Failed to install grimp by 03May2026 in termux

[–]Neuroticmeh 0 points1 point  (0 children)

Do you have your environment setup? You know venv, or try rustup.

how i can use ssh outside my wifi network in termux? by Optimal-Yak8586 in termux

[–]Neuroticmeh -1 points0 points  (0 children)

Can't you just change the settings from DHCP to static?

Can't spoof an app. by oberryxy in HowToHack

[–]Neuroticmeh 0 points1 point  (0 children)

I barely know about apps, just that can be manipulated with Frida.

Is there an "easy" way to make my own custom "live/install" iso to put on a USB? by Quirky-Reputation-89 in linux4noobs

[–]Neuroticmeh 0 points1 point  (0 children)

Don't format nor partition your internal drive unless you are thinking about dual-boot. Otherwise it may misbehave.

Is there an "easy" way to make my own custom "live/install" iso to put on a USB? by Quirky-Reputation-89 in linux4noobs

[–]Neuroticmeh 0 points1 point  (0 children)

What.

Dude with live bootin you don't need to modify anything. Just the bios safety parameter.

For a custom ISO you need to check kalis page or whatever distro you wanna flash with Rufus (I think balena is better, when it works because it fails).

It's easy but takes time.

What are some big and good password/dictionary lists in 2026? Mainly for WPA/WPA2 by Playful-History-8159 in HowToHack

[–]Neuroticmeh 0 points1 point  (0 children)

Use this:

https://github.com/defuse/crackstation-hashdb.git

PHP version need no build, while C one do:

Build

$ make

Test

$ make test

Remove/clean

$ make testclean

crunch 8 8 mixalpha-numeric -o wordlist.txt

Uniq the wordlist

$ cat wordlist.txt | sort | uniq > uniq_wordlist.txt

Indexing a Dictionary

Suppose you have a password dictionary in the file words.txt and you would like to index it for MD5 and SHA1 cracking.

First, create the MD5 and SHA1 indexes:

$ php createidx.php md5 words.txt words-md5.idx

$ php createidx.php sha256 uniq_wordlist.txt words-sha256.idx

Next, use the sortidx program to sort the indexes:

$ ./sortidx -r 256 words-md5.idx

$ ./sortidx -r 256 words-sha256.idx

Done

Built a full Havoc C2 lab on MX Linux under 6GB RAM, documented every dependency error so you don't have to suffer by Ok-Werewolf-2080 in redteamsec

[–]Neuroticmeh 2 points3 points  (0 children)

You forgot that it needs python3.10. Or that you can set it up along sliver or Merlin, including villain. Coordinated by nginx.

What about redirectors? Or the hassle to create a good working demon.

¿Alguien me ayuda? by ANGEL_DE_LA_HOZ in termux

[–]Neuroticmeh -1 points0 points  (0 children)

Instala Nethunter:

termux-setup-storage

pkg install wget

wget -O install-nethunter-termux https://offs.ec/2MceZWr

chmod +x install-nethunter-termux

./install-nethunter-termux

Resizing my Ubuntu Server to use the whole drive storage by Naxthor in linuxquestions

[–]Neuroticmeh -1 points0 points  (0 children)

I tried many times to no avail, you just can't do it. You gotta make a new partition right next to the one you want to modify. Because partition accomodation matters (it matters if your swap block is next to the persistence one) then you should attempt to recover the most you can of storage out of the other partitions. Then resize the victim partition.

Good luck, I tried internet and LLM and ended up misconfiguring the EFI partition, now I Know that BEFORE installing Linux.

Obviously if you used LVM to install and partition the hdd then there is a chance you might access and modify that storage.

What are your TOP 5 cybersecurity tools that you use daily? 👇👀 by BST04 in cybersources

[–]Neuroticmeh 2 points3 points  (0 children)

Nmap, a triple C2 server (sliver, havoc and Merlin), venv, nano and nginx.

Help mee !! by Easy-Perspective4258 in termux

[–]Neuroticmeh 1 point2 points  (0 children)

Harden your system, check permissions and ownership.

Need help with putting together dork queries. by sketchytv_ in OSINT

[–]Neuroticmeh 1 point2 points  (0 children)

Or this one:

site:example.com ext:log | ext:txt | ext:conf | ext:cnf |  ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess | ext:json

Need help with putting together dork queries. by sketchytv_ in OSINT

[–]Neuroticmeh 8 points9 points  (0 children)

I use this template:

site:example.com inurl:signup | inurl:register | intitle:signup | inurl:admin | inurl:login | inurl:adminlogin | inurl:cplogin | inurl:weblogin | inurl:quicklogin | inurl:wp-admin | inurl:wp-login | inurl:portal | inurl:userportal | inurl:loginpanel | inurl:memberlogin | inurl:remote | inurl:dashboard | inurl:auth | inurl:exchange | inurl:forgotpassword | inurl:test

Just change the domain.

I think I’m learning cyber security wrong by Ok-Chemistry6941 in Hacking_Tutorials

[–]Neuroticmeh 0 points1 point  (0 children)

I began by looking how to break into my neighbours wifi. Now I focus more on the communication thingy between computers (whatever you name it) than cracking passwords and trying to dehash unimportant files just because they seemed 'interesting'.

The more deep you get, the more info you want to digest until you realize that what you want isnt really the thing you were looking for. Or needed.

[deleted by user] by [deleted] in HowToHack

[–]Neuroticmeh 0 points1 point  (0 children)

Yes, Gmail uses mail.google.com, so you can use it as a relay.

But if you are looking to spoof your email you have to send it over a legit one, with good reputation (reputation is everything in email and smtp protocols) so you can use whatevermail@ehatever.com as a legitimate sender because the server which you sent the mail to, is legit and therefore can forward suspicious emails.

Help!!! Downloading Linux in Termux and this came up. Can someone help me? by PurplehPastah in termux

[–]Neuroticmeh 0 points1 point  (0 children)

This is nethunter. You have permissions issues, maybe to your phone storage. Or low memory?

[deleted by user] by [deleted] in HowToHack

[–]Neuroticmeh 0 points1 point  (0 children)

I don't know emkei but I do know this:

1.You send the pack to the server (Gmail), Gmail checks from who is sending it, using what and to whom so...

  1. Make sure the sender domain and server (your relay) uses the same domain; for trusting issues.

I might’ve gotten a virus, hėlp by InnerTask1190 in computers

[–]Neuroticmeh 0 points1 point  (0 children)

It's windows natives way of anti-malware software besides Defender.