Bannerhunter is a powerful banner grabbing tool written in C. It can connect to services running on different ports, attempt plain TCP grabs, and also perform SSL/TLS handshakes for encrypted services. The tool sends protocol-appropriate requests (like HEAD with Host headers for HTTP/HTTPS) to increase the chance of extracting banners.
git clone https://github.com/s-r-e-e-r-a-j/BannerHunter.git
cd BannerHunter
sudo bash install.sh
bannerhunter <host> <port>
bannerhunter <host> <port1> <port2> <port3>
Example (Single Port):
bannerhunter example.com 80
Connects to example.com on port 80 and attempts to grab the banner.
Example (Multiple Ports):
bannerhunter example.com 21 22 25 80 443
Connects to example.com on ports 21, 22, 25, 80, and 443, grabbing banners from each service.
⚠️For more information and use of this tool in termux visit github link of this tool.
👨💻 @TERMUXCOMMANDD
❤10👍1
OSCP Enumeration Cheat Sheet
🔴⚫️Full HD Image: https://github.com/Ignitetechnologies/Mindmap/tree/main/Enumeration
🔴⚫️Full HD Image: https://github.com/Ignitetechnologies/Mindmap/tree/main/Enumeration
❤7
2-Factor Authentication (2FA) vs Multi-Factor Authentication (MFA)
MFA:
· MFA employs two or more factors
· MFA might incorporate a password, a phone-sent code, and a fingerprint scan…
2FA:
· 2FA specifically involves exactly two factors.
· 2FA typically relies on a password and a code sent to a mobile device.
Benefits of MFA and 2FA:
· They enhance account security, shielding against common identity threats like phishing, credential stuffing, or brute force.
· They provide an additional layer of security, contributing to peace of mind during online activities.
· They safeguard sensitive data and resources by thwarting unauthorized access.
Challenges of MFA and 2FA:
· The login process may become somewhat inconvenient and complex.
· Dependence on the availability and reliability of devices and networks is essential.
· Despite their effectiveness, MFA and 2FA can still be susceptible to advanced attacks, including SIM swapping, man-in-the-middle, or social engineering.
❤8
DanxyTools v8.4 is an all-in-one multi-tools framework for Termux.
It’s designed for developers, penetration testers, security researchers, and power users who need a fast toolbox — containing modules for networking, OSINT, automation, and daily utilities.
The design focuses on ease of use, modularity, and a responsive interactive terminal interface.
It’s designed for developers, penetration testers, security researchers, and power users who need a fast toolbox — containing modules for networking, OSINT, automation, and daily utilities.
The design focuses on ease of use, modularity, and a responsive interactive terminal interface.
pkg update && pkg upgrade -y
pkg install git curl wget toilet figlet sox mpv -y
git clone https://github.com/NgakuNgakuDevTapiScRecodePunyaGw/Danxy
cd Danxy
make install
make run
⚠️For more information and use of this tool in termux visit github link of this tool.
👨💻 @TERMUXCOMMANDD
❤14
Useful tool to track location or mobile number, so this tool can be called osint or also information gathering
pkg install git
pkg install python3
git clone https://github.com/HunxByts/GhostTrack.git
cd GhostTrack
pip3 install -r requirements.txt
python3 GhostTR.py
⚠️For more information and use of this tool in termux visit github link of this tool.
👨💻 @TERMUXCOMMANDD
1❤22💯1🫡1
WebRecon is a powerful information-gathering toolkit designed for Termux and Kali Linux users. It offers easy-to-use options for tasks like Ping testing, Whois lookups, NSLookup, Nmap port scanning, and Banner Grabbing.
pkg update && pkg upgrade -y && pkg install -y git whois dnsutils nmap netcat-openbsd
How to use
Clone Repository in Directory
git clone https://github.com/trmxvibs/webrecon && cd webrecon
Make file Excutable
chmod +x webrecon_advanced.py
Run the main file
python3 webrecon_advanced.py
⚠️For more information and use of this tool in termux visit github link of this tool.
👨💻 @TERMUXCOMMANDD
❤9👍1