Introduction
•Introduction to Termux
•Installing Termux Application on Android Phone
•Hacker Keyboard Installation
•Top Commands
•Miscellaneous
•Sending SMS
•Make Call
•Creating Storage
•Programming
•C Programming
•c ++ Programming
•Python Programming
•Metasploit
•Installation Metasploit Framework
•Android Phone Hacking
•Accessing the Files and Contacts of Android Phone
•Hacking Windows
•AUXILIRY MODULES METASPLOIT
•Http enum_wayback auxiliary scanner
•Endpoint_mapper – Scanner DCERPC Auxiliary Modules
•Autopwn – auxiliary scanner
•Email harvesting Using Metasploit
•SSH version Scanner
•FTP Version Scanning
•Heartbleed Vulnerability(openssl scanner)
•Nmap
•Checking the status of target Mach
•Miscellaneous Hacking
•DDOS Attack
••SQL mapping
Finding Location
•Introduction to Termux
•Installing Termux Application on Android Phone
•Hacker Keyboard Installation
•Top Commands
•Miscellaneous
•Sending SMS
•Make Call
•Creating Storage
•Programming
•C Programming
•c ++ Programming
•Python Programming
•Metasploit
•Installation Metasploit Framework
•Android Phone Hacking
•Accessing the Files and Contacts of Android Phone
•Hacking Windows
•AUXILIRY MODULES METASPLOIT
•Http enum_wayback auxiliary scanner
•Endpoint_mapper – Scanner DCERPC Auxiliary Modules
•Autopwn – auxiliary scanner
•Email harvesting Using Metasploit
•SSH version Scanner
•FTP Version Scanning
•Heartbleed Vulnerability(openssl scanner)
•Nmap
•Checking the status of target Mach
•Miscellaneous Hacking
•DDOS Attack
••SQL mapping
Finding Location