Found 482 repositories(showing 30)
MGz-Staze
Cara Update dan Upgrade Termux pkg update && pkg upgrade Tools Pendukung untuk Termux Tools pendukung yang di perlukan agar tools yang lain work. <—-| PENTING pkg install git php curl -y pkg install python2 pkg install apache2 Trik Termux Untuk mematikan atau memberhentikan tools tekan tombol volume bawah (-) + C secara bersamaan Untuk memunculkan commands sebelumnya tekan tombol volume bawah + P Menampilkan Tombol ESC, HOME, CTRL dan lainnya Tekan Tombol volume atas + Q script termux Menampilkan Matrix Ini cuma menampilkan angka dan huruf berjatuhan, terlihat keren •pkg install cmatrix cmatrix mempercantik termux Note : Jika ada pertanyaan saat install, silahkan ketik tombol y lalu enter saja, agar proses install dapat berjalan dengan lancar. Ratusan Tools Termux Sebagian dari Kali Linux •pkg install git •git clone https://github.com/Mrcakil/mrcakil •cd mrcakil •chmod +x tools •./tools ratusan tools termux Bermain atau Memunculkan Kereta Api pkg install sl sl main termux Bot Auto Reaction Facebook •git clone https://github.com/AMVengeance/FB-React.git •chmod +x FB-React -R cd FB-React •./start fb react Bot Love Instagram •git clone https://github.com/indogram/indotagram.git •php indotagram/login.php Masukkan username dan password instagram untuk memunculkan cookie Kemudian copy dan paste kode cookie ke website penyedia bot instagram disini bot instagram NIK dan KK Gratis •pkg install php git •git clone https://github.com/IndonesiaSecurity/kkktp •cd kkktp php •kkktp.php Menjalankan Musik di Termux pkg install mpv mpv /lokasi/musik/musik.mp3 cara memutar musik di termux Menampilkan Informasi System pkg install neofetch neofetch tampilan informasi Membuat Tulisan atau Teks Besar di Termux pkg install figlet figlet initulisannya cara membuat tulisan nesar di termux Crack hash password git clone https://github.com/FajriHidayat088/FHX-Hash-Killer/ cd FHX-Hash-Killer python2 FHXHashKiller.py Cara Menginstall Metasploit di Termux Metasploit adalah tools hacking yang dapat di gunakan untuk kegiatan seperti remote pc atau hp orang lain, membuat virus, menyadap dan lain sebagainya. Cara Install dan Menjalankannya pkg install curl curl -LO https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh chmod +x metasploit.sh ./metasploit.sh Cara Install Wifite di Termux Android Wifite adalah salah satu tool yang berfungsi untuk wireless attack, seperti mengcrack atau membobol password wifi yang terkunci dengan wpa/wpa2, Cara Install Wifite git clone https://github.com/derv82/wifite cd wifite chmod 777 wifite.py Cara Menjalankan Wifite python2 wifite.py Bruteforce Bruteforce ini metode hacking yang dimana kita akan membuat suatu wordlist yang berisi kumpulan tebakan password, jika ada salah satu password yang sesuai maka akun bisa di dapatkan. pkg install pip pip install wordlist pkg install worlist wordlist -h cd /sdcard cat pas.txt Redhawk Fitur Redhawk Server detection Cloudflare detector robots scanner Whois GEO-IP Scan NMAP Port Scan DNS Lookup SubNet Calculator Subdomain Finder Reverse IP Scanner CMS detection For Sites On the same server. Parameter Finder Error based SQLi Detector Dan lain – lain. Cara install dan menjalankan Redhawk git clone https://github.com/Tuhinshubhra/RED_HAWK cd RED_HAWK chmod +x rhawk.php php rhawk.php Install SQLMAP Tools ini berguna sekali untuk kegiatan mengetes keamanan website, deface, carding dan semacamnya gi clone https://github.com/sqlmapproject/sqlmap cd sqlmap python2 sqlmap.py Cara menjalankan python2 sqlmap.py -u website.com --dbs Mengetahui semua parameter Sqlmap python2 sqlmap.py -hh Melacak IP git clone https://github.com/maldevel/IPGeolocation cd IPGeolocation chmod +x ipgeolocation.py pip install -r requirements.txt python ipgeolocation.py -m python ipgeolocation.py -t IPnya Hack Akun Facebook •pkg install python2-dev •apt install wget dip2 •install mechanize •cd/sterage/emulated/0 python2 fbbrute.py •storage/emulated/0/password.txt Membuat Virus git clone https://github.com/viruz09/CreaterVirus cd CreaterVirus python2 creater.py Cara copy virus cp agents.apk /lokasi/folder DDOS DDOS berguna untuk menyerang website dengan memberikan traffic yang tinggi sehingga website tersebut down. git clone https://github.com/4L13199/LITEDDOS python2 LITEDDOS.py [ip target atau domain] [port] [jumlah traffic] Cara Install Santet Online Di Termux Fitur Create a Netcat Payload and Listener Facebook Group Hijack Attack SMS Bomber Attack Vectors SMS Spoof Attack Vectors Denial-of-Service Attack •git clone https://github.com/Gameye98/santet-online •cd santet-online •python2 santet.py Tools B4J1N94N Fitur Nyari CC buat carding Spam akun gmail Whois lookup Dan ratusan tools lainnya •git clone https://github.com/DarknessCyberTeam/B4J1N64Nv5 •cd B4J1N64Nv5 •sh B4J1N64N.sh
lightspin-tech
Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)
Sentdex
Bot that detects spam/affiliate marketing authors, and posts some stats on their threads.
lucab85
Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)
tjenkinson
A CLI and library which tests helps score how vulnerable a regex pattern is to ReDoS attacks. Supported in the browser, Node and Deno.
olivo
A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.
shizhouxing
[TACL] Code for "Red Teaming Language Model Detectors with Language Models"
hjespers
Node-Red module for Nest thermostats and smoke detectors
hengyoush
No description available
nextgenusfs
Genome assembly soft-masking using Red (REpeat Detector)
BloodCell-Detector-Yolo is a YOLOv5 implementation tailored to detect Red Blood Cells (RBC), White Blood Cells (WBC), and Platelets from microscopic images. This project includes a self-trained model to accurately identify and count these blood cell types. The detected cells are labeled in the images, and their counts are provided .
RedDetectorDev
紅色背景偵測器 喺一個幫你喺上緊網嘅時候,自動辨認紅色背景嘅公司、牌子、字句等等嘅 browser extension
pushshift
Script to extract highly probable bots for further analysis
SumeetGadewar27
An automatic traffic red-light violation detection system was implemented, which may play a big role in transportation management in smart cities. The system mainly relies on modern computer vision techniques, which was implemented in OpenCV under Python environment. Mainly, the system consists of object detector and object tracker which work in an integrated manner in order to precisely keep position of the existing cars. The primary task of the system is to eventually indicate locations of violating vehicles. The output showed accurate results, as all violating vehicles were detected and distinguished precisely.
tjenkinson
An ESLint plugin that detects vulnerable regex using "https://github.com/tjenkinson/redos-detector".
piotr-oles
Redux enhancer for pure detection of state changes.
radonys
A Reddit Flair Detector using Machine Learning Algorithms
bocaletto-luca
Gas-Detector-With-Allarm - Continuously monitor combustible gas (LPG, methane, smoke) with an MQ-2 sensor. When the analog reading exceeds a user-defined threshold, trigger a visual (red LED) and audible (buzzer) alarm for a fixed duration, while a green LED indicates “safe” status. By Bocaletto Luca
captain-woof
A reddit bot that periodically checks subreddits for AI-generated posts, then comments the detection results in the post. Intended to detect scammers.
elliotsecops
a network traffic anomaly detector that captures and analyzes network packets to identify anomalous behavior. It uses machine learning techniques to detect deviations from normal traffic patterns // un detector de anomalías en el tráfico de red que captura y analiza paquetes de red para identificar comportamientos anómalos.
CovenantJunior
Motion Detector: A web-based simulation using JavaScript that mimics a motion sensor's behavior. Experience motion detection by interacting with the sensor area, represented as a gray background, which turns red when motion is detected for one second. Simple, interactive, and perfect for learning motion detection concepts.
Anonymous69-hub
1eh6mqlqs5@xdsedr.tech#!/usr/bin/python # -*- coding: UTF-8 -*- import os import shutil import sys import subprocess import string import random import json import re import time import argparse import zipfile from io import BytesIO from concurrent.futures import ThreadPoolExecutor, as_completed from utils.decorators import MessageDecorator from utils.provider import APIProvider try: import requests from colorama import Fore, Style except ImportError: print("\tSome dependencies could not be imported (possibly not installed)") print( "Type `pip3 install -r requirements.txt` to " " install all required packages") sys.exit(1) def readisdc(): with open("isdcodes.json") as file: isdcodes = json.load(file) return isdcodes def get_version(): try: return open(".version", "r").read().strip() except Exception: return '1.0' def clr(): if os.name == "nt": os.system("cls") else: os.system("clear") def bann_text(): clr() logo = """ ████████ █████ ██ ▒▒▒██▒▒▒ ██▒▒██ ██ ██ ██ ██ ██ ██ ██ ██ █████▒ ████ ███ ███ █████ ██ ██▒▒██ ██ ██ ██▒█▒██ ██▒▒██ ██ ██ ██ ██ ██ ██ ▒ ██ ██ ██ ██ █████▒ ▒████▒ ██ ██ █████▒ ▒▒ ▒▒▒▒▒ ▒▒▒▒ ▒▒ ▒▒ ▒▒▒▒▒ """ if ASCII_MODE: logo = "" version = "Version: "+__VERSION__ contributors = "Contributors: "+" ".join(__CONTRIBUTORS__) print(random.choice(ALL_COLORS) + logo + RESET_ALL) mesgdcrt.SuccessMessage(version) mesgdcrt.SectionMessage(contributors) print() def check_intr(): try: requests.get("https://motherfuckingwebsite.com") except Exception: bann_text() mesgdcrt.FailureMessage("Poor internet connection detected") sys.exit(2) def format_phone(num): num = [n for n in num if n in string.digits] return ''.join(num).strip() def do_zip_update(): success = False if DEBUG_MODE: zip_url = "https://github.com/TheSpeedX/TBomb/archive/dev.zip" dir_name = "TBomb-dev" else: zip_url = "https://github.com/TheSpeedX/TBomb/archive/master.zip" dir_name = "TBomb-master" print(ALL_COLORS[0]+"Downloading ZIP ... "+RESET_ALL) response = requests.get(zip_url) if response.status_code == 200: zip_content = response.content try: with zipfile.ZipFile(BytesIO(zip_content)) as zip_file: for member in zip_file.namelist(): filename = os.path.split(member) if not filename[1]: continue new_filename = os.path.join( filename[0].replace(dir_name, "."), filename[1]) source = zip_file.open(member) target = open(new_filename, "wb") with source, target: shutil.copyfileobj(source, target) success = True except Exception: mesgdcrt.FailureMessage("Error occured while extracting !!") if success: mesgdcrt.SuccessMessage("TBomb was updated to the latest version") mesgdcrt.GeneralMessage( "Please run the script again to load the latest version") else: mesgdcrt.FailureMessage("Unable to update TBomb.") mesgdcrt.WarningMessage( "Grab The Latest one From https://github.com/TheSpeedX/TBomb.git") sys.exit() def do_git_update(): success = False try: print(ALL_COLORS[0]+"UPDATING "+RESET_ALL, end='') process = subprocess.Popen("git checkout . && git pull ", shell=True, stdout=subprocess.PIPE, stderr=subprocess.STDOUT) while process: print(ALL_COLORS[0]+'.'+RESET_ALL, end='') time.sleep(1) returncode = process.poll() if returncode is not None: break success = not process.returncode except Exception: success = False print("\n") if success: mesgdcrt.SuccessMessage("TBomb was updated to the latest version") mesgdcrt.GeneralMessage( "Please run the script again to load the latest version") else: mesgdcrt.FailureMessage("Unable to update TBomb.") mesgdcrt.WarningMessage("Make Sure To Install 'git' ") mesgdcrt.GeneralMessage("Then run command:") print( "git checkout . && " "git pull https://github.com/TheSpeedX/TBomb.git HEAD") sys.exit() def update(): if shutil.which('git'): do_git_update() else: do_zip_update() def check_for_updates(): if DEBUG_MODE: mesgdcrt.WarningMessage( "DEBUG MODE Enabled! Auto-Update check is disabled.") return mesgdcrt.SectionMessage("Checking for updates") fver = requests.get( "https://raw.githubusercontent.com/TheSpeedX/TBomb/master/.version" ).text.strip() if fver != __VERSION__: mesgdcrt.WarningMessage("An update is available") mesgdcrt.GeneralMessage("Starting update...") update() else: mesgdcrt.SuccessMessage("TBomb is up-to-date") mesgdcrt.GeneralMessage("Starting TBomb") def notifyen(): try: if DEBUG_MODE: url = "https://github.com/TheSpeedX/TBomb/raw/dev/.notify" else: url = "https://github.com/TheSpeedX/TBomb/raw/master/.notify" noti = requests.get(url).text.upper() if len(noti) > 10: mesgdcrt.SectionMessage("NOTIFICATION: " + noti) print() except Exception: pass def get_phone_info(): while True: target = "" cc = input(mesgdcrt.CommandMessage( "Enter your country code (Without +): ")) cc = format_phone(cc) if not country_codes.get(cc, False): mesgdcrt.WarningMessage( "The country code ({cc}) that you have entered" " is invalid or unsupported".format(cc=cc)) continue target = input(mesgdcrt.CommandMessage( "Enter the target number: +" + cc + " ")) target = format_phone(target) if ((len(target) <= 6) or (len(target) >= 12)): mesgdcrt.WarningMessage( "The phone number ({target})".format(target=target) + "that you have entered is invalid") continue return (cc, target) def get_mail_info(): mail_regex = r'^[a-z0-9]+[\._]?[a-z0-9]+[@]\w+[.]\w{2,3}$' while True: target = input(mesgdcrt.CommandMessage("Enter target mail: ")) if not re.search(mail_regex, target, re.IGNORECASE): mesgdcrt.WarningMessage( "The mail ({target})".format(target=target) + " that you have entered is invalid") continue return target def pretty_print(cc, target, success, failed): requested = success+failed mesgdcrt.SectionMessage("Bombing is in progress - Please be patient") mesgdcrt.GeneralMessage( "Please stay connected to the internet during bombing") mesgdcrt.GeneralMessage("Target : " + cc + " " + target) mesgdcrt.GeneralMessage("Sent : " + str(requested)) mesgdcrt.GeneralMessage("Successful : " + str(success)) mesgdcrt.GeneralMessage("Failed : " + str(failed)) mesgdcrt.WarningMessage( "This tool was made for fun and research purposes only") mesgdcrt.SuccessMessage("TBomb was created by SpeedX") def workernode(mode, cc, target, count, delay, max_threads): api = APIProvider(cc, target, mode, delay=delay) clr() mesgdcrt.SectionMessage("Gearing up the Bomber - Please be patient") mesgdcrt.GeneralMessage( "Please stay connected to the internet during bombing") mesgdcrt.GeneralMessage("API Version : " + api.api_version) mesgdcrt.GeneralMessage("Target : " + cc + target) mesgdcrt.GeneralMessage("Amount : " + str(count)) mesgdcrt.GeneralMessage("Threads : " + str(max_threads) + " threads") mesgdcrt.GeneralMessage("Delay : " + str(delay) + " seconds") mesgdcrt.WarningMessage( "This tool was made for fun and research purposes only") print() input(mesgdcrt.CommandMessage( "Press [CTRL+Z] to suspend the bomber or [ENTER] to resume it")) if len(APIProvider.api_providers) == 0: mesgdcrt.FailureMessage("Your country/target is not supported yet") mesgdcrt.GeneralMessage("Feel free to reach out to us") input(mesgdcrt.CommandMessage("Press [ENTER] to exit")) bann_text() sys.exit() success, failed = 0, 0 while success < count: with ThreadPoolExecutor(max_workers=max_threads) as executor: jobs = [] for i in range(count-success): jobs.append(executor.submit(api.hit)) for job in as_completed(jobs): result = job.result() if result is None: mesgdcrt.FailureMessage( "Bombing limit for your target has been reached") mesgdcrt.GeneralMessage("Try Again Later !!") input(mesgdcrt.CommandMessage("Press [ENTER] to exit")) bann_text() sys.exit() if result: success += 1 else: failed += 1 clr() pretty_print(cc, target, success, failed) print("\n") mesgdcrt.SuccessMessage("Bombing completed!") time.sleep(1.5) bann_text() sys.exit() def selectnode(mode="sms"): mode = mode.lower().strip() try: clr() bann_text() check_intr() check_for_updates() notifyen() max_limit = {"sms": 500, "call": 15, "mail": 200} cc, target = "", "" if mode in ["sms", "call"]: cc, target = get_phone_info() if cc != "91": max_limit.update({"sms": 100}) elif mode == "mail": target = get_mail_info() else: raise KeyboardInterrupt limit = max_limit[mode] while True: try: message = ("Enter number of {type}".format(type=mode.upper()) + " to send (Max {limit}): ".format(limit=limit)) count = int(input(mesgdcrt.CommandMessage(message)).strip()) if count > limit or count == 0: mesgdcrt.WarningMessage("You have requested " + str(count) + " {type}".format( type=mode.upper())) mesgdcrt.GeneralMessage( "Automatically capping the value" " to {limit}".format(limit=limit)) count = limit delay = float(input( mesgdcrt.CommandMessage("Enter delay time (in seconds): ")) .strip()) # delay = 0 max_thread_limit = (count//10) if (count//10) > 0 else 1 max_threads = int(input( mesgdcrt.CommandMessage( "Enter Number of Thread (Recommended: {max_limit}): " .format(max_limit=max_thread_limit))) .strip()) max_threads = max_threads if ( max_threads > 0) else max_thread_limit if (count < 0 or delay < 0): raise Exception break except KeyboardInterrupt as ki: raise ki except Exception: mesgdcrt.FailureMessage("Read Instructions Carefully !!!") print() workernode(mode, cc, target, count, delay, max_threads) except KeyboardInterrupt: mesgdcrt.WarningMessage("Received INTR call - Exiting...") sys.exit() mesgdcrt = MessageDecorator("icon") if sys.version_info[0] != 3: mesgdcrt.FailureMessage("TBomb will work only in Python v3") sys.exit() try: country_codes = readisdc()["isdcodes"] except FileNotFoundError: update() __VERSION__ = get_version() __CONTRIBUTORS__ = ['SpeedX', 't0xic0der', 'scpketer', 'Stefan'] ALL_COLORS = [Fore.GREEN, Fore.RED, Fore.YELLOW, Fore.BLUE, Fore.MAGENTA, Fore.CYAN, Fore.WHITE] RESET_ALL = Style.RESET_ALL ASCII_MODE = False DEBUG_MODE = False description = """TBomb - Your Friendly Spammer Application TBomb can be used for many purposes which incudes - \t Exposing the vulnerable APIs over Internet \t Friendly Spamming \t Testing Your Spam Detector and more .... TBomb is not intented for malicious uses. """ parser = argparse.ArgumentParser(description=description, epilog='Coded by SpeedX !!!') parser.add_argument("-sms", "--sms", action="store_true", help="start TBomb with SMS Bomb mode") parser.add_argument("-call", "--call", action="store_true", help="start TBomb with CALL Bomb mode") parser.add_argument("-mail", "--mail", action="store_true", help="start TBomb with MAIL Bomb mode") parser.add_argument("-ascii", "--ascii", action="store_true", help="show only characters of standard ASCII set") parser.add_argument("-u", "--update", action="store_true", help="update TBomb") parser.add_argument("-c", "--contributors", action="store_true", help="show current TBomb contributors") parser.add_argument("-v", "--version", action="store_true", help="show current TBomb version") if __name__ == "__main__": args = parser.parse_args() if args.ascii: ASCII_MODE = True mesgdcrt = MessageDecorator("stat") if args.version: print("Version: ", __VERSION__) elif args.contributors: print("Contributors: ", " ".join(__CONTRIBUTORS__)) elif args.update: update() elif args.mail: selectnode(mode="mail") elif args.call: selectnode(mode="call") elif args.sms: selectnode(mode="sms") else: choice = "" avail_choice = { "1": "SMS", "2": "CALL", "3": "MAIL" } try: while (choice not in avail_choice): clr() bann_text() print("Available Options:\n") for key, value in avail_choice.items(): print("[ {key} ] {value} BOMB".format(key=key, value=value)) print() choice = input(mesgdcrt.CommandMessage("Enter Choice : ")) selectnode(mode=avail_choice[choice].lower()) except KeyboardInterrupt: mesgdcrt.WarningMessage("Received INTR call - Exiting...") sys.exit() sys.exit()
ProgrammingWithYash
A simple Python-based console app that takes in your reddit username and checks if the account is banned / shadowbanned.
mthamil107
Self-learning prompt injection detection engine — 25 input detectors (10 languages), 5 output scanners, PII redaction, red team self-testing, F1: 96.0% with 0% false positives. Docker, GitHub Action, pre-commit, FastAPI/Flask/Django/LangChain/CrewAI/Dify/n8n.
creme332
A basic algorithm for detecting spam bots on Reddit
REDetector
RED-RNA Editing sites Detector.
531ra
Fraud SMS Detector is a Kotlin-based app designed to identify fraudulent SMS messages. It offers two modes: Normal Mode, where users can manually input SMS for fraud detection, and Advance Mode, which monitors SMS in real-time, turning the background color red for detected frauds. Stay secure with instant alerts and detailed reports on suspicious m
A plugin for bukkit.
RachitBansal
Reddit Flair Detector for r/India. Implemented using Flask and PyTorch
chandan21gupta
No description available