Skip to main content

♒Virus database in termux♒

Hey all here. Introducing the new virus DB TheZoo. This is a project created to make malware analysis open and available to the public.


🔻 Installation

 Updating packages:

 apt update -y

 apt upgrade -y


 Install git and python:

 apt install git

 apt install python


 Download the tool itself:

 git clone https://github.com/ytisf/theZoo


 Open the folder with the utility:

 cd theZoo


Launch


 Run the utility with the command:

 python theZoo.py


 Next, we select the base from which we will take the virus, for example, botnets:

 search botnet


 And download our malware virus:

 use serial number of the virus in the database


 Then just enter get and get the directory.  Each directory consists of 4 files:


 - Malware files in an encrypted ZIP archive.

 - SHA256 amount of 1st file.

 - MD5 sum of the 1st file.

 - File of passwords for the archive.

Comments

Popular posts from this blog

Pin-Bruteforce

 Hello all !! Now turn your Kali Nethunter into a bruteforce pin cracker . Here's all your methods ! Simply the method is:-) Git clone   https://github.com/urbanadventurer/Android-PIN-Bruteforce.git Ls Cd Pndroid-Pin-Bruteforce bash ./android-pin-bruteforce ./android-pin-bruteforce crack --length 3 ./android-pin-bruteforce crack --length 6 How it works It uses a USB OTG cable to connect the locked phone to the Nethunter device. It emulates a keyboard, automatically tries PINs, and waits after trying too many wrong guesses. [Nethunter phone] <–> [USB cable] <–> [USB OTG adaptor] <–> [Locked Android phone] The USB HID Gadget driver provides emulation of USB Human Interface Devices (HID). This enables an Android Nethunter device to emulate keyboard input to the locked phone. It’s just like plugging a keyboard into the locked phone and pressing keys. This takes just over 16.6 hours with a Samsung S5 to try all possible 4 digit PINs, but with the optimised PIN list it

Acessing webcam(Phishing)

  Web-Cam Cam-phish is techniques to take cam shots of target’s phone or pc. It is a phishing tool which hosts fake websites on in built PHP server and uses ngrok server to generate a link which we will forward to the target, which can be used on over internet. Website asks for camera permission and if target allows it, this tool grab cam shots of target’s device. Requirements:- apt -get -y install php openssh git wget Installation :- git clone https://github.com/techchipnet/CamPhish cd CamPhish bash camphish.sh Cam-Phish is created to help in penetration testing and it's not responsible for any misuse or illegal purposes. Cam-Phish is inspired by  https://github.com/thelinuxchoice/  Big thanks !!!

How to Record Whatsapp calls.

  H owever, different third-party apps can be used to record WhatsApp voice calls.   However, what it does not allow is to record voice calls.  Here, we will tell you the best possible way to record WhatsApp voice calls on your Android and iOS device. WhatsApp doesn't have an option to record voice calls Users can only record voice calls using a third-party app.  How to record WhatsApp voice calls on Android Application Call Recorder: Cube ACR allows you to seamlessly record voice calls over WhatsApp.  Here’s how you can record WhatsApp calls in simple steps.  WhatsApp is becoming a one-stop for all the messaging needs, be it sharing files or having group chats or video calls.  WhatsApp is one of the most popular and downloaded applications not just for messaging but for video and voice calling.  So let’s get started. Open Google Play Store and search the Cube Call application. Once installed open the Cube Call application and then switch to WhatsApp. On WhatsApp, you will see