This app is built and signed by Kali NetHunter. Uninstall Kali Nethunter Magisk module (Reboot) ly/3n4JMWo Install Kali. Requires root, nethunter chroot and nethunter kernel La version pour Android de Kali Linux appele NetHunter permet dexcuter. * Searchsploit - Easy searching for exploits in the Exploit-DB. * Metasploit Payload Generator - Generating Metasploit payloads on the fly. * NMap Scan - Quick Nmap scanner interface. The developers behind the ROM made it so it would work on Google’s older Nexus smartphones. * MITM Framework - Inject binary backdoors into downloaded executables on the fly. OctoKali NetHunter is a popular open-source Android ROM penetration testing platform. This is a collection of programs and utilities from Kali that can be run on Android. The one that develops the Kali Linux distribution. * MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button. Kali Linux NetHunter is an Offensive Security project. * DuckHunter HID - Rubber Ducky style HID attacks * HID Attacks - Various HID attacks, Teensy style. * KeX Manager - Set up an instant KeX session with your Kali chroot. * MAC Changer - Change your Wi-Fi MAC address (only on certain devices) * Custom Commands - Add your own custom commands and functions to the launcher. * Kali Services - Start / stop various chrooted services. * Check App Update - For checking Kali NetHunter Android App updates. * Kali Chroot Manager - For managing chroot metapackage installations. * Home Screen - General information panel, network interfaces and HID device status. NetHunter is an open-source project developed by Offensive Security and the community. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member 'BinkyBear' and. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |