/avatar.png

HackingPassion.com

Hacking is not a hobby but a way of life ♥

Android Hacking with Termux

Embark on a journey into Android hacking with Termux, an indispensable app for enthusiasts and professionals alike. My long-term experience with Termux has shown me the incredible capabilities it offers, both with and without root access.


While the vast potential of Termux is too extensive to capture in a single article, this guide aims to provide a comprehensive starting point for your exploration.


As a powerful terminal emulator, Termux brings a full-fledged Linux environment to your Android device. It comes equipped with a minimal base system, and the flexibility to add more packages using apt and dpkg, akin to systems like Debian or Ubuntu.

Best Linux Commands Hacks and Other Cool Tricks for Beginners

In this article, I will try to cover the most useful Linux commands that every hacker, pentester, and expert in cybersecurity must know !!

 


HACKERS LOVE THE TERMINAL
You are a hacker

Your home is the terminal. You work on several projects at once, You know every keystroke is valuable. With just some commands, you can automate tasks, install your favorite software, view a whole network, find vulnerabilities on just about anything connected to the internet, compile a script, create additional user accounts, properly configure anonymity software, and optimize your interactions with terminals. When you search for something, it should be blazing fast. If something is less than 100% efficient, you will spend hours figuring out the right way to save yourself seconds. Every detail matters, and every keystroke tells a story. Are you ready to push the limits of what’s possible?

Google Dorks an Easy Way of Hacking

 

Google Dorks

 

Google Dorks A frequently asked question to me, “Where should I start learning how to hack ?”. And every time, the first thing I want to answer is: “Why don’t you start by using Google ?”. Personally, Google is one of my best friends in Hacking, and I’m sure Google will be yours too after reading this article.

 

All you need to carry out to move further with “Google Dork”, is a computer, an internet connection, and knowledge of the appropriate search syntax. A number of examples are given down below and if you need more, you can visit Github, a large number (10.000) of Google Dork can be found here.

How to Use Nmap Nse Scripts to Find Vulnerabilities

 

Find Vulnerabilities, Nmap has a lot of features and one of them is a built-in script interpreter called NSE Nmap Scripting Engine.

Nmap is one of the most used and best port scanning tools that exist and is the favorite for many people including for me. But Nmap is not only a port scanner, but this tool is also much more and has so many features. In this article, we highlight the Nmap Script Engine (NSE). Nmap has a lot of features, and one of them is a built-in script interpreter called NSE “Nmap Scripting Engine” Nmap stands for “Network Mapper

Shodan Eye Getting Started With Shodan

Shodan Eye collects and returns all information about every device that is directly connected to the internet and according to the keywords you entered.

 

What type of devices can be found with Shodan Eye

The types of devices that are indexed can vary enormously. It can be from small desktops to refrigerators or either nuclear power plants, webcams, water treatment facilities, coffee machines, yachts, medical devices, traffic lights, wind turbines, license plate readers, smart TVs and much more. Actually we can say everything you could possibly imagine that’s plugged into the internet.
Here you can find the latest post-upgrade about Shodan Eye

Cr3dov3r Credential Reuse Attack

Cr3dOv3r This tool checks your credentials on different websites and looks for if your email is in some data leak.


 

Your best friend in credential reuse attacks.

You give Cr3dOv3r an email then it does two simple useful jobs with it:

  • Search for reuse attack public leaks for the email and returns the result with the most useful details about the leak
  • Now you give it a password or a leaked password then it tries these credentials against some well-known websites (ex: Facebook, Twitter, Google…), tells if the login was successful and if there’s captcha somewhere blocking our way!

 

Infernal Twin Infernal Wireless V3 Automated Wireless Hacking

Infernal Twin is an automated wireless hacking suite written in Python which automates many of the repetitive tasks involved in security testing for wifi networks.

Infernal-Twin GitHub: https://github.com/entropy1337/infernal-twin


 

Features added and improved:

  • Added BeeF XSS framework Integration
  • Added HTTP Traffic View within tool
  • Improved Infenral Wireless Attack
  • Visual View of some of the panel improved
  • Improved Basic Authentication during Social engineering assessment over wireless network
  • Infernal-Wireless v2.6

This tool is created to aid the penetration testers in assessing wireless security. The author is not responsible for the misuse. All The Content Are Educational Purpose Only. Don’t Misuse This Tutorial. Hacking is illegal.

Reverse Backdoor for Linux Windows and Mac

A reverse backdoor made in python, I put this on my VirtualBox on Windows. This backdoor can be used on - Linux, Mac, and Windows. I also made a Listener. All types of files. On both of these, I made a download and upload function. So you can download everything from the target computer but also upload and vice versa.

This tool is not public. This was my second video. The date was Sept 13, 2018, when I publish this video on YouTube.

Arp Spoofer Detector for Linux and Windows

ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages on a local area network.

This allows you to perform a MITM “man in the middle” attack.
This puts you as a hacker between the router and the victim.
The risks of MiTM attacks are used to steal sensitive information.

  • Sniffing passwords
  • Espionage
  • Take over your entire computer

This is the first video I made of my work. This tool “Arp Spoofer” is not public. The date was Sep 1, 2018, when I publish this tool on YouTube.