Termux
¶¶ kali-Nethunter #nethunter #Nethunter #noroot ¶¶ install Nethunter store ¶¶ link 👇👇 https://store.nethunter.com/ ¶¶ download Store app and install Nethunter KeX & hackers keyboard ¶¶ open termux 📍apt update 📍apt upgrade 📍apt install wget 📍wget -O install…
repair-kex/install-nethunter:
https://github.com/mrfoxie/repair-kex/blob/master/install-nethunter
This is the tutorial to repair kex in rootless nethunter termux.
Repair Kex in Kali NetHunter Rootless
This is for kex repair and solve all vnc server error in kalinethunter
Installation-NetHunter:
https://github.com/mrfoxie/repair-kex
https://github.com/mrfoxie/repair-kex/blob/master/install-nethunter
This is the tutorial to repair kex in rootless nethunter termux.
Repair Kex in Kali NetHunter Rootless
This is for kex repair and solve all vnc server error in kalinethunter
Installation-NetHunter:
https://github.com/mrfoxie/repair-kex
GitHub
repair-kex/install-nethunter at master · mrfoxie/repair-kex
This is the tutorial to repair kex in rootless nethunter termux. - mrfoxie/repair-kex
This media is not supported in your browser
VIEW IN TELEGRAM
¶¶ OSINT Email- using Holehe & Efficiently finding registered accounts from emails #osint
Overview:
Manually investigating email addresses can be a tedious task especially when faced with the prospect of manually verifying whether an email address has been registered on individual websites. At the same time, this process is fraught with a very serious risk – one wrong move can trigger a red flag and warn the target. One solution to this problem is Holehe, a very neat Python-based script that enables Digital Investigators to check whether an email address is used across several online sources such as social media, shopping and adult-oriented websites. The full list is quite extensive, but it includes:
Installation:
📍sudo apt update
📍git clone https://github.com/megadose/holehe.git
📍cd holehe-master
📍sudo python3 setup.py install
📍sudo holhe -h
📍sudo holehe test@gmail.com
📍sudo holehe test@gmail.com --csv
#Holehe #AlienByte2.0 #KaliLiniux
Overview:
Manually investigating email addresses can be a tedious task especially when faced with the prospect of manually verifying whether an email address has been registered on individual websites. At the same time, this process is fraught with a very serious risk – one wrong move can trigger a red flag and warn the target. One solution to this problem is Holehe, a very neat Python-based script that enables Digital Investigators to check whether an email address is used across several online sources such as social media, shopping and adult-oriented websites. The full list is quite extensive, but it includes:
Installation:
📍sudo apt update
📍git clone https://github.com/megadose/holehe.git
📍cd holehe-master
📍sudo python3 setup.py install
📍sudo holhe -h
📍sudo holehe test@gmail.com
📍sudo holehe test@gmail.com --csv
#Holehe #AlienByte2.0 #KaliLiniux
¶¶ asnmap
ASNmap is a brand new CLI tool, written in Golang, used to query Autonomous System data. The data is pulled from https://api.asnmap.sh, which returns data that is parsed from Frank Denis' legendary IPtoASN database.Put simply, ASNMap converts:
Organization names to CIDR ranges
ASN numbers to CIDR ranges
IP addresses to CIDR ranges
Domain names to CIDR ranges
The results can be viewed in JSON, CSV and text formats, so it's easy to pipe the output into other tools.
more info : https://blog.projectdiscovery.io/asnmap/
📍git clone https://github.com/projectdiscovery/asnmap
📍cd asnmap/cmd/asnmap
📍go build
📍./asnmap
¶¶ Input options
These options tell ASNMap what type of data you are feeding it:
-a or -asn is for querying an AS number, e.g. -a AS5650
-i or -ip is for querying an IP address, e.g. -i 100.19.12.21
-d or -domain is for querying a domain name, e.g. -d google.com
-org is for querying an organization name, e.g. -o GOOGLE
ASNmap is a brand new CLI tool, written in Golang, used to query Autonomous System data. The data is pulled from https://api.asnmap.sh, which returns data that is parsed from Frank Denis' legendary IPtoASN database.Put simply, ASNMap converts:
Organization names to CIDR ranges
ASN numbers to CIDR ranges
IP addresses to CIDR ranges
Domain names to CIDR ranges
The results can be viewed in JSON, CSV and text formats, so it's easy to pipe the output into other tools.
more info : https://blog.projectdiscovery.io/asnmap/
📍git clone https://github.com/projectdiscovery/asnmap
📍cd asnmap/cmd/asnmap
📍go build
📍./asnmap
¶¶ Input options
These options tell ASNMap what type of data you are feeding it:
-a or -asn is for querying an AS number, e.g. -a AS5650
-i or -ip is for querying an IP address, e.g. -i 100.19.12.21
-d or -domain is for querying a domain name, e.g. -d google.com
-org is for querying an organization name, e.g. -o GOOGLE
Media is too big
VIEW IN TELEGRAM
¶¶ Stryker
latest updates on Stryker app
#wifi
A powerful pentest tool in your mobile device
https://stryker.zalex.dev/
For more info : https://strykerdefence.com/#download
¶¶ Rooted device which supported monitor mode and packet injection
WiFi vulnerabilities scanner
Local network vulnerabilities scanner
NetCut
Exploit Engine
GeoMac
Metasploit Framework
Captive Portal
Site vulnerabilities scanner
Payload generator
Online exploit library
35+ protocols brute
Captive Portal Bypass (upcoming)
¶¶ To add,wordlist open file manager & go to Stryker folder /wordlist/ and add your wordlist
( my device : Samsung Note9/Rooted)
¶¶ Telegram
stryker project : https://t.me/strykerdefence
https://t.me/strykereng
https://t.me/strykerapp
latest updates on Stryker app
#wifi
A powerful pentest tool in your mobile device
https://stryker.zalex.dev/
For more info : https://strykerdefence.com/#download
¶¶ Rooted device which supported monitor mode and packet injection
WiFi vulnerabilities scanner
Local network vulnerabilities scanner
NetCut
Exploit Engine
GeoMac
Metasploit Framework
Captive Portal
Site vulnerabilities scanner
Payload generator
Online exploit library
35+ protocols brute
Captive Portal Bypass (upcoming)
¶¶ To add,wordlist open file manager & go to Stryker folder /wordlist/ and add your wordlist
( my device : Samsung Note9/Rooted)
¶¶ Telegram
stryker project : https://t.me/strykerdefence
https://t.me/strykereng
https://t.me/strykerapp
👍2
¶¶ Drivers :
https://github.com/RinCat/RTL88x2BU-Linux-Driver
#wifiadapter #kalitools wifiadapter
#vif not supported
install the drivers & it works fine . around $10 from Aliexpress
https://github.com/RinCat/RTL88x2BU-Linux-Driver
#wifiadapter #kalitools wifiadapter
#vif not supported
install the drivers & it works fine . around $10 from Aliexpress
Media is too big
VIEW IN TELEGRAM
¶¶ Wifi-Hacking/
#aircrack-ng #wpscrack #handshakecapture #wordlist #deauthclients
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
¶¶ Feutures and Contains :
1)Start monitor mode
2)Stop monitor mode
3)Scan Networks
4)Getting Handshake
5)Create wordlist
6)Install Wireless tools
7)WPS Networks attacks
8)Scan for WPS Networks
9)Crack Handshake with rockyou.txt
10)Crack Handshake with wordlist
11)Crack Handshake without wordlist
¶¶ Kali Linux / Ubuntu / Parrot OS
📍sudo apt update
📍sudo apt upgrade
📍sudo apt-get dist-upgrade
reboot (exit & open again )
📍sudo git clone https://github.com/ankit0183/Wifi-Hacking
📍cd Wifi-Hacking/
📍sudo python3 Wifi-Hacking.py
#aircrack-ng #wpscrack #handshakecapture #wordlist #deauthclients
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)
¶¶ Feutures and Contains :
1)Start monitor mode
2)Stop monitor mode
3)Scan Networks
4)Getting Handshake
5)Create wordlist
6)Install Wireless tools
7)WPS Networks attacks
8)Scan for WPS Networks
9)Crack Handshake with rockyou.txt
10)Crack Handshake with wordlist
11)Crack Handshake without wordlist
¶¶ Kali Linux / Ubuntu / Parrot OS
📍sudo apt update
📍sudo apt upgrade
📍sudo apt-get dist-upgrade
reboot (exit & open again )
📍sudo git clone https://github.com/ankit0183/Wifi-Hacking
📍cd Wifi-Hacking/
📍sudo python3 Wifi-Hacking.py
👍2
¶¶ psudohas
#wordlist
psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a word’s letters with symbols or numbers, using char-case variations, adding a common padding before or after the word and more. It is keyword-based and highly customizable.
git clone https://github.com/t3l3machus/psudohash
cd ./psudohash
chmod +x psudohash.py
./psudohash.py -h
./psudohash.py -w password -cpa
./psudohash.py [-h] -w WORDS [-an LEVEL] [-nl LIMIT] [-y YEARS] [-ap VALUES] [-cpb] [-cpa] [-cpo] [-o FILENAME] [-q]
Combining options --years and --append-numbering with a --numbering-limit ≥ last two digits of any year input, will most likely produce duplicate words because of the mutation patterns implemented by the tool.
#wordlist
psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a word’s letters with symbols or numbers, using char-case variations, adding a common padding before or after the word and more. It is keyword-based and highly customizable.
git clone https://github.com/t3l3machus/psudohash
cd ./psudohash
chmod +x psudohash.py
./psudohash.py -h
./psudohash.py -w password -cpa
./psudohash.py [-h] -w WORDS [-an LEVEL] [-nl LIMIT] [-y YEARS] [-ap VALUES] [-cpb] [-cpa] [-cpo] [-o FILENAME] [-q]
Combining options --years and --append-numbering with a --numbering-limit ≥ last two digits of any year input, will most likely produce duplicate words because of the mutation patterns implemented by the tool.
👍3❤2
¶¶ Externel wifiadapter for #kali #Nethunter #termux #windows #wifiadapter #adapter #android users ..
for those who cannot buy alfa . u can buy this one .Supports both monitor mode packet injection for windows users no need to install drivers .
around 3usd #aliexpress . look for the same chipset
android i had to install for other drivers (rooted device )
¶¶ Chipset : ( MT7601U )
Ralink Technology, Corp. MT7601U Wireless Adapter
150mps
for those who cannot buy alfa . u can buy this one .Supports both monitor mode packet injection for windows users no need to install drivers .
around 3usd #aliexpress . look for the same chipset
android i had to install for other drivers (rooted device )
¶¶ Chipset : ( MT7601U )
Ralink Technology, Corp. MT7601U Wireless Adapter
150mps
❤3
The following chipsets are supported by default in most, if not all, NetHunter kernels:
Atheros
▪️ATH9K_HTC (AR9271, AR7010)
▪️ATH10K
Ralink
▪️RT73
▪️RT2800USB
▪️RT3070
Realtek
▪️RTL8188EUS
▪️RTL8188CU
▪️RTL8188RU
▪️RTL8192CU
▪️RTL8192EU
▪️RTL8723AU
▪️RTL8811AU
▪️RTL8812AU
▪️RTL8814AU
▪️RTL8821AU
▪️RTW88-USB
MediaTek
▪️MT7601U (Product may come with Ralink Technology Corp.)
▪️MT7612U
Qualcomm internal wifi chipsets (wlan0)
▪️QCACLD-2.0 (fully supported✅)
▪️QCACLD-3.0 (Monitor mode only)
The following devices are confirmed to be working with a NetHunter build:
TP-Link TL-WN722N v1 (Please note that v2 & v3 have unsupported chipsets) but v2 and v3 may be supported using RTL8812AU drivers.)
▪️TP-Link TL-WN822N v1 - v4
▪️Alfa Networks AWUS036ACH
▪️Alfa Networks AWUS036NEH (recommended by @jcadduono)
▪️Alfa Networks AWUS036NHA
▪️Alfa Networks AWUSO36NH
▪️Panda PAU05 Nano
The following devices are confirmed to be partially working with a NetHunter build:
Alfa Networks AWUS051NH (dual band 5 GHz support may be unreliable)
Atheros
▪️ATH9K_HTC (AR9271, AR7010)
▪️ATH10K
Ralink
▪️RT73
▪️RT2800USB
▪️RT3070
Realtek
▪️RTL8188EUS
▪️RTL8188CU
▪️RTL8188RU
▪️RTL8192CU
▪️RTL8192EU
▪️RTL8723AU
▪️RTL8811AU
▪️RTL8812AU
▪️RTL8814AU
▪️RTL8821AU
▪️RTW88-USB
MediaTek
▪️MT7601U (Product may come with Ralink Technology Corp.)
▪️MT7612U
Qualcomm internal wifi chipsets (wlan0)
▪️QCACLD-2.0 (fully supported✅)
▪️QCACLD-3.0 (Monitor mode only)
The following devices are confirmed to be working with a NetHunter build:
TP-Link TL-WN722N v1 (Please note that v2 & v3 have unsupported chipsets) but v2 and v3 may be supported using RTL8812AU drivers.)
▪️TP-Link TL-WN822N v1 - v4
▪️Alfa Networks AWUS036ACH
▪️Alfa Networks AWUS036NEH (recommended by @jcadduono)
▪️Alfa Networks AWUS036NHA
▪️Alfa Networks AWUSO36NH
▪️Panda PAU05 Nano
The following devices are confirmed to be partially working with a NetHunter build:
Alfa Networks AWUS051NH (dual band 5 GHz support may be unreliable)
👍1
¶¶ wordlist
#termux
Generateing wordlist using python.
Execute these commands one by one to install sudo.
Installation :
📍apt update
📍apt upgrade
📍apt install python
📍pip install wordlist
📍wordlist -h [to see all options]
📍wordlist -m 4 -M 6 -o wordlist.txt 12345678
-m = minimum length
-M = maximum length
wordlist.txt = to save all words
12345678 = here you can type alphabets also to make wordlist.
name : wordlist.txt
📍ls
📍cat wordlist.txt
here you get all words means passwords list...
#termux
Generateing wordlist using python.
Execute these commands one by one to install sudo.
Installation :
📍apt update
📍apt upgrade
📍apt install python
📍pip install wordlist
📍wordlist -h [to see all options]
📍wordlist -m 4 -M 6 -o wordlist.txt 12345678
-m = minimum length
-M = maximum length
wordlist.txt = to save all words
12345678 = here you can type alphabets also to make wordlist.
name : wordlist.txt
📍ls
📍cat wordlist.txt
here you get all words means passwords list...
👍2
¶¶ Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY.v👇👇
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
GitHub
GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles
articles. Contribute to blaCCkHatHacEEkr/PENTESTING-BIBLE development by creating an account on GitHub.
👍1
Termux
¶¶ ESP8266-CH340 Developmemt board Its like a wifi jammer & Disconnect all nearby wifi . #NodeMCU #5v Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners install drivers (windows) according to your item…
#airgeddon (VIF) not supported problem
use it to disconnect wifi networks ...
#esp8266 #wifiphishing
--nojamming option. This will turn off the de-authentication attack though.
use it to disconnect wifi networks ...
#esp8266 #wifiphishing
--nojamming option. This will turn off the de-authentication attack though.
wifite2.zip
4.6 MB
Current version: 2.6.2
installation:-
cp /sdcard/Download/Telegram/wifite2.zip ./ ;unzip wifite2.zip;rm -rf wifite2.zip;cd wifite2;ls
sudo python3 setup.py install
cp wordlist-probable.txt /usr/share/dict
required packages:
make deps
make hcxtools
make hcxdumptool
make bully
make reaver
make hashcat
make pyrit
installation:-
cp /sdcard/Download/Telegram/wifite2.zip ./ ;unzip wifite2.zip;rm -rf wifite2.zip;cd wifite2;ls
sudo python3 setup.py install
cp wordlist-probable.txt /usr/share/dict
required packages:
make deps
make hcxtools
make hcxdumptool
make bully
make reaver
make hashcat
make pyrit
❤1👍1
Termux
wifite2.zip
manually:
📍git clone https://github.com/kimocoder/wifite2
📍cd wifite2
📍sudo python3 setup.py install
📍make help
📍make iw: : pull latest iw from git and install
📍make reaver : pull latest reaver from git and install
📍make hashcat : pull latest hashcat from git and install
📍make bully : pull latest bully from git and install
📍make hcxdumptool : pull latest hcxdumptool from git and install
📍make hcxtools : pull latest hcxtools from git and install
skip if you want below two coomands
make ath_masker : download and build/install ath_masker
make modwifi : download and build/install modwifi
2. Update installed tools or dependencies
📍make update : update tools/dependencies installed from steps above.
skip also
📍make deps : install dependencies needed to compile/run all tools
3. Clean / Tests (
¶¶ To uninstall wifite
¶¶only run make test
📍make test : run runtests.sh 📍make clean : clean setup files / tmp
📍make uninstall : completely remove wifite2 from system
📍make help : THIS HELP MENU!
📍git clone https://github.com/kimocoder/wifite2
📍cd wifite2
📍sudo python3 setup.py install
📍make help
📍make iw: : pull latest iw from git and install
📍make reaver : pull latest reaver from git and install
📍make hashcat : pull latest hashcat from git and install
📍make bully : pull latest bully from git and install
📍make hcxdumptool : pull latest hcxdumptool from git and install
📍make hcxtools : pull latest hcxtools from git and install
skip if you want below two coomands
make ath_masker : download and build/install ath_masker
make modwifi : download and build/install modwifi
2. Update installed tools or dependencies
📍make update : update tools/dependencies installed from steps above.
skip also
📍make deps : install dependencies needed to compile/run all tools
3. Clean / Tests (
¶¶ To uninstall wifite
¶¶only run make test
📍make test : run runtests.sh 📍make clean : clean setup files / tmp
📍make uninstall : completely remove wifite2 from system
📍make help : THIS HELP MENU!
GitHub
GitHub - kimocoder/wifite2: Rewrite of the popular wireless network auditor, "wifite" - original by @derv82
Rewrite of the popular wireless network auditor, "wifite" - original by @derv82 - kimocoder/wifite2
❤1👍1👌1
Termux
#wifiphisher #kali #WiFi #hacking #phishing #macchanger #wirelessusbadapter 2.4/5G By creating a fake login page .its old but work ¶¶ wifiphisher 📍git clone https://github.com/wifiphisher/wifiphisher.git 📍cd wifiphisher 📍sudo python3 setup.py install 📍sudo…
#fixwifiphisher
#update #cm
📍sudo apt-get update && sudo apt-get upgrade
📍apt install wifiphisher
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍pip install setuptools
📍python -m pip install --upgrade pip setuptools
📍apt-get install python-setuptools
|| if you want to install from git
📍git clone https://github.com/wifiphisher/wifiphisher.git
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍cd wifiphisher
📍sudo python setup.py install
|| connect your wifi adapter
in new ternimal
sudo airmon-ng start wlan1
~# wifiphisher -i wlan1 (if you get any error try below command)(Reboot)
roguehostapd -----|||
cd
📍git clone https://github.com/wifiphisher/roguehostapd.git
📍cd roguehostapd
📍python setup.py install
exit
📍sudo wifiphisher --force-hostapd
This Will Start wifiphisher
¶¶ Use firmware update method
#update #cm
📍sudo apt-get update && sudo apt-get upgrade
📍apt install wifiphisher
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍pip install setuptools
📍python -m pip install --upgrade pip setuptools
📍apt-get install python-setuptools
|| if you want to install from git
📍git clone https://github.com/wifiphisher/wifiphisher.git
📍apt-get install libnl-3-dev libnl-genl-3-dev
📍cd wifiphisher
📍sudo python setup.py install
|| connect your wifi adapter
in new ternimal
sudo airmon-ng start wlan1
~# wifiphisher -i wlan1 (if you get any error try below command)(Reboot)
roguehostapd -----|||
cd
📍git clone https://github.com/wifiphisher/roguehostapd.git
📍cd roguehostapd
📍python setup.py install
exit
📍sudo wifiphisher --force-hostapd
This Will Start wifiphisher
¶¶ Use firmware update method
GitHub
GitHub - wifiphisher/wifiphisher: The Rogue Access Point Framework
The Rogue Access Point Framework. Contribute to wifiphisher/wifiphisher development by creating an account on GitHub.
👍1
Kunyu:-- More Efficient Corporate Asset Collection.
Application scenario:-
1. Forgotten and isolated assets in the enterprise are identified and added to security management.
2. Perform quick investigation and statistics on externally exposed assets of the enterprise.
3. Red and blue are used against related requirements, and batch inspections of captured IPs are performed.
4. Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact.
5. Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis.
6. Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities.
#Download #Link:-
https://github.com/knownsec/Kunyu
Visit Us : https://ncybersecurity.com
Twitter : https://twitter.com/NationalCyberS1
LinkedIn : https://in.linkedin.com/company/national-cyber-security-services
Application scenario:-
1. Forgotten and isolated assets in the enterprise are identified and added to security management.
2. Perform quick investigation and statistics on externally exposed assets of the enterprise.
3. Red and blue are used against related requirements, and batch inspections of captured IPs are performed.
4. Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact.
5. Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis.
6. Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities.
#Download #Link:-
https://github.com/knownsec/Kunyu
Visit Us : https://ncybersecurity.com
Twitter : https://twitter.com/NationalCyberS1
LinkedIn : https://in.linkedin.com/company/national-cyber-security-services
👍2👌1