• PwnXSS: Vulnerability (XSS) scanner exploit.

    Installing Codacy Badge Requirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: git clone https://github.com/pwn0sec/PwnXSS chmod 755 -R PwnXSS cd PwnXSS python3 pwnxss.py --help Main features crawling all links on a website ( crawler engine ) POST and GET forms are supported many settings that can be customized Advanced error handling Multiprocessing support. ETC.... . . . . . . #hackers #hacker #hacking #cybersecurity #ethicalhacking #hack #hacked #ethicalhacker #infosec #hackerman #kalilinux #hackingtools #linux #security #hackerspace #hackerindonesia #cyberattack #technology #pentesting #programming #malware #coding #cyber #cybercrime #informationsecurity #hackinstagram #facebookhack #cybersecurityawareness #hackfacebook #hackernews
    PwnXSS: Vulnerability (XSS) scanner exploit. :STK-18: Installing Codacy Badge Requirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: git clone https://github.com/pwn0sec/PwnXSS chmod 755 -R PwnXSS cd PwnXSS python3 pwnxss.py --help Main features crawling all links on a website ( crawler engine ) POST and GET forms are supported many settings that can be customized Advanced error handling Multiprocessing support.鉁旓笍 ETC.... . . . . . . #hackers #hacker #hacking #cybersecurity #ethicalhacking #hack #hacked #ethicalhacker #infosec #hackerman #kalilinux #hackingtools #linux #security #hackerspace #hackerindonesia #cyberattack #technology #pentesting #programming #malware #coding #cyber #cybercrime #informationsecurity #hackinstagram #facebookhack #cybersecurityawareness #hackfacebook #hackernews
    Gost
    2
    0 Comments 0 Shares 9K Views
  • Archlinux is mostly used by advanced linux users
    Now you can get archlinux on termux-x11 app with awesome desktop environment

    https://github.com/Anon-404/arch-x11
    Archlinux is mostly used by advanced linux users Now you can get archlinux on termux-x11 app with awesome desktop environment 馃捇馃摫 https://github.com/Anon-404/arch-x11
    Love
    Gost
    6
    0 Comments 0 Shares 2K Views
  • Top 10 Phishing Tools available on termux, kali

    ---

    1. NexPhisher

    Description: A multi-functional phishing tool with preloaded templates for platforms like Facebook, Instagram, and Google.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/GITHUB-sys-998/NEXPHISHER.git
    cd NEXPHISHER
    bash setup
    bash nexphisher

    Usage: Choose a phishing template, generate a link, and monitor login credentials.

    Hashtags: #NexPhisher #TermuxTools #Phishing #CyberSecurity



    ---

    2. Whale Phish

    Description: A customizable phishing framework for security testing and credential harvesting.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/devilop-wab/whale-phish.git
    cd whale-phish
    chmod +x whale-phish.sh
    bash whale-phish.sh

    Usage: Launch the script, select a platform template, and share the phishing link.

    Hashtags: #WhalePhish #PhishingFramework #TermuxTools #EthicalHacking



    ---

    3. GbyFB

    Description: A Termux-based phishing tool for Facebook accounts with simple and fast setup.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/Mr-G0b3y/GbyFB.git
    cd GbyFB
    chmod +x GbyFB.sh
    bash GbyFB.sh

    Usage: Choose Facebook templates, generate links, and capture credentials in real-time.

    Hashtags: #GbyFB #FacebookHacking #TermuxTools #Phishing



    ---

    4. AdvPhish

    Description: A powerful advanced phishing tool designed for bypassing 2FA with real-time phishing techniques.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/Ignitetch/AdvPhish.git
    cd AdvPhish
    bash setup.sh

    Usage: Generate a phishing page link and capture credentials while bypassing 2FA.

    Hashtags: #AdvPhish #2FABypass #CyberSecurity #PhishingTool



    ---

    5. Zphisher

    Description: An upgraded version of shellphish with enhanced features and multiple phishing templates.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/htr-tech/zphisher.git
    cd zphisher
    bash zphisher.sh

    Usage: Select a platform template, generate a phishing link, and collect data.

    Hashtags: #Zphisher #EthicalHacking #TermuxTools #SocialEngineering



    ---

    6. HiddenEye

    Description: A modern phishing tool offering advanced phishing pages for platforms like Netflix, PayPal, and more.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/DarkSecDevelopers/HiddenEye.git
    cd HiddenEye
    pip install -r requirements.txt
    python HiddenEye.py

    Usage: Choose your target platform and share the generated phishing link.

    Hashtags: #HiddenEye #AdvancedPhishing #TermuxHacking



    ---

    7. ShellPhish

    Description: A basic phishing tool for educational purposes with customizable templates.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/thelinuxchoice/shellphish.git
    cd shellphish
    bash shellphish.sh

    Usage: Set up a server, generate links, and capture credentials.

    Hashtags: #ShellPhish #BasicPhishing #TermuxTools



    ---

    8. Weeman

    Description: A phishing framework for creating and managing phishing websites.

    Installation:

    pkg update && pkg upgrade
    pkg install python git
    git clone https://github.com/evait-security/weeman.git
    cd weeman
    python weeman.py

    Usage: Launch the tool, set up a phishing site, and start collecting data.

    Hashtags: #Weeman #PhishingFramework #CyberSecurityTesting



    ---

    9. BlackEye

    Description: A simple and effective phishing tool supporting multiple websites.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/thelinuxchoice/blackeye.git
    cd blackeye
    bash blackeye.sh

    Usage: Launch the script, select a template, and start phishing.

    Hashtags: #BlackEye #PhishingTools #CyberSecurity

    10.Evilginx2

    Details: Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of two-factor authentication.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/kgretzky/evilginx2.git
    cd evilginx2
    chmod +x install.sh
    ./install.sh

    Usage: After installation, configure the phishing site templates and launch the tool to start capturing credentials and session cookies.

    Hashtags: #Evilginx2 #Phishing #2FABypass #Termux



    Top 10 Phishing Tools available on termux, kali 馃懡 --- 1. NexPhisher Description: A multi-functional phishing tool with preloaded templates for platforms like Facebook, Instagram, and Google. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/GITHUB-sys-998/NEXPHISHER.git cd NEXPHISHER bash setup bash nexphisher Usage: Choose a phishing template, generate a link, and monitor login credentials. Hashtags: #NexPhisher #TermuxTools #Phishing #CyberSecurity --- 2. Whale Phish Description: A customizable phishing framework for security testing and credential harvesting. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/devilop-wab/whale-phish.git cd whale-phish chmod +x whale-phish.sh bash whale-phish.sh Usage: Launch the script, select a platform template, and share the phishing link. Hashtags: #WhalePhish #PhishingFramework #TermuxTools #EthicalHacking --- 3. GbyFB Description: A Termux-based phishing tool for Facebook accounts with simple and fast setup. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/Mr-G0b3y/GbyFB.git cd GbyFB chmod +x GbyFB.sh bash GbyFB.sh Usage: Choose Facebook templates, generate links, and capture credentials in real-time. Hashtags: #GbyFB #FacebookHacking #TermuxTools #Phishing --- 4. AdvPhish Description: A powerful advanced phishing tool designed for bypassing 2FA with real-time phishing techniques. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/Ignitetch/AdvPhish.git cd AdvPhish bash setup.sh Usage: Generate a phishing page link and capture credentials while bypassing 2FA. Hashtags: #AdvPhish #2FABypass #CyberSecurity #PhishingTool --- 5. Zphisher Description: An upgraded version of shellphish with enhanced features and multiple phishing templates. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/htr-tech/zphisher.git cd zphisher bash zphisher.sh Usage: Select a platform template, generate a phishing link, and collect data. Hashtags: #Zphisher #EthicalHacking #TermuxTools #SocialEngineering --- 6. HiddenEye Description: A modern phishing tool offering advanced phishing pages for platforms like Netflix, PayPal, and more. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/DarkSecDevelopers/HiddenEye.git cd HiddenEye pip install -r requirements.txt python HiddenEye.py Usage: Choose your target platform and share the generated phishing link. Hashtags: #HiddenEye #AdvancedPhishing #TermuxHacking --- 7. ShellPhish Description: A basic phishing tool for educational purposes with customizable templates. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/thelinuxchoice/shellphish.git cd shellphish bash shellphish.sh Usage: Set up a server, generate links, and capture credentials. Hashtags: #ShellPhish #BasicPhishing #TermuxTools --- 8. Weeman Description: A phishing framework for creating and managing phishing websites. Installation: pkg update && pkg upgrade pkg install python git git clone https://github.com/evait-security/weeman.git cd weeman python weeman.py Usage: Launch the tool, set up a phishing site, and start collecting data. Hashtags: #Weeman #PhishingFramework #CyberSecurityTesting --- 9. BlackEye Description: A simple and effective phishing tool supporting multiple websites. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/thelinuxchoice/blackeye.git cd blackeye bash blackeye.sh Usage: Launch the script, select a template, and start phishing. Hashtags: #BlackEye #PhishingTools #CyberSecurity 10.Evilginx2 Details: Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of two-factor authentication. Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/kgretzky/evilginx2.git cd evilginx2 chmod +x install.sh ./install.sh Usage: After installation, configure the phishing site templates and launch the tool to start capturing credentials and session cookies. Hashtags: #Evilginx2 #Phishing #2FABypass #Termux 馃敼馃敼馃敼馃敼馃敼馃敼馃敼馃敼馃敼馃敼馃敼馃敼
    Gost
    Love
    Bad boy
    Wow
    6
    0 Comments 0 Shares 14K Views
  • Whale Phish


    Whale Phish is a phishing framework designed for testing awareness against phishing attacks. It includes customizable templates and advanced credential harvesting techniques.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/devilop-wab/whale-phish.git
    cd whale-phish
    chmod +x whale-phish.sh
    bash whale-phish.sh

    Usage:
    Launch the script, choose the target platform or create your template, and start phishing campaigns with custom links.


    #WhalePhish #PhishingFramework #EthicalHacking #TermuxTools #CyberAttacks #hack #terminal #git #whale #phishing #phish #fishing #hacker #hacktools #code
    Whale Phish 馃 Whale Phish is a phishing framework designed for testing awareness against phishing attacks. It includes customizable templates and advanced credential harvesting techniques. 馃敻Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/devilop-wab/whale-phish.git cd whale-phish chmod +x whale-phish.sh bash whale-phish.sh 馃敻Usage: Launch the script, choose the target platform or create your template, and start phishing campaigns with custom links. #WhalePhish #PhishingFramework #EthicalHacking #TermuxTools #CyberAttacks #hack #terminal #git #whale #phishing #phish #fishing #hacker #hacktools #code
    GitHub - devilop-wab/whale-phish: An advanced phishing tool for Termux and Linux, you can hide the phshing URL behind the REAL URL
    github.com
    An advanced phishing tool for Termux and Linux, you can hide the phshing URL behind the REAL URL - devilop-wab/whale-phish
    Love
    Gost
    6
    0 Comments 0 Shares 6K Views
  • NexPhisher

    NexPhisher is an advanced phishing tool that supports various social engineering techniques and offers pre-built templates for targeting social media, email, and other online accounts.

    Installation:

    pkg update && pkg upgrade
    pkg install git
    git clone https://github.com/GITHUB-sys-998/NEXPHISHER.git
    cd NEXPHISHER
    bash setup
    bash nexphisher

    Usage:
    After installation, select the desired phishing template from the menu and share the generated link with the target. Monitor credentials in real time.


    #NexPhisher #PhishingTool #SocialEngineering #TermuxHacking #CyberSecurity #termux #india #phishing #hacking #hacker #hack #codufun #github #nex #phisher #kali
    NexPhisher 馃帲 NexPhisher is an advanced phishing tool that supports various social engineering techniques and offers pre-built templates for targeting social media, email, and other online accounts. 馃敻Installation: pkg update && pkg upgrade pkg install git git clone https://github.com/GITHUB-sys-998/NEXPHISHER.git cd NEXPHISHER bash setup bash nexphisher 馃敻Usage: After installation, select the desired phishing template from the menu and share the generated link with the target. Monitor credentials in real time. #NexPhisher #PhishingTool #SocialEngineering #TermuxHacking #CyberSecurity #termux #india #phishing #hacking #hacker #hack #codufun #github #nex #phisher #kali
    Love
    Gost
    3
    0 Comments 0 Shares 6K Views
  • Xerosploit

    Details: Xerosploit is an advanced man-in-the-middle framework for performing network attacks, such as packet manipulation, DOS, and more.

    Installation:

    pkg update && pkg upgrade
    pkg install git python2
    git clone https://github.com/LionSec/xerosploit.git
    cd xerosploit
    python2 install.py

    Usage: Run xerosploit to access the interactive interface and select the desired attack modules.

    Hashtags: #Xerosploit #MITMAttack #NetworkSecurity #Termux #hack #hacker #xero #sploit #github #hacking #termuxtools #codufun #android #mallucoder #new #tool
    Xerosploit 馃敼Details: Xerosploit is an advanced man-in-the-middle framework for performing network attacks, such as packet manipulation, DOS, and more. 馃敼Installation: pkg update && pkg upgrade pkg install git python2 git clone https://github.com/LionSec/xerosploit.git cd xerosploit python2 install.py 馃敼Usage: Run xerosploit to access the interactive interface and select the desired attack modules. Hashtags: #Xerosploit #MITMAttack #NetworkSecurity #Termux #hack #hacker #xero #sploit #github #hacking #termuxtools #codufun #android #mallucoder #new #tool
    GitHub - LionSec/xerosploit: Efficient and advanced man in the middle framework
    github.com
    Efficient and advanced man in the middle framework - LionSec/xerosploit
    Love
    Wow
    3
    0 Comments 0 Shares 5K Views
  • Flipper Zero : Everyday carry UART serial terminal testing ESP module #flipperzero #gpio #advancedhacking #esp
    Flipper Zero馃惉 : Everyday carry UART serial terminal testing ESP module #flipperzero #gpio #advancedhacking #esp
    Love
    Gost
    Wow
    6
    0 Comments 0 Shares 3K Views