INSTALL XAttacker in TERMUX (NO ROOT)

 ========================

WHAT I'M ABOUT TO SHARE WITH YOU IS FOR EDUCATIONAL PURPOSES ONLY!!!I WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL ACTIONS YOU'LL DO!!

========================


========================

USAGE OF THIS TOOL TO ATTACK TARGETS WITHOUT PRIOR MUTUAL CONSENT IS ILLEGAL. IT'S THE END USER'S RESPONSIBILITY TO OBEY ALL APPLICABLE LOCAL, STATE AND FEDERAL LAWS. I ASSUME NO LIABILITY AND I WILL NOT BE RESPONSIBLE FOR ANY MISUSE OR HARM CAUSED BY THIS TOOL/PROGRAM.

=========================

THIS IS NEITHER MY TOOL NOR MY PROGRAM. BLACK HAT HACKING IS ILLEGAL. REMEMBER THE CONSEQUENCES AND TRY BLACK HAT HACKING AT YOUR OWN RISK.

========================

XAttacker is used to check the security by finding the vulnerability in your website or you can use this tool to Get Shells | Sends | Deface | cPanels | Databases


1. $ apt update

2. $ apt upgrade

3. $ pkg install perl

4. $ git clone https://github.com/Moham3dRiahi/XAttacker


Usage:

1. $ cd XAttacker

2. $ perl XAttacker.pl


========================

Enjoy! Follow us for more...

No comments:

Post a Comment

How to make Hash objects with $H() function in JavaScript.mp4

 In JavaScript, you can create hash-like objects using the $H() function, which is commonly associated with the Prototype.js framework. How...