04-13-2021, 12:31 AM
-Introduction
-Introduction to Termux
-Installing Termux Application on Android Phone
-Hacker Keyboard Installation
-Top Commands
-Miscellaneous
-Sending SMS
-Make Call
-Creating Storage
-Programming
+C Programming
-c ++ Programming
Python Programming
-Metasploit
-Installation Metasploit Framework
-Android Phone Hacking
-Accessing the Files and Contacts of Android Phone
-Hacking Windows
-AUXILIRY MODULES METASPLOIT
-Http enum_wayback auxiliary scanner
-Endpoint_mapper – Scanner DCERPC Auxiliary Modules
-Autopwn – auxiliary scanner
-Email harvesting Using Metasploit
-SSH version Scanner
-FTP Version Scanning
-Heartbleed Vulnerability(openssl scanner)
-Nmap
-Checking the status of target Machine
-Checking the ports of target Machines
-Miscellaneous Hacking
-DDOS Attack
-SQL mapping
-Finding Location
-Web Scanning
-Phishing Attack
-Brute Force Attack
-Installation SEtoolkit
-Introduction to Termux
-Installing Termux Application on Android Phone
-Hacker Keyboard Installation
-Top Commands
-Miscellaneous
-Sending SMS
-Make Call
-Creating Storage
-Programming
+C Programming
-c ++ Programming
Python Programming
-Metasploit
-Installation Metasploit Framework
-Android Phone Hacking
-Accessing the Files and Contacts of Android Phone
-Hacking Windows
-AUXILIRY MODULES METASPLOIT
-Http enum_wayback auxiliary scanner
-Endpoint_mapper – Scanner DCERPC Auxiliary Modules
-Autopwn – auxiliary scanner
-Email harvesting Using Metasploit
-SSH version Scanner
-FTP Version Scanning
-Heartbleed Vulnerability(openssl scanner)
-Nmap
-Checking the status of target Machine
-Checking the ports of target Machines
-Miscellaneous Hacking
-DDOS Attack
-SQL mapping
-Finding Location
-Web Scanning
-Phishing Attack
-Brute Force Attack
-Installation SEtoolkit