Termux
2.2K subscribers
670 photos
83 videos
407 files
739 links
Termux-Collection
Download Telegram
Media is too big
VIEW IN TELEGRAM
¶¶ PyPhisher /65Tools
#phishing #socialmedia #kalinethunter #termux

Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others

git clone https://github.com/KasRoudra/PyPhisher
cd PyPhisher
python3 pyphisher.py

¶¶ Or, directly run

wget https://raw.githubusercontent.com/KasRoudra/PyPhisher/main/pyphisher.py && python3 pyphisher.py
¶¶ Golismero
Web Application Vulnerability Scanner




sudo bash
apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan cd /opt
git clone https://github.com/golismero/golismero.git
cd golismero
pip install -r requirements.txt pip install -r requirements_unix.txt
ln -s /opt/golismero/golismero.py /usr/bin/golismero

exit
1👍1
¶¶ JFScan lets you utilize Masscan to scan for open ports and use Nmap scripts on discovered ports to scan for services. JFScan allows you to run a scan of many different targets using the targets flag(-t) followed by a text file with the domain/IP/URL listed inside.

📍sudo apt install libpcap-dev git clone https://github.com/robertdavidgraham/masscan
📍cd masscan
📍make
📍sudo make install
📍sudo setcap CAP_NET_RAW+ep /usr/bin/masscan

¶¶ to install JFScan back in your home directory
📍cd ~
📍git clone https://github.com/nullt3r/jfscan.git $ 📍cd jfscan
📍pip3 install .


usage:
jfscan [-h] -t TARGETS [--resolvers RESOLVERS] [-m MODULES] (-p PORTS | -tp TOP_PORTS) [-r MAX_RATE] [-oi] [-od] [-q] [--nmap] [--nmap-options NMAP_OPTIONS] [--nmap-threads NMAP_THREADS] [--nmap-output NMAP_OUTPUT]
¶¶ sherlock
#sherlock #socialmedia #info #nethunter #termux

📍git clone https://github.com/sherlock-project/sherlock.git

📍cd sherlock
📍python3 -m pip install -r requirements.txt
📍python3 sherlock --help

¶¶ To search for only one user:
📍python3 sherlock user123

¶¶ To search for more than one user:
📍python3 sherlock user1 user2 user3
¶¶ This package contains the rockyou.txt wordlist and has an installation size of 134 MB.
#wordlist #rockyou #fern
📍sudo apt install wordlists
📍wordlists -h
> wordlists ~ Contains the rockyou wordlist /usr/share/wordlists
|--dirb |--dirbuster
|--dnsmap.txt
|--fasttrack.txt
|--fern-wifi
|--metasploit
|--nmap.lst
|--rockyou.txt.gz
|--seclists
|--wfuzz
#wifite /
to make it easy and fast

📍sudo wifite -i wlan0 --ignore-locks --keep-ivs -p 1337 -mac --random-mac -v -inf --bully --pmkid --dic /usr/share/wordlists/rockyou.txt --require-fakeauth --nodeauth --wps --pmkid-timeout 120
👍1
wifite.txt
4.4 KB
#wifite / all commands v3
#pyrit erro fix
#wifte

¶¶ If you run into any problems installing Pyrit. You may need to install the following packages and reinstall.

📍apt install python2 build-essential python2-dev libpcap-dev libssl-dev


installation:-

📍git clone https://github.com/JPaulMora/Pyrit.git;cd Pyrit

📍python2 setup.py clean;sudo python2 setup.py build;sudo python2 setup.py install
Deleted Account
Nethunter permission error fix Download the file (nethunter.sh) Open terminal AndroidSu type su sd sdcard or /sdcard sh nethunter.sh when you see done (restart device your nethunter will work got this error on latest version and fixed on samsung note 10…
¶¶ put this on androidsu
copy & past in androidsu

pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION

pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION

pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE


pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH

pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
👍2
ESP8266-Fluxion.ino.nodemcu.bin
256 KB
¶¶ Fluxion-on-esp8266
This is a Advance Fluxion tool on esp8266...
#esp8266

¶¶ Connect to the AP named "M1z23R" with password:- "deauther" from your phone/PC.
¶¶ in chrome browser open 192.168.4.1
¶¶ You will see list of target (nearby )
¶¶ select your target
¶¶ click on deauthing
¶¶ after that click on evil twin attack
¶¶ check wifi .You will see open network with victim ssid .when victims enter correct password it will close and change to "M1z23R" again open in chrome browser 192.168.4.1 below will be the password

¶¶ Readme: https://github.com/pitube08642/Fluxion-on-ESP8266

¶¶ android app ( if you get error move on to pc )

¶¶ Android application
https://play.google.com/store/apps/details?id=com.bluino.esploader
ESP_Code.ino.generic.bin
340.2 KB
¶¶ esp8266

ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.

¶¶ SSID: "Free WiFi"
URL: http://192.168.1.1/esportal

¶¶ username "admin"
password "hacktheplanet"

¶¶ Readme : https://github.com/exploitagency/ESPortalV2
espbug.bin
499.5 KB
¶¶ esp
#cafey


ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.

When you connect to the ESPBug, go to any domain name and to the espportal page (e.g. http://espbug.com/espportal) You should be shown a pop up window asking you for the password. Defaults are Username: espbug and Password: password. From there you are redirected to the home page.

¶¶ Readme : https://www.youtube.com/watch?v=X95rtPqSzw4
This media is not supported in your browser
VIEW IN TELEGRAM
¶¶ gmailify
This tool validates if gmail addresses and corporate emails with google mail servers are valid without being authenticated. The default thread is 10 to avoid being rate limited.
#gmail #wordlist #gmailvalidchecker
#termux
¶¶ Installation
python -m pip install gmailify

¶¶Check a single gmail address
python -m gmailify -e example@gmail.com

¶¶ Input from file
python -m gmailify -f emails.txt

¶¶Pass through proxy
python -m gmailify -p
1
Forwarded from Rose
Install Metasploit in Termux Latest Update (6.1.42). Dated on 06/05/2022

Metasploit Without Error in termux?

First and Final Step: Run The script

source <(curl -fsSl https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/metasploit-6-termux.sh)

Note: At the end script will ask you to open a new terminal and test your tool. Press y/n accordingly.

(At the end of the installation, there will be a bash prompt, which will prompt you to open a new terminal in termux and try to run msfconsole (to check if metasploit is working) if that works, then get back to previous terminal (prompt) and press y else (dont work or error after msfconsole) press n , once you press n, termux will automatically look for errors and fix that for you)... demo 👇👇👇

Source here
Visit out blog: Uk2blogger
👉 Video here (must like and share)
metasploitError.txt
4.2 KB
This script will let you install real-time up-to-date Metasploit in termux (no error).
#metasploit #android #termux

👉 Demo will ensure you are good to go with all the required germs. Happy bind and exploit🤩


Script 👇

curl -L -o $PWD/mversion https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/Scripts/mversion -s;chmod +x mversion;mv mversion ../usr/bin/

Post by
@efxtv
@efxtv2
@efxtve
uk2blogger
👍1