DarkFly-Tool is an installation tool for installing tools. this tool makes it easy for you. so you don't need to type git clone or look for the github repository. You only have to choose the number. which tool you want to install. there are 530 tools ready for intall. and for those of you who like to have fun. there are 7 SMS spam tools that are ready to use, you just need to choose spam to use the target number. there is a tocopedia DLL,
Termux:
pkg install python2
pkg install git
git clone https://github.com/Ranginang67/DarkFly-Tool
cd DarkFly-Tool
python2 install.py Attribuzione audio NCS (NoCopyrightSounds) https://www.youtube.com/channel/UC_aEa8K-EOJ3D6gOs7HcyNg
...
https://www.youtube.com/watch?v=Jx_nhwA1gMg
https://github.com/wintrmvte/Netenum
Netenum passively monitors the ARP traffic on the network. It extracts basic data about each active host, such as IP address, MAC address and manufacturer. The main objective of this tool is to find active machines without generating too much noise.
Features
Provides basic information about the network, such as ESSID and current signal strength.
Found hosts can be written to a file (next we can use Nmap's -iL hosts_file option to scan detected hosts).
Shows a signature next to the IP address indicating that the host is a local gateway:(G).
...
https://www.youtube.com/watch?v=uXCASLJdaCw
Phantom-Evasion is an antivirus evasion tool written in python (both compatible with python and python3) capable to generate (almost) fully undetectable executable even with the most common x86 msfvenom payload.
...
https://www.youtube.com/watch?v=VzKOXf3Vk8g
https://github.com/BullsEye0/shodan-eye
Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that you enter. Author: Jolanda de Koff
This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview.
The types of devices that are indexed can vary enormously: from small desktops, refrigerators to nuclear power plants and everything in between. You can find everything using "your own" specified keywords. Examples can be found in a file that is attached:
The information obtained with this tool can be applied in many areas, a small example:
Network security, keep an eye on all devices in your company or at home that are confronted with internet.
Vulnerabilities. And so much more.
Is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client.
What is the difference between Google or another search engine: The most fundamental difference is that Shodan Eye crawls on the internet, Google on the World Wide Web. However, the devices that support the World Wide Web are only a small part of what is actually connected to the Internet.
Shodan
For additional data gathering, you can enter a Shodan API key when prompted. A Shodan API key can be found here: https://account.shodan.io/register
Install Shodan Eye on Linux:
git clone https://github.com/BullsEye0/shodan-eye.git
cd shodan-eye
pip install -r requirements.txt
Use:
python shodan-eye
(You will be asked for a Shodan API key)
Have fun ..!!!
All information contained in this site and all software provided by it are intended solely for the purpose of helping users to secure their online privacy from eventual cyberattacks. Such information and software do NOT constitute professional advice/services, are indicative and provided for educational use only. The site does not guarantee their accuracy or completeness. The use of such information and software for any purpose other than the abovementioned is strictly forbidden. The site and/or the site’s owner(s) hold no responsibility for any misuse of the above by third parties and reserve their rights to ban the access of users or take any legal action against users, should any misuse be noticed.
...
https://www.youtube.com/watch?v=ZpwA_vM2rvQ