ANDRAX - GROUP
1.93K subscribers
1 photo
3 videos
16 files
24 links
💥ANDRAX- THE MOST POWERFULL PENETRATION TESTING SOFTWARE ON ANDROID
👉BASIC INFORMATION FOR BEGINNERS
👉IMPORTED TOOLS FROM ANDROID TO PC
👉ANDRAX HELP
👉🙏RESPECT EACH OTHERS
👉💀OTHER CHANNEL PROMOTERS WILL BE BANNED Immediately
MAIN GRP- @hackersmeet0
Download Telegram
CHANGELOG:

v4 BUILD:2 [ 02/12/2019 ]

Fixed crash's
New MARINA version


v4 BUILD:1 [ 25/11/2019 ]

New terminal | GNOME/Mate Terminal like
New installation method
New M.A.R.I.N.A version
DCO Reorganized tools
New Adaptative icons

DHCPig removed
Siege removed
Jshell removed

Updated tools
AXSurf updated

New comfiguration on amass

Fixed sort
Fixed netstat
Fixed TLD_Scanner
Fixed installation crashs

Added double check to prevent motherfuckers who kill ANDRAX
in Baterry Otimization (If user block ANDRAX will force in anyway!)
Added lbd
Added netmask
Added nbtscan
Added smbmap
Added smtp-user-enum
Added onesixtyone
Added ike-scan
Added psk-crack
Added joomlavs
Added vulnx
Added ua-tester
Added cadaver
Added wifiarp
Added wifidns
Added wifiping
Added wifitap
Added eapmd5pass
Added figlet

Added Nemesis to DCO
Added XSpear to DCO
Added mikrotaker to DCO
Added fragroute to DCO
Added arping to DCO
Added dnsdict6 to DCO
Added inverse_lookup6 to DCO
Added thcping6 to DCO
Added trace6 to DCO
Added netdiscover to DCO
Added p0f to DCO
Added fuzz_ip6 to DCO
Added flood_advertise6 to DCO
Added flood_dhcpc6 to DCO
Added flood_mld26 to DCO
Added flood_mld6 to DCO
Added flood_mldrouter6 to DCO
Added flood_redir6 to DCO
Added flood_router26 to DCO
Added flood_router6 to DCO
Added flood_rs6 to DCO
Added flood_solicitate6 to DCO
Added flood_unreach6 to DCO
Added denial6 to DCO
Added fragmentation6 to DCO
Added kill_router6 to DCO
Added rsmurf6 to DCO
Added detect_sniffer6 to DCO
Added dos-new-ip6 to DCO
Added fake_advertise6 to DCO
Added fake_dhcps6 to DCO
Added fake_dns6d to DCO
Added fake_dnsupdate6 to DCO
Added fake_mld26 to DCO
Added fake_mld6 to DCO
Added fake_mldrouter6 to DCO
Added fake_router26 to DCO
Added fake_router6 to DCO
Added fake_solicitate6 to DCO
Added implementation6 to DCO
Added parasite6 to DCO
Added randicmp6 to DCO
Added redir6 to DCO
Added smurf6 to DCO
Added pixiewps to DCO
Added wifite2 to DCO

v3 STABLE [ 07/08/2019 ]

AXSurf
AFOS fixed

v3 BUILD:6 [ 07/08/2019 ]

Updated tools

Added Mikrotaker
Added Xspear

Changed download server

v3 BUILD:5 [ 25/07/2019 ]

Updated tools

Added nemesis
Added MARINA
Fixed NodeXP

Fixed some Crashs

v3 BUILD:4 [ 27/06/2019 ]

Updated tools
Updated AFOS (previous versions was errored)
Added new BUGs to fix later
Fixed Crashs

v3 BUILD:3 [ 20/06/2019 ]

Fix apps crashs
Fix SigPloit Java PATH
Fix some AFOS faults
Fixed Crashs

v3 BUILD:2 [ 10/06/2019 ]

Removed old LAUNCHER tools
Updated commit() to apply() (Prevent bugs)
Added WakeLock Permission
Added Singularity Framework
Fixed Crashs

v3 BUILD:1 [ 02/06/2019 ]

Updated a lot of tools

Removed cache files
Removed Ruby gems
Removed APKTOOL
Removed JAVA
Removed DarkSpiritz framework
Removed getsploit

NEW [ Tutorials Videos and Articles Activity ]
NEW [ Module AXSurf for Anonymize ]

Added Hashboy
Added Goca
Added CMSeeK
Added ISF
Added XanXSS
Added ReconDog
Added RED_HAWK
Added iSMTP
Added libusb-1-dev
Added BlueZ Tools for bluetooth Hacking
Added Bluesnarfer
Added Wfuzz
Added Nettacker
Added SIXNET-tools
Added ISAF
Added Netdiscover
Added modbus-cli
Added atg-info
Added BACnet-discover-enumerate
Added codesys-v2-discover
Added cspv4-info
Added dnp3-info
Added enip-enumerate
Added fox-info
Added modicon-info
Added omrontcp-info
Added omronudp-info
Added pcworx-info
Added proconos-info
Added s7-enumerate
Added Siemens-CommunicationsProcessor
Added Siemens-HMI-miniweb
Added Siemens-Scalance-module
Added Siemens-SIMATIC-PLC-S7
Added Siemens-WINCC
Added iec-identify
Added mms-identify
Added get_seed_range
Added iec-60870-5-104
Added iec-61850-8-1
Added profinet_scanner.noscapy
Added profinet_scanner.scapy
Added profinet_set_fuzzer
Added profinet_set_network_info
Added s7-1200_brute_offline
Added s7-1500_brute_offline
Added s7-packet-structure
Added s7_password_hashes_extractor
Added s7-show-payloads
Added show_byte_sequences
Added SCADAPASS
Added mbtget
Added modscan
Added plcscan
Added s7scan
Added Expliot
Added crackle
Added CANToolz
Added CryptoMobile
Added SigPloit
Added MinGW32
Added pycrate
Mikrotik Special Login Feature

To access the Mikrotik Router there are certainly many ways that we can use. We can remotely Router by GUI (Graphical User Interface), or by CLI (Command Line Interface). There are several tools that we can use to remotely router in a GUI. Examples of applications are Winbox, Webfig and Mikrotik (Android & IOS). Then applications for remote Router CLI are Telnet, SSH and Serial.

Special Login is used to access routers that are connected using the Console Cable by opening a telnet / ssh session that will direct you directly to the device (without having to log in to RouterOS first).

-----------------------------------------------------------------------------------------------------------

Maybe there are some questions for this special login feature,

1. To access Router2, why not directly connect it to a laptop? Well maybe the case is that you don't have a USB to RS232 Cable, you only have a Serial / Console cable. Thus we can use the "Special Login" feature.

2. Why don't Router1 and Router2 only connect using an ethernet cable? Isn't the need so that we can remotely Router2? Now for this case, for example, Router2 already has a complex configuration, and all interfaces contained in Router2 are accidentally disabled. Reset or Netinstall is not possible, so we can access Router2 using Console / Serial cable, and reactivate the interface that was accidentally disabled.
👆 go through the valueable new information on andrax
Nethunter Kernel can also be used with ANDRAX.
ANDRAX Open DIscussion Group.
Everyone is invited to share their knowledge and discuss problems.

https://t.me/joinchat/HxCOaRW4DNGei8lutF2nsg
ANDRAX - GROUP pinned «ANDRAX Open DIscussion Group. Everyone is invited to share their knowledge and discuss problems. https://t.me/joinchat/HxCOaRW4DNGei8lutF2nsg»
Channel name was changed to «ANDRAX - DISCUSSION GROUP»
Channel name was changed to «ANDRAX - GROUP»
Windows injection Black Hat 2019
This media is not supported in your browser
VIEW IN TELEGRAM
img_8285(1)_eVsmh1uN4G.jpeg
57.2 KB
mobile-report.pdf
6.3 MB
MOBILE HACKING REPORT 2019-2020
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
SAS - Saefko Attack Systems Rat android + PC.rar
49.9 MB
🕸️Special upload RAT FROM😀 @gamingflexer fully FUD RAT
Forwarded from GAMINGFLEXER (Nҽʋҽɾƙɳɯ_ _ƈօֆʍօֆ)
👍Share with credit
🕸️No Backdoors
🕸️No channel on telegram will provide such stuff
🕸️Do not upload on virus total
Hack android and Windows from it
Officials in Brussels, Washington and other capitals have been putting strong pressure on Facebook and Apple to allow government agencies to access to encrypted messages; if these agencies refuse, legal requirements could be introduced that force firms to do just that.

American, British and Australian officials have published an open letter to Facebook CEO Mark Zuckerberg in October, asking that he call off plans to encrypt the company’s messaging service. Dutch Minister for Justice and Security Ferd Grappehaus told POLITICO last April that the EU needs to look into legislation allowing governments to access encrypted data.
Cybersecurity officials have dismissed calls to weaken encryption for decades, arguing that it would put the confidentiality of communications at risk across the board.