Strategy Over Impulse · Bojack Security
105+ open source security tools for Android
git clone https://github.com/philfesters/Termux-Security-Tools-Collection.git
cd Termux-Security-Tools-Collection
chmod +x scripts/install-all.sh
./scripts/install-all.sh
By using this collection you agree to all of the following:
The author (Fezzy WRLD / Bojack Security) is NOT responsible for any misuse, damage, or legal consequences.
STRATEGY OVER IMPULSE → THINK · PLAN · AUTHORIZE · DOCUMENT · REPORT
termux-setup-storagepkg update && pkg upgrade -ypkg install git python./scripts/install-all.shnmap --versionpkg install proot-distroproot-distro install debianproot-distro login debian#!/bin/bash # FEZZY WRLD — Complete Installer | Strategy Over Impulse echo "🔥 FEZZY WRLD — Termux Security Tools Collection" echo "Bojack K9 Scan Initiated..." pkg update && pkg upgrade -y pkg install -y git python python-pip wget curl nmap masscan \ netcat-openbsd hydra john ncrack crunch gobuster ffuf \ tcpdump tshark ngrep mitmproxy binwalk steghide openssl gnupg ffmpeg mkdir -p ~/tools && cd ~/tools # OSINT & Recon git clone https://github.com/aboul3la/Sublist3r.git git clone https://github.com/laramies/theHarvester.git git clone https://github.com/sherlock-project/sherlock.git git clone https://github.com/s0md3v/Photon.git git clone https://github.com/smicallef/spiderfoot.git # Vulnerability & Web Tools git clone https://github.com/sqlmapproject/sqlmap.git git clone https://github.com/sullo/nikto.git git clone https://github.com/maurosoria/dirsearch.git git clone https://github.com/s0md3v/XSStrike.git git clone https://github.com/commixproject/commix.git git clone https://github.com/s0md3v/Arjun.git git clone https://github.com/epinna/tplmap.git git clone https://github.com/Mebus/cupp.git git clone https://github.com/drwetter/testssl.sh.git # pip tools pip install holehe maigret phoneinfoga wafw00f sslyze \ yt-dlp gallery-dl spotdl androguard frida-tools shodan \ --break-system-packages 2>/dev/null || \ pip install holehe maigret phoneinfoga wafw00f sslyze \ yt-dlp gallery-dl spotdl androguard frida-tools shodan echo "✅ Done! Tools in ~/tools | Strategy Over Impulse"
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| nmap | Network/port scanner | nmap -sV target |
| sublist3r | Subdomain enumeration | python sublist3r.py -d domain |
| amass | Subdomain discovery | amass enum -d domain |
| subfinder | Fast subdomain finder | subfinder -d domain |
| assetfinder | Asset/subdomain discovery | assetfinder --subs-only domain |
| masscan | Fast port scanner | masscan -p1-65535 target |
| theHarvester | Email/domain OSINT | theHarvester -d domain -b google |
| sherlock | Username search (300+ sites) | python sherlock username |
| holehe | Email OSINT | holehe email@example.com |
| maigret | Username OSINT | maigret username |
| phoneinfoga | Phone number OSINT | phoneinfoga scan -n +1234567890 |
| spiderfoot | OSINT automation | python sf.py -l 127.0.0.1:5001 |
| recon-ng | Web recon framework | ./recon-ng |
| photon | Fast web crawler | python photon.py -u domain |
| twint | Twitter/X OSINT | python -m twint -u username |
| instaloader | Instagram OSINT | instaloader profile username |
| whatweb | Web tech detection | whatweb domain |
| gowitness | Website screenshots | gowitness single https://domain |
| gau | URL gathering | gau domain |
| waybackurls | Historical URLs | waybackurls domain |
| hakrawler | URL crawler | echo domain | hakrawler |
| gospider | Spider tool | gospider -s domain |
| aquatone | Domain visualization | cat domains.txt | aquatone |
| shodan-cli | Shodan search | shodan search "apache" |
| maltego | Graph OSINT | APK — maltego.com |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| sqlmap | SQL injection automation | sqlmap -u "domain/page?id=1" --dump |
| nikto | Web server scanner | perl nikto.pl -h domain |
| wpscan | WordPress scanner | wpscan --url domain |
| nuclei | Template-based scanning | nuclei -u domain |
| dirsearch | Directory brute force | python dirsearch.py -u domain |
| gobuster | Dir/file brute force | gobuster dir -u domain -w wordlist |
| ffuf | Web fuzzer | ffuf -u domain/FUZZ -w wordlist |
| commix | Command injection | python commix.py --url domain |
| wafw00f | WAF detection | wafw00f domain |
| testssl | SSL/TLS scanner | ./testssl.sh domain |
| sslyze | SSL scanner | sslyze domain |
| arjun | Parameter discovery | arjun -u domain/page.php |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| metasploit | Exploitation framework | msfconsole (via proot-distro) |
| routersploit | Router exploits | python3 rsf.py |
| beef | Browser exploitation | ./beef |
| crackmapexec | Credential testing | crackmapexec smb target |
| empire | Post-exploitation | ./empire |
| set | Social Engineering Toolkit | python setoolkit |
| sliver | C2 framework | ./sliver-server |
| veil | Payload generator | veil |
| ghost | Android ADB backdoor | pip install ghost |
| sn1per | Automated pentest | ./sniper -t target |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| xsstrike | XSS detection suite | python xsstrike.py -u "domain?q=test" |
| sstimap | SSTI scanner | python sstimap.py -u "domain?name=test" |
| tplmap | Template injection | python tplmap.py -u "domain?name=test" |
| graphqlmap | GraphQL testing | python graphqlmap.py -u domain/graphql |
| kiterunner | API route testing | ./kr scan domain -w routes-large |
| lfisuite | LFI scanner | python lfisuite.py |
| fimap | LFI/RFI scanner | python fimap.py -u "domain?file=test" |
| wfuzz | Web fuzzer | wfuzz -z file,wordlist domain/FUZZ |
| httpx | HTTP probing | httpx -l urls.txt |
| httprobe | Live host detection | cat domains.txt | httprobe |
| smuggler | HTTP smuggling | python smuggler.py -u domain |
| breacher | Admin panel finder | python breacher.py -u domain |
| ssrf-finder | SSRF detection | python ssrf-finder.py -u domain |
| linkfinder | JS endpoint finder | python linkfinder.py -i domain |
| dirbuster | Directory brute force | APK available |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| hydra | Login brute force | hydra -l user -P pass.txt target ssh |
| john | Hash cracker | john --format=raw-md5 hash.txt |
| hashcat | GPU hash cracker | hashcat -m 0 hash.txt wordlist.txt |
| ncrack | Network auth cracker | ncrack -U users.txt -P pass.txt target:22 |
| medusa | Parallel brute forcer | medusa -h target -U users.txt -P pass.txt -M ssh |
| crunch | Wordlist generator | crunch 4 6 abc123 -o wordlist.txt |
| cupp | Profile-based wordlist | python cupp.py -i |
| cewl | Website wordlist spider | cewl -d 2 -w wordlist.txt domain |
| kwprocessor | Keyboard walk generator | ./kwp basechars.txt keymaps.txt routes.txt |
| princeprocessor | Wordlist mutations | ./pp64.bin -o output.txt < wordlist.txt |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| nmap | Network scanner | nmap -sV -O target |
| masscan | Fast port scanner | masscan -p80,443 target/24 |
| zmap | Internet scanner | zmap -p 80 target/24 |
| netcat | TCP/IP swiss army knife | nc -l -p 4444 |
| bettercap | Network attack framework | bettercap |
| ettercap | MITM framework | ettercap -T -M arp:remote /target// |
| hping3 | Packet crafting | hping3 -S -p 80 target |
| traceroute | Route tracing | traceroute target |
| whois | Domain info | whois target.com |
| dig | DNS enumeration | dig target.com ANY +short |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| tcpdump | Packet capture | tcpdump -i wlan0 -w capture.pcap |
| wireshark | GUI traffic analysis | wireshark (Termux:X11) |
| tshark | CLI Wireshark | tshark -i wlan0 |
| ngrep | Network grep | ngrep -d any 'password' |
| mitmproxy | HTTP/HTTPS interceptor | mitmproxy -p 8080 |
| ettercap | ARP spoofing/sniffing | ettercap -G |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| aircrack-ng | WiFi cracking suite | airmon-ng start wlan0 |
| wifite | WiFi auditor | wifite |
| fluxion | WiFi phishing | ./fluxion.sh |
| reaver | WPS attack | reaver -i wlan0mon -b BSSID |
| kismet | WiFi sniffer/IDS | kismet |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| binwalk | Firmware analysis | binwalk firmware.bin |
| foremost | File carving | foremost -i image.dd |
| testdisk | Data recovery | testdisk |
| exiftool | Metadata extraction | exiftool image.jpg |
| steghide | Steganography | steghide extract -sf file.jpg |
| gpg | Encryption/signing | gpg --gen-key |
| openssl | Crypto toolkit | openssl enc -aes-256-cbc -in file |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| androguard | APK analysis | androguard decompile app.apk |
| apktool | APK decompile | apktool d app.apk |
| dex2jar | DEX to JAR | d2j-dex2jar app.dex |
| frida | Dynamic instrumentation | frida -U -l script.js app |
| mobsf | Mobile security framework | python manage.py runserver |
| TOOL | DESCRIPTION | COMMAND |
|---|---|---|
| yt-dlp | YouTube/video downloader | yt-dlp URL |
| gallery-dl | Social media downloader | gallery-dl URL |
| ffmpeg | Media converter | ffmpeg -i input.mp4 output.avi |
| spotdl | Spotify downloader | spotdl "track_url" |
| httrack | Website copier | httrack URL |
| wget | File downloader | wget URL |
| curl | HTTP client | curl -s URL |
| python http.server | Local file sharing | python -m http.server 8000 |
ssh -D 1080 user@target| TASK | COMMAND |
|---|---|
| Scan network | nmap 192.168.1.0/24 |
| Find subdomains | subfinder -d example.com |
| SQL injection | sqlmap -u target.com?id=1 |
| Dir brute force | gobuster dir -u target -w wordlist |
| Brute force SSH | hydra -L users.txt -P pass.txt ssh://target |
| Crack hash | hashcat -m 0 hash.txt wordlist.txt |
| Find username | python sherlock username |
| Capture packets | tcpdump -i wlan0 -w cap.pcap |
| XSS scan | python xsstrike.py -u "target?q=test" |
| Email OSINT | holehe email@example.com |
| Phone OSINT | phoneinfoga scan -n +1234567890 |
| Generate wordlist | cupp -i |
| APK decompile | apktool d app.apk |
| Extract metadata | exiftool image.jpg |
| HTTP file server | python -m http.server 8000 |
#!/bin/bash # FEZZY WRLD — Update all tools echo "🔥 Updating all tools..." cd ~/tools for dir in */; do [ -d "$dir/.git" ] && echo "↻ $dir" && cd "$dir" && git pull --quiet && cd .. done pip install --upgrade yt-dlp gallery-dl holehe maigret wafw00f \ --break-system-packages 2>/dev/null || \ pip install --upgrade yt-dlp gallery-dl holehe maigret wafw00f echo "✅ All tools updated. Strategy Over Impulse."
#!/bin/bash # Usage: ./install-category.sh [osint|web|passwords|network|forensics|utilities] CATEGORY=$1 mkdir -p ~/tools && cd ~/tools case "$CATEGORY" in osint) git clone https://github.com/sherlock-project/sherlock.git git clone https://github.com/aboul3la/Sublist3r.git git clone https://github.com/laramies/theHarvester.git pip install holehe maigret phoneinfoga shodan --break-system-packages ;; web) git clone https://github.com/sqlmapproject/sqlmap.git git clone https://github.com/s0md3v/XSStrike.git git clone https://github.com/maurosoria/dirsearch.git pkg install gobuster ffuf ;; passwords) pkg install hydra john ncrack crunch git clone https://github.com/Mebus/cupp.git ;; network) pkg install nmap masscan netcat-openbsd bettercap mitmproxy ;; forensics) pkg install binwalk steghide openssl gnupg pip install androguard frida-tools --break-system-packages ;; utilities) pkg install ffmpeg wget curl pip install yt-dlp gallery-dl spotdl --break-system-packages ;; *) echo "Usage: $0 [osint|web|passwords|network|forensics|utilities]" ;; esac echo "✅ $CATEGORY tools installed! Strategy Over Impulse."
github.com → New repository → Name: Termux-Security-Tools-Collection → Public → No README → Create
pkg install git
git config --global user.email "your@email.com"
git config --global user.name "philfesters"
mkdir Termux-Security-Tools-Collection
cd Termux-Security-Tools-Collection
git init
Copy all files (README.md, index.html, scripts/, categories/, etc.) into this folder
git add .
git commit -m "FEZZY WRLD: 100+ Termux security tools — Strategy Over Impulse"
git branch -M main
git remote add origin https://github.com/philfesters/Termux-Security-Tools-Collection.git
git push -u origin main
When prompted for password → use your Personal Access Token from github.com/settings/tokens
Repo → Settings → Pages → Source: main → / (root) → Save
Live at: philfesters.github.io/Termux-Security-Tools-Collection
cd Termux-Security-Tools-Collection && git init && git add . && git commit -m "FEZZY WRLD: Termux Security Tools" && git branch -M main && git remote add origin https://github.com/philfesters/Termux-Security-Tools-Collection.git && git push -u origin main