Media is too big
VIEW IN TELEGRAM
¶¶ PyPhisher /65Tools
#phishing #socialmedia #kalinethunter #termux
Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others
git clone https://github.com/KasRoudra/PyPhisher
cd PyPhisher
python3 pyphisher.py
¶¶ Or, directly run
wget https://raw.githubusercontent.com/KasRoudra/PyPhisher/main/pyphisher.py && python3 pyphisher.py
#phishing #socialmedia #kalinethunter #termux
Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others
git clone https://github.com/KasRoudra/PyPhisher
cd PyPhisher
python3 pyphisher.py
¶¶ Or, directly run
wget https://raw.githubusercontent.com/KasRoudra/PyPhisher/main/pyphisher.py && python3 pyphisher.py
¶¶ Golismero
Web Application Vulnerability Scanner
sudo bash
apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan cd /opt
git clone https://github.com/golismero/golismero.git
cd golismero
pip install -r requirements.txt pip install -r requirements_unix.txt
ln -s /opt/golismero/golismero.py /usr/bin/golismero
exit
Web Application Vulnerability Scanner
sudo bash
apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan cd /opt
git clone https://github.com/golismero/golismero.git
cd golismero
pip install -r requirements.txt pip install -r requirements_unix.txt
ln -s /opt/golismero/golismero.py /usr/bin/golismero
exit
❤1👍1
¶¶ JFScan lets you utilize Masscan to scan for open ports and use Nmap scripts on discovered ports to scan for services. JFScan allows you to run a scan of many different targets using the targets flag(-t) followed by a text file with the domain/IP/URL listed inside.
📍sudo apt install libpcap-dev git clone https://github.com/robertdavidgraham/masscan
📍cd masscan
📍make
📍sudo make install
📍sudo setcap CAP_NET_RAW+ep /usr/bin/masscan
¶¶ to install JFScan back in your home directory
📍cd ~
📍git clone https://github.com/nullt3r/jfscan.git $ 📍cd jfscan
📍pip3 install .
usage:
jfscan [-h] -t TARGETS [--resolvers RESOLVERS] [-m MODULES] (-p PORTS | -tp TOP_PORTS) [-r MAX_RATE] [-oi] [-od] [-q] [--nmap] [--nmap-options NMAP_OPTIONS] [--nmap-threads NMAP_THREADS] [--nmap-output NMAP_OUTPUT]
📍sudo apt install libpcap-dev git clone https://github.com/robertdavidgraham/masscan
📍cd masscan
📍make
📍sudo make install
📍sudo setcap CAP_NET_RAW+ep /usr/bin/masscan
¶¶ to install JFScan back in your home directory
📍cd ~
📍git clone https://github.com/nullt3r/jfscan.git $ 📍cd jfscan
📍pip3 install .
usage:
jfscan [-h] -t TARGETS [--resolvers RESOLVERS] [-m MODULES] (-p PORTS | -tp TOP_PORTS) [-r MAX_RATE] [-oi] [-od] [-q] [--nmap] [--nmap-options NMAP_OPTIONS] [--nmap-threads NMAP_THREADS] [--nmap-output NMAP_OUTPUT]
¶¶ sherlock
#sherlock #socialmedia #info #nethunter #termux
📍git clone https://github.com/sherlock-project/sherlock.git
📍cd sherlock
📍python3 -m pip install -r requirements.txt
📍python3 sherlock --help
¶¶ To search for only one user:
📍python3 sherlock user123
¶¶ To search for more than one user:
📍python3 sherlock user1 user2 user3
#sherlock #socialmedia #info #nethunter #termux
📍git clone https://github.com/sherlock-project/sherlock.git
📍cd sherlock
📍python3 -m pip install -r requirements.txt
📍python3 sherlock --help
¶¶ To search for only one user:
📍python3 sherlock user123
¶¶ To search for more than one user:
📍python3 sherlock user1 user2 user3
¶¶ This package contains the rockyou.txt wordlist and has an installation size of 134 MB.
#wordlist #rockyou #fern
📍sudo apt install wordlists
📍wordlists -h
> wordlists ~ Contains the rockyou wordlist /usr/share/wordlists
|--dirb |--dirbuster
|--dnsmap.txt
|--fasttrack.txt
|--fern-wifi
|--metasploit
|--nmap.lst
|--rockyou.txt.gz
|--seclists
|--wfuzz
#wordlist #rockyou #fern
📍sudo apt install wordlists
📍wordlists -h
> wordlists ~ Contains the rockyou wordlist /usr/share/wordlists
|--dirb |--dirbuster
|--dnsmap.txt
|--fasttrack.txt
|--fern-wifi
|--metasploit
|--nmap.lst
|--rockyou.txt.gz
|--seclists
|--wfuzz
#pyrit erro fix
#wifte
¶¶ If you run into any problems installing Pyrit. You may need to install the following packages and reinstall.
📍apt install python2 build-essential python2-dev libpcap-dev libssl-dev
installation:-
📍git clone https://github.com/JPaulMora/Pyrit.git;cd Pyrit
📍python2 setup.py clean;sudo python2 setup.py build;sudo python2 setup.py install
#wifte
¶¶ If you run into any problems installing Pyrit. You may need to install the following packages and reinstall.
📍apt install python2 build-essential python2-dev libpcap-dev libssl-dev
installation:-
📍git clone https://github.com/JPaulMora/Pyrit.git;cd Pyrit
📍python2 setup.py clean;sudo python2 setup.py build;sudo python2 setup.py install
Deleted Account
Nethunter permission error fix Download the file (nethunter.sh) Open terminal AndroidSu type su sd sdcard or /sdcard sh nethunter.sh when you see done (restart device your nethunter will work got this error on latest version and fixed on samsung note 10…
¶¶ put this on androidsu
copy & past in androidsu
pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION
pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION
pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE
pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
copy & past in androidsu
pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION
pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION
pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE
pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
👍2
Termux
¶¶ ESP8266-CH340 Developmemt board Its like a wifi jammer & Disconnect all nearby wifi . #NodeMCU #5v Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners install drivers (windows) according to your item…
Media is too big
VIEW IN TELEGRAM
#update
#ESP8266 #CH340 #nodemcu
Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners!
ESP8266 Deauther Version 2
https://github.com/SpacehuhnTech/esp8266_deauther
#Android
https://play.google.com/store/apps/details?id=com.bluino.esploader
#ESP8266 #CH340 #nodemcu
Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners!
ESP8266 Deauther Version 2
https://github.com/SpacehuhnTech/esp8266_deauther
#Android
https://play.google.com/store/apps/details?id=com.bluino.esploader
ESP8266-Fluxion.ino.nodemcu.bin
256 KB
¶¶ Fluxion-on-esp8266
This is a Advance Fluxion tool on esp8266...
#esp8266
¶¶ Connect to the AP named "M1z23R" with password:- "deauther" from your phone/PC.
¶¶ in chrome browser open 192.168.4.1
¶¶ You will see list of target (nearby )
¶¶ select your target
¶¶ click on deauthing
¶¶ after that click on evil twin attack
¶¶ check wifi .You will see open network with victim ssid .when victims enter correct password it will close and change to "M1z23R" again open in chrome browser 192.168.4.1 below will be the password
¶¶ Readme: https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app ( if you get error move on to pc )
¶¶ Android application
https://play.google.com/store/apps/details?id=com.bluino.esploader
This is a Advance Fluxion tool on esp8266...
#esp8266
¶¶ Connect to the AP named "M1z23R" with password:- "deauther" from your phone/PC.
¶¶ in chrome browser open 192.168.4.1
¶¶ You will see list of target (nearby )
¶¶ select your target
¶¶ click on deauthing
¶¶ after that click on evil twin attack
¶¶ check wifi .You will see open network with victim ssid .when victims enter correct password it will close and change to "M1z23R" again open in chrome browser 192.168.4.1 below will be the password
¶¶ Readme: https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app ( if you get error move on to pc )
¶¶ Android application
https://play.google.com/store/apps/details?id=com.bluino.esploader
ESP_Code.ino.generic.bin
340.2 KB
¶¶ esp8266
ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.
¶¶ SSID: "Free WiFi"
URL: http://192.168.1.1/esportal
¶¶ username "admin"
password "hacktheplanet"
¶¶ Readme : https://github.com/exploitagency/ESPortalV2
ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.
¶¶ SSID: "Free WiFi"
URL: http://192.168.1.1/esportal
¶¶ username "admin"
password "hacktheplanet"
¶¶ Readme : https://github.com/exploitagency/ESPortalV2
espbug.bin
499.5 KB
¶¶ esp
#cafey
ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.
When you connect to the ESPBug, go to any domain name and to the espportal page (e.g. http://espbug.com/espportal) You should be shown a pop up window asking you for the password. Defaults are Username: espbug and Password: password. From there you are redirected to the home page.
¶¶ Readme : https://www.youtube.com/watch?v=X95rtPqSzw4
#cafey
ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.
When you connect to the ESPBug, go to any domain name and to the espportal page (e.g. http://espbug.com/espportal) You should be shown a pop up window asking you for the password. Defaults are Username: espbug and Password: password. From there you are redirected to the home page.
¶¶ Readme : https://www.youtube.com/watch?v=X95rtPqSzw4
Termux
ESP8266-Fluxion.ino.nodemcu.bin
Media is too big
VIEW IN TELEGRAM
¶¶ Fluxion-on-esp8266
This is a Advance Fluxion tool on esp8266...
#esp8266
https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app
https://play.google.com/store/apps/details?id=com.bluino.esploader
¶¶ more info about Esp8266
https://create.arduino.cc/projecthub/Niv_the_anonymous/esp8266-beginner-tutorial-project-6414c8
This is a Advance Fluxion tool on esp8266...
#esp8266
https://github.com/pitube08642/Fluxion-on-ESP8266
¶¶ android app
https://play.google.com/store/apps/details?id=com.bluino.esploader
¶¶ more info about Esp8266
https://create.arduino.cc/projecthub/Niv_the_anonymous/esp8266-beginner-tutorial-project-6414c8
This media is not supported in your browser
VIEW IN TELEGRAM
¶¶ gmailify
This tool validates if gmail addresses and corporate emails with google mail servers are valid without being authenticated. The default thread is 10 to avoid being rate limited.
#gmail #wordlist #gmailvalidchecker
#termux
¶¶ Installation
python -m pip install gmailify
¶¶Check a single gmail address
python -m gmailify -e example@gmail.com
¶¶ Input from file
python -m gmailify -f emails.txt
¶¶Pass through proxy
python -m gmailify -p
This tool validates if gmail addresses and corporate emails with google mail servers are valid without being authenticated. The default thread is 10 to avoid being rate limited.
#gmail #wordlist #gmailvalidchecker
#termux
¶¶ Installation
python -m pip install gmailify
¶¶Check a single gmail address
python -m gmailify -e example@gmail.com
¶¶ Input from file
python -m gmailify -f emails.txt
¶¶Pass through proxy
python -m gmailify -p
❤1
Forwarded from Rose
Install Metasploit in Termux Latest Update (6.1.42). Dated on 06/05/2022
Metasploit Without Error in termux?
First and Final Step: Run The script
source <(curl -fsSl https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/metasploit-6-termux.sh)
Note: At the end script will ask you to open a new terminal and test your tool. Press y/n accordingly.
(At the end of the installation, there will be a bash prompt, which will prompt you to open a new terminal in termux and try to run msfconsole (to check if metasploit is working) if that works, then get back to previous terminal (prompt) and press y else (dont work or error after msfconsole) press n , once you press n, termux will automatically look for errors and fix that for you)... demo 👇👇👇
Source here
Visit out blog: Uk2blogger
👉 Video here (must like and share)
Metasploit Without Error in termux?
First and Final Step: Run The script
source <(curl -fsSl https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/metasploit-6-termux.sh)
Note: At the end script will ask you to open a new terminal and test your tool. Press y/n accordingly.
(At the end of the installation, there will be a bash prompt, which will prompt you to open a new terminal in termux and try to run msfconsole (to check if metasploit is working) if that works, then get back to previous terminal (prompt) and press y else (dont work or error after msfconsole) press n , once you press n, termux will automatically look for errors and fix that for you)... demo 👇👇👇
Source here
Visit out blog: Uk2blogger
👉 Video here (must like and share)
metasploitError.txt
4.2 KB
This script will let you install real-time up-to-date Metasploit in termux (no error).
#metasploit #android #termux
👉 Demo will ensure you are good to go with all the required germs. Happy bind and exploit🤩
Script 👇
curl -L -o $PWD/mversion https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/Scripts/mversion -s;chmod +x mversion;mv mversion ../usr/bin/
Post by
@efxtv
@efxtv2
@efxtve
uk2blogger
#metasploit #android #termux
👉 Demo will ensure you are good to go with all the required germs. Happy bind and exploit🤩
Script 👇
curl -L -o $PWD/mversion https://raw.githubusercontent.com/efxtv/Metasploit-in-termux/main/Scripts/mversion -s;chmod +x mversion;mv mversion ../usr/bin/
Post by
@efxtv
@efxtv2
@efxtve
uk2blogger
👍1