You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Getting Started
git clone https://github.com/Screetsec/Dracnmap.git
cd Dracnmap
chmod +x Dracnmap.sh
sudo ./Dracnmap.sh or sudo su ./Dracnmap.sh
Requirements
A linux operating system. We recommend Kali Linux 2 or Kali 2016.1 rolling / Cyborg / Parrot / Dracos / BackTrack / Backbox / and another operating system ( linux )
Must install nmap
Note:- This tool is only for educational purpose. We are not responsible for any misuse or illegal activities.
THECHOICE TOOL All in one tools
installation commands in termux.
Installation Commands
apt update && apt upgrade
pkg install git -y
git clone https://github.com/8L4NK/thechoice
cd thechoice
chmod +x thechoice
bash thechoice
NOW ENJOY AND USE THE TOOL... 🫡
Note:- This tool is only for educational purposes. We are not responsible for any misuse or illegal activities.
Lazymux is a tool installer that is specially made for termux user which provides a lot of tool mainly used tools in termux and its easy to use, Lazymux install any of the given tools provided by it from itself with just one click, and its often get updated.
FEATURE
Tool Installation
Install Single Tool
lzmx > set_install 1
Install Multi Tool
lzmx > set_install 1 2 3 4
Install All Tool
lzmx > set_install @
Default Dir Install On lazymux.conf replace symbol ~ with directory you want
Example: lazymux.conf
HOME = /sdcard
Requirements
• Python 3.x
Installation and Using Lazymux
apt install python git
git clone https://github.com/Gameye98/Lazymux
cd Lazymux
python lazymux.py
ENJOY 🫡 Sharing is caring
Note:- This tool is only for educational purpose. We are not responsible for any misuse or illegal activities.
RED_HAWK -- All in one tool for Information Gathering and Vulnerability Scanning
Installation:
Run The Tool and Type fix This will Install All Required Modules.
For The Bloggers View To Work Properly you have to configure RED HAWK with moz.com's api keys for that follow the following steps:
How To Configure RED HAWK with moz.com for Bloggers View Scan
Create an account in moz follow this link : https://moz.com/community/join
After successful account creation and completing the verification you need to generate the API Keys
You can get your API Keys here: https://moz.com/products/mozscape/access
Get your AccessID and SecretKey and replace the $accessID and $secretKey variable's value in the config.php file
All set, now you can enjoy the bloggers view.
Usage:
git clone https://github.com/Tuhinshubhra/RED_HAWK
cd RED_HAWK
php rhawk.php
Use the "help" command to see the command list or type in the domain name you want to scan (without Http:// OR Https://).
Select whether The Site Runs On HTTPS or not.
Select the type of scan you want to perform
Leave the rest to the scanner
List of CMS Supported
RED HAWK's CMS Detector currently is able to detect the following CMSs (Content Management Systems) in case the website is using some other CMS, Detector will return could not detect.
WordPress
Joomla
Drupal
Magento
Brutal
Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device
Getting Started
git clone https://github.com/Screetsec/Brutal.git
cd Brutal
chmod +x Brutal.sh
sudo ./Brutal.sh or sudo su ./Brutal.sh
Note:- This tool is only for educational purpose. We are not responsible for any misuse or illegal activities.
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and can be used in CTF for manipulation,combine,transform and permutation some words or file text 😛 i wrote this just for fun and learn how create interactive shell is work
Getting Started
git clone https://github.com/Screetsec/Brutesploit.git
cd Brutesploit
chmod +x Brutesploit
sudo ./Brutesploit or sudo su ./Brutesploit
A linux operating system. We recommend :
Kali Linux 2 or Kali 2016.1 rolling
Cyborg
Parrot
BackTrack
Backbox
Metasploit on Termux
Metasploit on Termux
Last complete installation method!
apt-get update -y
apt-get upgrade -y
# use pkg install python
apt install python python2 -y
pip install lolcat
git clone https://github.com/h4ck3r0/Metasploit-termux
cd $HOME
cd Metasploit-termux
chmod +x *
bash metasploit.sh
TorBot:-- Dark Web OSINT Tool.
Features:-
1. Onion Crawler (.onion). (Completed)
2. Returns Page title and address with a short description of the site. (Partially Completed)
3. Save links to the database. (PR to be reviewed)
4. Get emails from the site. (Completed)
5. Save crawl info to JSON file. (Completed)
6. Crawl custom domains. (Completed)
7. Check if the link is live. (Completed)
8. Built-in Updater. (Completed)
9. TorBot GUI (In progress)
10. Social Media integration. (not Started)
11. Build a visual tree of link relationships that can be quickly viewed or saved to an image file (Completed)
#Download #Link:-
https://github.com/DedSecInside/TorBot
Note:- This tool is only for educational purpose. We are not responsible for any misuse or illegal activities.
RouterSploit - Exploitation Framework for Embedded Devices that can run in Termux
RouterSploit - Exploitation Framework for Embedded Devices that can run in Termux
It consists of various modules that aid penetration testing operations:
1) exploits - modules that take advantage of identified vulnerabilities
2) creds - modules designed to test credentials against network services…… 顯示更多
RouterSploit - 可在 Termux 中運行的嵌入式裝置開發框架
它由各種輔助滲透測試操作的模組組組成:
1) 剝削 - 利用認定脆弱性的模組
2) creds - 旨在測試憑證對抗網路服務的模組
3) 掃描器 - 檢查目標是否容易受到任何剝削的模組
4)有效載荷 - 負責為各種架構和注射點產生有效載荷的模組
5) 通用 - 執行通用攻擊的模組
使用有效載載模組,我能夠在自己測試的路由器上識別弱的webconsole管理員密碼。
https://github.com/threat9/routersploit
TERMUX INSTALLATION GUIDE
pkg update -y
pkg upgrade -y
pkg install git
git clone https://github.com/3xploitGuy/webscrape.git
cd webscrape
webscrape
chmod +x webscrape.sh
webscrape
bash webscrape.sh
You must have use https://....
INSTALLING AND REQUIREMENTS
Linux or Unix-based system
~ ❯❯❯ git clone https://github.com/3xploitGuy/webscrape.git
~ ❯❯❯ cd webscrape
~/webscrape ❯❯❯ chmod +x webscrape.sh
~/webscrape ❯❯❯ ./webscrape.sh
SHARING IS CARING
Note:- This tool is only for educational purpose. We are not responsible for any misuse or illegal activities.
dBmonster :-- Track WiFi Devices With Their Received Signal Strength.
Features:-
1. Listing WiFi interfaces
2. Track & scan on 2.4GHz
3. Track & scan on 5GHz
4. Scanning for AP
5. Scanning for STA
6. Beep when a device found
Download Link:-
https://github.com/90N45-d3v/dBmonster
Sharing is Caring
Note:- This tool is only for educational purpose. We are not responsible for any misuse or illegal activities.
Cyber-Bookmarks
A list of bookmarks I have used since I started my journey in cyber security
Follow up: https://twitter.com/devmehedi101
https://www.youtube.com/@SecurityTalent
https://t.me/Securi3yTalent
https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html