Termux
2.2K subscribers
670 photos
83 videos
407 files
739 links
Termux-Collection
Download Telegram
ΒΆΒΆ Info DNS System Website Check Info Create Tools Check Ip / Location
#dns #ip #nmap. /testing πŸ€¦β€β™‚
https://github.com/Hackermrlinkerrorsystem/InfoSystem
cd InfoSystem
ls
python2 Info.py


[1]> DNS LookUP
[2]> Whois LookUP
[3]> GeoIP LookUP
[4]> nmap portscanner
[5]> ReverseIP
[6]> DomainToIpConverter
[7]> DNS Host Search

[0]> Exit

root@kalilinux ~#
πŸ‘1
ΒΆΒΆ AMFTOOLS

Termux and Kali Linux
ΒΆΒΆ you can download #Sql #metasploit #nmap #ddos

πŸ“apt update && apt upgrade
πŸ“apt install git
πŸ“apt install python
πŸ“git clone https://github.com/amfhacker/AMFTOOLS

πŸ“cd AMFTOOLS
πŸ“chmod + x *
πŸ“python AMFTOOLSHACK.py

β£Ώ1.Install SQLMap
β£Ώ2.Install Metasploit
β£Ώ3.Install Nmap
β£Ώ4.Install AMF1
β£Ώ5.Install DDos-Anonymous
β£Ώ6.Hash-Buster-MD5
β£Ώ.7ALIENS.HaCK.Camera
β£Ώ99.exit
ΒΆΒΆ Amer /virus-4
#metasploit #virus #virus4 #ngrok #facebook #bruteforce #wordlist #viruslinux #viruspayload
#ngroktcp #ngrokthttp #nmap #root #nonroot #termuxtheme #termuxstyle #termuxfont
#ddos #adminpanelfinder #dorkgoogle #sql

πŸ“git clone https://github.com/Amerlaceset/Amer
πŸ“cd Amer
πŸ“ls
πŸ“sh Amer.sh

ΒΆΒΆ
{Ctrl C} exit
[1] Download Virus4 versions {4.6.8}
[2] Download Virus4 versions {5.0.0}

ΒΆΒΆ number------->2

|---{ my ip }---| (y) or (n) n
was canceled

ΒΆΒΆ { 5.0.0 } Virus4 > πŸ“banner

|--------------------------------|
[1] metasploit
[2]Download
[3] Account
[4] virus
[5] ngrok
[6] nmap
[7] Games
[8] Termux
[9] WEBsite
[00] Exit
[90] help
[99] update
|--------------------------------|
ΒΆΒΆ DarkNess / 17-Tools
#TermuxToolx #ubuntu18 #ubuntu19 #debian #kalilinux #nmap #redhack #ipgeo #osif #sqlmap #msf #exiftool

πŸ“apt install python
πŸ“pip install requests
πŸ“git clone https://github.com/AquaCodeOfficial/DarkNess
πŸ“cd DarkNess
πŸ“python darkness.py

Author : AquaCode
01. installer tools ( 13 tool )
02. installer proot ( 4 proot )
03. Install package ( rekomendasi )
04. info
99. exit
AquaCode ~type 3 install packages && after that install tool


01. Ubuntu 18.04
02. Ubuntu 19.04
03. Kali Linux --


04. Debian

99. kembali ke menu
AquaCode ~
ΒΆΒΆ Super-Inspector

scanning tool designed to fast port scanning using multy types of tools with a better result
#nmap #network Scan

πŸ“git clone https://github.com/0xBlackBunnies/Super-Inspector

πŸ“cd Super-Inspector
πŸ“ls
πŸ“python theinspector.py

[1] Network Scanning & Enumeration
[2] HASH/PASSWORD Cracking Tools


[+] What Do You Want The Inspector To Do? (1/2)
πŸ‘1
ΒΆΒΆ Nmap
#nmap Scanning

ΒΆΒΆ Network Scanning using NMAP (Beginner Guide)

https://www.hackingarticles.in/network-scanning-using-nmap-beginner-guide/

-------------------------
ΒΆΒΆ Understanding Guide to Nmap Firewall Scan (Part 1)

https://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-1/

-------------------------
ΒΆΒΆ Understanding Guide to Nmap Firewall Scan (Part 2)
https://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-2/

------------------------
ΒΆΒΆ Nmap Scans using Hex Value of Flags

https://www.hackingarticles.in/nmap-scans-using-hex-value-flags/

-----------------------
ΒΆΒΆ Nmap for Pentester: Output Format Scan

https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/
ΒΆΒΆ TOOLS-INSTALLER
TOOLS-INSTALLER VERSION 2.0
#termuxtools #nmap #sql #ngrok #weeman #cupp #wordlist

πŸ“pkg update && pkg upgrade
πŸ“apt update && apt upgrade
πŸ“pkg install python && pkg install python2
πŸ“git clone https://github.com/maskprivate1457/TOOLS-INSTALLER
πŸ“cd TOOLS-INSTALLER
πŸ“python TOOLS.py


1.Install Nmap
2. Install Hydra
3. Install SQLMap
4. Install Metasploit
5. Install ngrok
6. Install Kali Nethunter
7. Install angryFuzzer
8. Install Red_Hawk
9. Install Weeman
10. Install IPGeoLocation
11. Install Cupp
12. Instagram Bruteforcer (instahack)
13. Twitter Bruteforcer
14. Install Ubuntu
15. Install Fedora
16. Install viSQL
17. Install Hash-Buster
18. Install D-TECT
19. Install routersploit
20. Grup Whatsapp
πŸ‘4
πŸ‘¨β€πŸ’» Now, I'm sharing my code and notes to help You!!🎯
πŸ”— Check out
#nmap

==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods

nmap --script http-methods --script-args
http-methods. url-path='/webs ite '

###

sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==

WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================

c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==

===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30

===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====

==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"

===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"

πŸ“š Learn, practice, and let's achieve OSCP success together! πŸ’ͺπŸ†
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp

πŸ” Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp

πŸ”Google dork for searching these filenames on Google:

intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR

https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
πŸ‘8❀6