3 - Introduction (5.93 MB) 4 - What is Termux (13.4 MB) 5 - What is Shell (3.73 MB) 6 - Why Termux (10.28 MB) 7 - Installation (4.07 MB) 8 - what is FDroid (4.79 MB) 9 - Package Management (5.39 MB) 10 - Installing TERMUX from Google Play Store (7.63 MB) 11 - Storage Setup Update and Upgrade Command (15.31 MB) 12 - Why we use apt (15.99 MB) 14 - Remove Package (4.65 MB) 19 - aptshow (4.85 MB) 20 - hidden files versions and CD commands (4.35 MB) 21 - Nano and Cat commands (7.22 MB) 22 - PWD and touch command (7.24 MB) 23 - mkdir command (3.08 MB) 24 - use of cd command (5.44 MB) 25 - use of mv command (12.1 MB) 26 - use of rm command (5.18 MB) 27 - mix use of cp mv and touch command (5.12 MB) 28 - use of uname command (3.12 MB) 29 - use of ifconfig command (4.03 MB) 30 - know your IP address (3.61 MB) 31 - use of Ping command (2.03 MB) 32 - use of chmod command (5.81 MB) 33 - use of cal and proc command (10.35 MB) 34 - use of git clone and wget command (11.01 MB) 36 - What is Penetration Testing (8.61 MB) 38 - What is Metasploit Framework and its History (10.25 MB) 40 - Basic Terminologies Vulnerability (7.53 MB) 41 - Basic Terminologies Exploit (10.7 MB) 42 - Basic Terminologies Payload (9.36 MB) 43 - basic architecture of Metasploit (8.16 MB) 44 - Module in Architecture of Metasploit (9.11 MB) 45 - What is Shell Bind Shell Reverse Shell (8.5 MB) 46 - Initial Steps ways to Prevent these Attacks and Conclusion (11.09 MB) 48 - installation of CPUZ (4.13 MB) 50 - Metasploit Installation (68.69 MB) 54 - alert for Database Server (1.97 MB) 55 - Test the Metasploit Framework and learn what is MSFconsole (13.72 MB) 56 - Help Command and Banner Command (6.35 MB) 57 - Show Command no audio (65.56 MB) 58 - Show Search Info Use commands (100.61 MB) 59 - Metasploit exploit over the LAN explaination (1.7 MB) 61 - complete exploit over the LAN (53.08 MB) 63 - Port Forwarding Demonstration with Data is Turned on along with hotspot failed (34.09 MB) 64 - Hotspot Failure turning OFF again and again (25.15 MB) 65 - Getting confused with the LPORT while we are doing with WIFI (60.79 MB) 66 - learning from our mistakes perfectly working this time with wifi no audio (154.12 MB) 67 - Making our payload PERSISTENT (67.16 MB) 68 - What is encryption and decryption (6.4 MB) 70 - Tool1 (13.19 MB) 72 - Tool2 (14.05 MB) 74 - Tool3 and what is salt explained (20.58 MB) 75 - Tool3 Continued decryption (6.68 MB) 77 - Section Introduction (8.84 MB) 78 - What is Phishing Attack (7.59 MB) 79 - Mirroring Website (28.52 MB) 80 - Installing PHP and starting the Server in localhost with port number (18.88 MB) 81 - Generated the password in localhost (30.51 MB) 82 - Uploading files in webhosting platform (20.93 MB) 83 - Convert your website to an Android APP (21.61 MB) 84 - Know the Tool which attackers use to access the Camera (6.48 MB) 87 - How to perform the attack (40.87 MB) 88 - How to uninstall the Tool (4.93 MB) 89 - 1 what is Tool Name and its Cloning from GitHub (13.26 MB) 90 - 2 changing the TOOL to full executable mode (6.42 MB) 91 - Attempt with Option 1 and its a Success (35.55 MB) 92 - Attempt with Option 2 and its again a Success (28.2 MB) 93 - Crack wifi password with rooted android device (47.79 MB) 94 - Learn how to install Kali Linux in non rooted android device (22.93 MB)