Posts

Showing posts from August, 2021

Andrax - Advanced pentesting Platform...

Image
ANDRAX  is a  Penetration Testing  platform developed specifically for  Android  smartphones, it has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution! The development of the tool began on 08/09/2016 (DD/MM/YYYY) only for people in Brazil ANDRAX has been fully redefined and reloaded on 05/10/2018 (DD/MM/YYYY) open to the international public. It enable to all Android device with root access enabled and a good unlocked rom become a weapon for advanced Penetration Testing.  Simple, everyone has a smartphone and spends all the time with it! We have the possibility to camouflage easily in the middle of everyone, the processor architecture of most Android smartphones is ARM a modern and robust architecture extremely superior to the rest, With touch screens we can run the tools with great agility and take advantage of the graphical interface of Android, we can get in almost anywhere with our smartphones. In tec

Termux - Android Linux Environment

Image
 What is Termux ? Termux is an Android terminal emulator and Linux environment application that works directly with no rooting or setup required. A minimal base system is installed automatically, additional packages are available using the package manager. You can obtain Termux builds from F-Droid. Do not install it from Google Play. Bcoz, their gogle play support of termux iis stopped, so that you cannot install needed packages from termux which is installed from google play. So, make sure to instal the termux from F-Droid. System requirements: Android 7.0 - 11.0 CPU: AArch64, ARM, i686, x86_64. At least 200 MB of disk space. Please note that Termux does not support ARM devices without NEON SIMD, for example on devices based on Nvidia Tegra 2 CPUs. On various Internet resources, Termux is recognized as utility extremelly helpful for variety of purposes like hacking, phishing and information gathering. This is possible due to availability of famous pentesting software like  Metasploit