Termux-Nethunter

Termux Nethunter for Termux users

we can run some linux root tools with this nethunter in Termux

Installation :

$ apt update 

$ apt upgrade

$ apt install git

$ git clone https://github.com/Hax4us/Nethunter-In-Termux

$ cd Nethunter-In-Termux

$ chmod +x *

./kalinethunter

Now select your architecture 

Now type this command to start 

$ startkali
Compulsory Steps For First Time Use

So after startkali

OWScan

Scan your website for vulnerabilities. Find website application vulnerabilities and fingerprint the target web application.

Installation :

$ apt update && apt upgrade

$ apt install git 

$ apt install php

$ git clone https://github.com/Gameye98/OWScan

$ cd OWScan

$ chmod +x *

usage :

$ php owscan.php

Enter target site for example : example.com .it gives you information related to your target site

Termux Lazy Script

This tool is specially Designed for Termux Beginner users.

This tool is very helpfull for Beginners.

here simply type number of tool to use

after usage press enter to launch again Termux-Lazyscript.

Installation :

$ apt update && apt upgrade

$ apt install git 

$ apt install python2

$ git clone https://github.com/TechnicalMujeeb/Termux-Lazyscript.git

$ cd Termux-Lazyscript

$ chmod +x *

$ sh setup.sh

usage :

python2 ls.py

now here simply type number to use that tool

Enjoy.

RouterSploit Framework

RouterSploit Framework scan the routers devices and check the vulnerabilities of Routers/Devices and exploits by the using frameworks.

It consists of many more powerful modules for penetration testing operations

RouterSploit installation: 

Execute these commands one by one.

$ apt update 

$ apt upgrade

$ apt install python

$ apt install python2

$ git clone https://github.com/reverse-shell/routersploit.git

$ cd routersploit

Now install These all packages step by step :

$ pip2 install -r requirments-dev.txt

$ pip2 install -r requirments.txt

$ pip2 install request

$ pip2 install requests

Run routersploit:

python2 rsf.py

rsf> show all

it’s shows all modules of rotersploit

rsf> use “module name”

it shows how you can use that module

This is strictly for educational purposes. The author will it be held responsible for any misuse of the info provided here.

How To Send Message To Any Contact Using Termux/Spamming And Make Fake Call

Firstly you need to install these apps from playstore

1] Termux App 

2] Termux API App

Now open Termux and follow these steps

installation :

$ apt update 

$ apt upgrade

$ apt install termux-api

message sending process :

$ termux-sms-send -n 9999999999 text

9999999999 = Receiver number

text = your message here

First you need to install these apps from playstore

1] Termux App 

2] Termux API App

Now open Termux and follow these steps

installation :

$ apt update 

$ apt upgrade

$ apt install termux-api

call process :

$ termux-telephony-call 9999999999

9999999999 = number of victim

Phishing Tools for Termux

👉Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, WordPress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest

Installation :

$ apt update && apt upgrade

$ apt install git 

$ git clone https://github.com/thelinuxchoice/shellphish

$ cd shellphish

Run :

$ bash shellphish.sh

select your option
it will generates phishing url ..Now send this url to victem for phishing


👉SocialFish ultimate phishing tool such as

Twitter

stackoverflow

wordpress

github

google

facebook

Installation :

$ apt update 

$ apt upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/UndeadSec/SocialFish.git

$ cd SocialFish

$ chmod +x *

$ pip2 install -r requirements.txt

usage :

$ python2 SocialFish.py

Now select your target and it will generate an url using Ngrok

installation :

👉Weeman phishing tool 

$ apt update 

$ apt upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/evait-security/weeman

$ cd weeman

$ chmod +x *

usage :

$ python2 weeman.py

$ set url http://target.com

$ set action_url http://target.com

$ run

Famous Hacking Group that make History

Anonymous

Famous with the general populace for their vendetta (pun intended) against ISIS while donning the Guy Fawkes masks,

Anonymous is an open online creation group spread in many parts of the world.

They stand against the injustice of all kinds, keeping with their personality of vigilantes that becomes apparent with their Guy Fawkes masks.

They acted against the Church of Scientology, hacked the Pentagon, attacked Visa, PayPal and MasterCard for refusing payments to WikiLeaks, and took down some websites belonging to ISIS.

Many individuals from countries like Netherlands, USA, UK, Australia, Spain, and Turkey have been arrested for being allegedly belonging to Anonymous.
_________________________

>> Lizard Squad

Lizard Squad’s list of victims includes high profile websites like the Malaysian Airlines website,

Where users were redirected to a page with the message “404- plane not found”, and Facebook.

Although Facebook denied being hacked, their network was down for some time due to a DDoS attack by Lizard Squad.

The group has also attacked Sony and Microsoft, with their members posting ISIS flags on Sony’s servers.

Some members were arrested in USA and England following their Xbox and PlayStation hacks.  _________________________

>> The Level Seven Crew

One of the most notorious groups of previous years,

The Level Seven Crew was involved in some big hacks in 1999 but their functioning stopped in 2000.

They were allegedly inspired by the seventh level of hell according to Dante’s Inferno, which is the violent level.

Their list of victims includes The First American National Bank, NASA, the US Embassy in China’s Website, and Sheraton Hotel _________________________

>> Chaos Computer Club

Chaos Computer Club or CCC was formed in 1981 in Germany and now operates across national borders in many countries around the world.

This group works to make information free and accessible to everyone.

They became news when they hacked the German Bildschirmtext computer network and debited 134,000 Deutsch Marks from a Hamburg bank and returning the money the next day,having shown the flaws in the security system.

They also hacked the US government’s computers and sold the source code of its operating system to the KGB in 1989.
_________________________

>> LulzSec

This group, short for Lulz Security, was founded as a spinoff of Anonymous after the 2011 HBGarry Hack.

Their slogan said “laughing at your security since 2011”.

Their existence was announced to the world when they first hacked Fox.com, followed by Sony Pictures, in 2011.

After that, LulzSec took down CIA’s website as well.

However, in 2012, the group members were arrested by the FBI because their leader, named Sabu, gave them away.
_________________________

>> Syrian Electronic Army

Syrian Electronic Army aka SEA, is one of the groups that has a strict purpose of their functioning,which is to stamp out opposition groups in Syria.

They are widely accredited to be active supporters of Syrian president Bashar al-Assad and identify themselves as active Syrian youths who will not stand by idly to watch massive distortion of facts about recent uprisings in Syria.

Their activity is routinely marked by posting of the Syrian flag on a victim’s website,

With the group using techniques like phishing, DDoS attacks, spamming, and malware.

They have targeted Twitter accounts as well as Facebook pages of influential people like Barack Obama and French President Nicolas Sarkozy. _________________________

>> GlobalHell

This was a hacking group that was started by a street-gang member named Patrick Gregory.

The group’s activity includes hacking some 115 websites and destroying their data leading to millions of dollars’ worth damage.

Although Gregory took to computers, his group behaved in a similar way a street gang does, with the group regularly writing “global hell will not die” on US Army’s website.

>> Network Crack Program Hacker Group

The NHCP Group is believed to have been found in China in 1994, the group is supposedly the one who funded the People’s Liberation Army.

Their leader, Tan Dailin, was also widely believed to be working for the Chinese army. _________________________

>> TeaMp0isoN

This group was started by a 16-year in old in 2010 who used the pseudonym Trick.

The activity of this group included hacking into NATO, Facebook, Daily Mail UK site, the English Defence League, which included Tony Blair’s account.

Although they supposedly broke up in 2012, they resurfaced in 2015 as a white-hat security research group.
_________________________

>> Tarh Andishan

Tarh Andishan is an Iranian hacking group that is comprised of a group of 20 highly skilled and talented hackers.

It is believed that the group, based in Tehran, formed due to the Stuxnet worm virus which, according to Iran, was a joint effort by US and Israeli forces against them.

Their activity ranges far and wide, with the group being believed by many to wanting to control all the web-based systems of the world.

Their victims consist of many security systems as well as airline gates.

Their most notorious activity, though, is believed to be Operation Cleaver, which is an operation targeting military, energy and utilities, oil and gas, airlines, airports, transportation, and hospitals.

More than 50 entities in over 16 countries including China, USA, Saudi Arabia, India, Israel, France, Germany, and England have been hit by this campaign.

Tarh Andishan uses techniques like SQL injection attacks, self-propagating software, backdoors, etc.  _________________________

>> End Note

The hacking groups discussed in this article are just some of the many hacking groups that are functioning or are known to have functioned at some point of time in the world.

Their activity shows that hacking is a serious issue, with some reports claiming that more than $575 trillion has been lost as damage due to cyber crime or activities of hacktivists.

While some of these hacking groups have a social or political agenda behind their formation and activities, others are just groups of people who are out there to instil fear in people.

While some, like Anonymous, have gained popularity with people for targeting terrorist outfits like ISIS, others have received widespread hate and criticism for rendering public services helpless only for their personal gain.

Their stamping out is like cutting a tree with seeds in its flowers; the cutting of one tree sprouts many others due to the spilling of the seeds.

Termux Command For Tracking Victim

Retrieve IP Geolocation information 

Features

Retrieve IP or Domain Geolocation.

Retrieve your own IP Geolocation.

Retrieve Geolocation for IPs or Domains loaded from file. 

Each target in new line.

Define your own custom User Agent string.

Select random User-Agent strings from file.

Each User Agent string in new line.

Proxy support.

Select random proxy from file. Each proxy URL in new line.

Open IP geolocation in Google Maps using the default browser.

Export results to csv, xml and txt format.

# Geolocation Information :

1.ASN

2.City

3.Country

4.Country Code

5.ISP

6.Latitude

7.Longtitude

8.Organization

9.Region Code

10.Region Name

11.Timezone

12.Zip Code

Installation :

$ apt update && apt upgrade

$ apt install git 

$ apt install python

$ git clone https://github.com/maldevel/IPGeoLocation

$ cd IPGeoLocation

$ chmod +x *

$ pip install -r requirements.txt

Usage :

$ python ipgeolocation.py -t [target ip]

it gives you all information related to your target..

Brutal Attack

This is a toolkit to quickly create various payload, 

powershell attack, virus attack.and launch listener 

for a human interface devices..this is extreamly useful 

for executing scripts on a target machin..

For use this tool you must install sudo in your termux

means it need rooted devices..

Installation :

$ apt update && apt upgrade

$ apt install git 

$ git clone https://github.com/Screetsec/Brutal

$ cd Brutal

$ chmod +x *

Run :

$ sudo ./Brutal.sh

Now simply select your option which you want..

Breacher : Termux command.

An advanced multithreaded admin panel finder written in pythonA
script to find admin login pages and EAR vulnerabilites.
Features

1.Multi-threading on demand

2.Big path list (482 paths)

3.Supports php, asp and html extensions

4.Checks for potential EAR vulnerabilites

5.Checks for robots.txt

6.Support for custom patns
Installation :

$ apt update && apt upgrade

$ apt install git

$ apt install python2

$ apt install python

$ git clone https://github.com/s0md3v/Breacher

$ cd Breacher
Run :

$ python2 breacher.py
Check all paths without threads

$ python2 breacher -u example.com

Design a site like this with WordPress.com
Get started