-
Quickly Analyze and Reverse Engineer Android packages
ππΌππ πππΈβπ : FEATURES : Device infoIntentsCommand executionSQLite referencesLogging referencesContent providersBroadcast recieversService referencesFile referencesCrypto referencesHardcoded secretsURL’sNetwork connectionsSSL referencesWebView references π¦ INSTALL & RUN : 1) git clone https://github.com/1N3/ReverseAPK 2) cd RevereAPK 3) ./install To use : reverse-apk @AR_4_Tech
-
Tools to check Android App Vulnerablities
π¦ Tool to look for several security related Android application vulnerabilities : π¦πβπππΈπππππΈπππβ & βπβ : With pip (no security checks on requirements): ~ pip install –user qark # –user is only needed if not using a virtualenv~ qark –helpWith requirements.txt (security checks on requirements): ~ git clone https://github.com/linkedin/qark~ cd qark~ pip install -r requirements.txt~…
-
Shortcut Keys for your Computer
Many Useful ShortKeys : Ctrl+A – Select AllCtrl+B – BoldCtrl+C – CopyCtrl+D – Fill DownCtrl+F – FindCtrl+G – GotoCtrl+H – ReplaceCtrl+I – ItalicCtrl+K – Insert HyperlinkCtrl+N – New WorkbookCtrl+O – OpenCtrl+P – PrintCtrl+R – Fill RightCtrl+S – SaveCtrl+U – UnderlineCtrl+V – PasteCtrl W – CloseCtrl+X – CutCtrl+Y – RepeatCtrl+Z – UndoF1 – HelpF2 – EditF3…
-
How To Dox Anyone – IP / Phone Number Dox Method
π₯ How To Dox Anyone – IP / Phone Number Dox Method π₯ π¦ HOW TO DOX ANYONE ( METHOD 1 – ISP / Phone Number DOX). Obtain the victims IP address, this can be through a method as simple as IP grabbing, or you can search databases if you can’t manage to IP grab…
-
Remote Code Execution Using Termux hacking PC in same Network
Today i am going to show you how to execute remote code execution using metasploit in Termux and exploit a vulnerable machine in the same network. I am connected to wifi, ip: 192.168.1.1 *I use Termux(available in playstore)*I will use nmap to discover host on network.*I will use metasploit to exploit the target. Note:I already…
-
How to install DDos/Dos in Termux
This is for Educational purpose only, We are not responsible for what you do. 1. apt update && apt upgrade2. git clone https://github.com/TsNt1x/WedTeam3. cd WedTeam4. chmod 777 wed_ddos.pyc5. python wed_ddos.pyc In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended…
-
How to install Dr0p1t-Framework in Termux
1. apt update && apt upgrade2. git clone https://github.com/D4Vinci/Dr0p1t-Framework.git3. chmod 777 -R Dr0p1t-Framework4. sudo chmod +x install.sh5. ./install.sh6. python Dr0p1t.py Useage,Used to create virus. *This is for Educational purpose only, We are not responsible for what you do.
-
Termux backup and restore commands
Just copy paste for faster work… -Termux Backup,1. cd /data/data/com.termux/files2. tar -cvzf /sdcard/Download/termux.tgz –owner=0 –group=0 home usr -Termux Restore,1. cd /data/data/com.termux/files2. tar -xvzf /sdcard/Download/termux.tgz
-
How to install Lazymux in Termux
This is for Educational purpose only, We are not responsible for what you do 1. apt update && apt upgrade2. git clone https://github.com/Gameye98/Lazymux3. cd lazymux4. python2 lazymux.py Use of this tool,[01] Information Gathering[02] Vulnerability Scanner[03] Stress Testing[04] Password Attacks[05] Web Hacking[06] Exploitation Tools[07] Sniffing & Spoofing[08] Other This Tool is been Updated with Sub’s and…