Introduction
  • Introduction
  • Disclaimer
Termux Basic Operations
  • Things You will Learn
  • Termux Introduction and Installation
  • Termux Storage Setup
  • Ubuntu ROOT Terminal Installation
  • Ubuntu ROOT Terminal Installation - Proof
  • Installing Advanced Hacking Tools
  • Steganography-How to Hide Data Behind Any Image
  • Steganography-How The Data is Extracted at Destination Side
Network Scanning
  • Things You will Learn
  • Installing Nmap on Android
  • Finding Live or UP Hosts in Network
  • Listing Open Ports On a Target Host
  • Generating a Scan Report
Denial of Service (DoS) attacks Demonstrated and explained
  • Things You will Learn
  • Performing DOS Attack with Termux
  • Performing DOS Attack without Termux
Exploitation
  • Things You will Learn
  • Introduction and Installing Metasploit Framework on Termux
  • Extract Email Address of Domain using Metasploit
  • Hack Windows Machine By Creating a Backdoor-Msfvenom Payload With Netcat
  • Hacking windows Machine with Metasploit
  • Hack Linux Systems by Generating a more Advanced Backdoor
  • Hacking an Android Device with MSFvenom
  • Capturing keystrokes with Metasploit
  • Meterpreter Basic Commands
  • Generate Payloads and Control Remote Machines
  • Continuing -Generate Payloads and Control Remote Machines
  • Get Every Single Saved Password From Victim Machine
Social Engineering Attacks
  • Things You will Learn
  • Performing a Phishing Attack to steal Victim credentials
  • Creating a KEYLOGGER On Android
Using The Above Attacks Outside The Local Network
  • Things You will Learn
  • Ngrok Installation,Configuration and Port Forwarding
  • Hack Any Windows Machine Outside LAN
  • Remotely Hack Any Android Device with Metasploit- Hack Over WAN
  • Phishing Attack outside LAN Using Ngrok
  • Phishing Attack Over Wan without Termux
  • Creating Your Own Phishing App(Application)
How to Be Safe From Above Attacks
  • How to Detect Spoof Emails
  • How To Detect Trojans
  • How to Detect Phishing Page