/Hax4us/setoolkit/master/setoolkit.sh
sh setoolkit.sh
After finishing the above process type the following command
cd setoolkit
./setup.py install
./setoolkit
5οΈβ£How to install Nikto in Termux
Open your Termux and type the following commands one by one:
apt update && apt upgrade
pkg install git
pkg install perl
git clone https://github.com/sullo/nikto.git
cd nikto
cd program
6οΈβ£How to install Tool-X in Termux
Open your Termux and type the following command one by one
pkg update && pkg upgrade -y
pkg install git
git clone https://github.com/Rajkumrdusad/Tool-X.git
cd Tool-X
chmod +x install.aex
sh install.aex
./install.aex
(MORE THAN 300 TOOL)
7οΈβ£How to install Fsociety Toolkit in Termux
Open your Termux and type the below commands one by one in order to install Fsociety Toolkit.
pkg update && pkg upgrade
pkg install git
pkg install python2
git clone https://github.com/Manisso/fsociety.git
cd fsociety
chmod +x install.sh
That's it Fsociety is installed in your Termux. You can simply go to the society directory and type the following command to run the tool
8οΈβ£How to install Hydra in Termux
The installation of Hydra in Termux is very simple. Just open your Termux and type the following commands
pkg update && pkg upgrade -y
pkg install hydra
That's it Hydra has been installed in your Termux.
To see the usage of Hydra simply type the following command:
hydra -h
The above command will guide you to how to use Hydra in Termux
9οΈβ£How to install Slowloris
Open your Termux and type the following commands one by one
pkg update && pkg upgrade -y
pkg install python
pkg install slowloris
Hence the slowloris is installed in your Termux. Now simply type the below command to see how to use slowloris.
slowloris
π¦ABOUT 500 TERMUX TOOLS
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - sqlmapproject/sqlmap: Automatic SQL injection and database takeover tool
Automatic SQL injection and database takeover tool - sqlmapproject/sqlmap
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME VERIFIED BINS :
> Bin Spotify
Bin: 43476953xxxxxxxx
Date/CCV: Random
Zip Code: 10080
IP: USA
> BIN SHUDDER 1 MONTH
BIN: 5392249xxxxxxxxx
IP: USA πΊπΈ 10080
PROMO CODE: SHUTIN
> Bin google ads
536517xxxxxxxxxx
IP: BRAZIL
>Bin For WWE Network Premium
BIN: 52187011xxxxxxxx
IP: USA πΊπΈ NY STREET 1xx
10080
LINK: https://www.wwe.com/wwenetwork
> Bin NameCheap vpn
650159xxxxxxxxxx
Ip USA
10080
π¦Those bin Only veriified by Us & not created
> use for learn
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME VERIFIED BINS :
> Bin Spotify
Bin: 43476953xxxxxxxx
Date/CCV: Random
Zip Code: 10080
IP: USA
> BIN SHUDDER 1 MONTH
BIN: 5392249xxxxxxxxx
IP: USA πΊπΈ 10080
PROMO CODE: SHUTIN
> Bin google ads
536517xxxxxxxxxx
IP: BRAZIL
>Bin For WWE Network Premium
BIN: 52187011xxxxxxxx
IP: USA πΊπΈ NY STREET 1xx
10080
LINK: https://www.wwe.com/wwenetwork
> Bin NameCheap vpn
650159xxxxxxxxxx
Ip USA
10080
π¦Those bin Only veriified by Us & not created
> use for learn
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β