Pipe real probe results from your Termux scripts (nmap, tshark, aircrack-ngβ¦) into the same handshake + bounty pipeline as the in-app simulated traffic. Public unauthenticated JSON endpoint β anomalies Ο β₯ 4 auto-mint bounties on the next /bounties refresh.
# nmap β bridge one-liner (Termux)
TARGET=192.168.1.1
nmap -sS -Pn -p 22,80,443 $TARGET -oG - | awk '/Host:/{print $2}' | while read ip; do
curl -s -X POST "$ORIGIN/api/probe" \
-H "Content-Type: application/json" \
-d "{\"tool\":\"nmap\",\"source_node\":\"$(hostname)-wlan0\",\
\"target_node\":\"$ip\",\"protocol\":\"tcp\",\"status\":\"syn\",\
\"packet_size_bytes\":74,\"device_fingerprint\":\"$(getprop ro.serialno)\"}"
doneDownload a ready-to-run setup.sh that pkg installs every recommended package for the currently selected category. Runs inside Termux, no extra prompts.
curl -fsSL "$ORIGIN/api/toolkit/setup.sh" -o setup.sh && bash setup.sh
Git-clones Metasploit, Nuclei, and btlejack into ~/opt and drops thin ~/bin wrappers so each tool resolves on PATH. Includes a Termux:API network check before any clone runs.
curl -fsSL "$ORIGIN/api/toolkit/installer.sh" -o installer.sh && bash installer.sh
Public, unauthenticated endpoint that lets any party β Termux, a bash script, a Python notebook β query the same live network agent the in-app chat uses. Grounded in real network_handshakes + flow data; never invents parties or hashes.
curl -fsSL "$ORIGIN/api/os-bot?q=any+active+threats%3F"JSON mode
curl -fsSL "$ORIGIN/api/os-bot?q=explain+the+latest+packet&format=json"Multi-turn POST
curl -X POST "$ORIGIN/api/os-bot" \
-H 'Content-Type: application/json' \
-d '{"messages":[{"role":"user","content":"what algorithms are running?"}]}'osbot CLI in Termuxcurl -fsSL "$ORIGIN/api/os-bot.sh" -o /tmp/osbot.sh && bash /tmp/osbot.sh install osbot "what's connected to me right now?"
F-Droid
Open-source app store. Required to safely install Termux + add-ons.
Termux
Linux terminal emulator + package manager for Android. The base for everything below.
# inside Termux pkg update && pkg upgrade -y
Termux:API
Bridge to Android sensors: WiFi scan, telephony info, location, clipboard.
pkg install termux-api # then: termux-wifi-scaninfo | jq
Termux:Boot
Run Termux scripts on device boot β useful for long-running probes.
nmap
De-facto network scanner. TCP/UDP discovery, OS fingerprinting, NSE scripts.
pkg install nmap nmap -sV -O 192.168.1.0/24
tcpdump
Packet capture from CLI. Pipe to Wireshark for analysis.
pkg install tcpdump tcpdump -i any -w capture.pcap
tshark (Wireshark CLI)
Wireshark's CLI. Decode 1000+ protocols including 802.11, BLE, LTE NAS.
pkg install tshark tshark -i wlan0 -Y 'wlan.fc.type_subtype==0x08'
Hydra
Parallelized login bruteforcer. Use only on systems you own/have authorization for.
Metasploit (unstable on Termux)
Exploit framework. Heavy install on Termux; consider running in a Linux container.
# multi-step; follow the GitHub README carefully
sqlmap
Automated SQL injection detection + exploitation.
pkg install sqlmap sqlmap -u 'https://target/?id=1' --batch
Nuclei
Template-driven vulnerability scanner. Great for CVE sweeps.
pkg install golang go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
Aircrack-ng
802.11 WEP/WPA capture + crack suite. Needs monitor-mode capable adapter.
pkg install aircrack-ng airmon-ng start wlan0
Kismet
Passive wireless detector / sniffer / IDS. Detects deauth attacks + rogue APs.
pkg install kismet kismet -c wlan0
WiFiAnalyzer (open-source)
Visualize 2.4 / 5 GHz channels, signal strength, and AP density. F-Droid only.
bettercap
MITM + WiFi/BLE/HID swiss-army knife with a web UI.
pkg install bettercap bettercap -iface wlan0
WiGLE WiFi Wardriving
Map and contribute WiFi/BT/cell observations to the WiGLE database.
nRF Connect
Nordic's BLE scanner β GATT browser, advertising decoder, sniffer companion.
BtleJack
BLE 4.x sniffing, jamming, and connection hijacking with a Micro:bit.
pip install btlejack
Bluetooth Scanner (open)
Lightweight classic + BLE device discovery, RSSI logging, vendor lookup.
Ubertooth Tools
Open-source 2.4 GHz BT/BLE sniffing β requires Ubertooth One USB hardware.
SnoopSnitch
Detects IMSI catchers, SS7 attacks, silent SMS. Requires rooted Qualcomm device.
CellMapper
Crowd-sourced LTE/5G cell tower mapping. Useful for triangulating eNB IDs from handshake fingerprints.
NetMonster
Detailed serving + neighbor cell info β eNB/gNB IDs, bands, signal quality.
srsRAN
Open-source 4G/5G RAN stack. Pair with USRP/LimeSDR for full-stack cellular testing.
AIMSICD (community fork)
Heuristic IMSI-catcher / Stingray detector. Project is sporadically maintained.