termux
-
Expose Online Accounts by Username: Sherlock on Termux Made Easy
Tags: account recon, digital investigation, install sherlock termux, online accounts, open source intelligence, OSINT, sherlock, termux, user discovery, username searchUncover online accounts fast. Learn how to install, troubleshoot, and run Sherlock on Termux to expose usernames across 300+ platforms.
-
Free Nikto Cheat Sheet
Tags: bug bounty, Cybersecurity, Ethical Hacking, FOSS security, linux security, Nikto, nikto cheat sheet, Open Source Tools, penetration testing, sysadmin tools, termux, web server scanningMaster web vulnerability scanning with our free Nikto Cheat Sheet — a one-page table of essential commands, flags, and examples for ethical hackers, sysadmins, and cybersecurity students.
-
Master Audio Playback in Termux with CVLC – The Ultimate Cheatsheet!
Tags: Command Line Audio, cvlc, CVLC Automation, CVLC Scripting, Linux Audio Player, Open Source Media Player, Play Audio from the Terminal, Terminal Media Player, termux, Termux Audio, Termux cheatsheet, Termux Streaming, VLC, VLC Cheatsheet, VLC Command LineUnlock the power of CVLC in Termux with this ultimate cheat sheet! Learn how to play audio from the terminal, automate playback, and master advanced features.
-
Bridging the Digital Divide in the Philippines with Mobile-First Tech Education
Tags: Digital divide in the Philippines, digital learning, FOSS learning, mobile coding, mobile tech education, mobile-first learning, programming without a laptop, Python on Android, tech education, termuxThe digital divide in the Philippines is widening, limiting access to tech education. Learn how mobile-first learning, Termux, and Python on Android can provide cost-effective solutions for aspiring developers.
-
Python on Android Infographic
Tags: accessibility in tech, app development, coding education, coding for students, digital divide, learn programming, mobile coding, programming on mobile, Python development, Python on Android, termuxDiscover why Python on Android is revolutionizing coding education for students without access to traditional computers. Learn how mobile coding bridges the digital divide and makes programming more accessible worldwide.
-
How Python on Android is Breaking Barriers in Tech Education
Tags: accessibility in tech, coding for students, digital divide, learn programming, mobile coding, Python development, Python on Android, termuxDiscover how Python on Android is making programming more accessible to students worldwide. Learn how mobile coding bridges the digital divide and empowers learners without traditional computers.
-
Using SQLmap for Database Fingerprinting and Enumeration
Tags: Brute Force, database fingerprinting, database vulnerabilities, DBMS enumeration, Ethical Hacking, information gathering, MySQL, penetration testing, PostgreSQL, Security Assessment, SQL Injection, SQLMap, termuxMaster database fingerprinting with SQLmap. Learn how to identify DBMS types and enumerate databases, tables, and data using SQLmap in Termux.
-
Exploit Blind SQL Injection with SQLmap in Termux
Tags: automated exploitation, Blind SQL injection, Brute Force, command examples, data extraction, Ethical Hacking, penetration testing, Security Assessment, SQL Injection, SQL vulnerabilities, SQLMap, termux, threat protection, Web Application SecurityLearn how to exploit blind SQL injection using SQLmap in Termux. This step-by-step guide shows how to identify vulnerabilities, extract data, and secure web applications effectively.
-
SQLmap with Tor: Enhancing Anonymity in SQL Injection Attacks
Tags: anonymous penetration testing, automated SQL attacks, Brute Force, Cybersecurity, Ethical Hacking, network security, penetration testing tools, privacy in hacking, responsible use, SQL Injection, SQLMap, termux, ToR, traffic routingLearn how to enhance anonymity during SQL injection attacks by using SQLmap with Tor. This guide walks you through configuring both tools for secure and private pen tests.