Hacking with Android Using Scripts ⚠⚠

Hello Guys in this post today we are going to learn about some of the termux scripts which are already quite renowned and some that are not quite a bit popular but I found them to be useful enough to be included in this article.

We will be basically discussing some brief knowledge of these scripts and the applications for which they are used. The most important part is that all of these scripts can be used on Android or Kali Linux both. So let's get into it...



Some of the important Shell scripts

1) Amer [Virus4] :-

Amer is a python based simple yet sophesticated shellscript basically used for Nmap, Virus spammer, Facebook/email Database Password Breach and ngrok tool. You can even create Facebook scampages{Phishing} for a victim. It even provides some tools like OSIF dumps, visa extraction, etc. It provides some bruteforce attacks like Cisco Bruteforce, VNC Bruteforce, FTP Bruteforce, Gmail Bruteforce SSH Bruteforce TeamSpeak Bruteforce, Telenet Bruteforce, Yahoo Mail Bruteforce, Hotmail Bruteforce Router Bruteforce, RDP Bruteforce, MySQL Bruteforce.

2) IPGeoLocation :-

IPGeoLocation is a simple python script which helps you to get the IP (Internet Protocol) based location of the victim along with the details of the ISP, Zipcode, ASN and other Coordinate wise details.

3) Metasploit-Framework :-

Metasploit project is a computer security project written in Ruby language that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It helps to find security issues, verify vulnerability mitigations and manage security assessments. It also helps you to create payload files that can be helped to easily exploit and dump information from an Android or an Windows machine.

4) Websploit :-

Websploit is a pen-testing tool which provides with many modules which are namely Web modules, Network modules, Exploit modules and bluetooth/Wireless Modules.

--Network module helps to perform network monitoring, ARP DOS, MITM (Man in the Middle) attack, TCP killer, DNS spoofing, ARP Poisoning, etc.

--Exploit module can be useful for Java Apple net Attack using HTML, Metasploit auto own Service and M etasploit browser auto own service.

--Web module can be used for Scanning Directories of Apache Users, Information Gathering from Victim Web, PHPMyAdmin Login Page Scanner, CloudFare Resolver, etc.

--Wireless/Bluetooth module include tools to perform WiFi jamme, WiFi Dos attack Wireless Honeypot(Fake AP), Mass Deauthentication Attack, and Bluetoth Ping of death Attack.

5) Hammer :-

Hammer is a python based script that is basically used for Bot hammering and performing a DDOS attcak on a website. The Ddos[Distributed Denial Of Service] Attack is strong enough to take down most of the websites. It the the best script for performing a DDOS attack without owning a botnet.

Rutvij Hadap

Tech enthusiast, trying my level best to make people understand today's technology in the easiest and the most appealing way possible.

1 Comments

Share your thoughts down here..

Previous Post Next Post