Requests For Packaging issueshttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues2024-03-01T16:52:20Zhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/17Hannah2024-03-01T16:52:20Zhannahhslaughter834@gmail.comHannahhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/16Add NHLauncher2023-12-08T19:07:03Zcr4shAdd NHLauncherSource: https://github.com/cr4sh-me/NHLauncherSource: https://github.com/cr4sh-me/NHLauncherhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/15[DRAFT] Add NFCGate2023-12-07T15:46:52Zyesimxev[DRAFT] Add NFCGate* [x] The app complies with the [inclusion citeria](https://store.nethunter.com/en/docs/Inclusion_Policy/).
* [x] The app is not already [listed](https://gitlab.com/search?scope=issues&group_id=5069527) in the repo or issue tracker.
* [x...* [x] The app complies with the [inclusion citeria](https://store.nethunter.com/en/docs/Inclusion_Policy/).
* [x] The app is not already [listed](https://gitlab.com/search?scope=issues&group_id=5069527) in the repo or issue tracker.
* [x] The app has not already [been requested](https://gitlab.com/search?scope=issues&project_id=5069527)
* [ ] The original app author has been notified, and supports the inclusion.
---------------------
The first step is to find the app's
[_Application ID_](https://developer.android.com/studio/build/application-id.html).
This is usually the same as the app's _Package Name_. You will find it
in files called _AndroidManifest.xml_ or _build.gradle_ most of the
time. You can also see it in the URLs for the app's page in various
app stores. Write it here:
#### APPLICATION ID:
Below is a template "metadata file" to fill out, it has only the
required fields. The NetHunter Store uses this file to build and publish the app.
[Build Metadata Reference](https://f-droid.org/docs/Build_Metadata_Reference)
documents all available options. Add values after the colon
```yaml
Name:
# Categories (one per line, each starting with a space and a minus), chosen from the
# official list: https://gitlab.com/kalilinux/nethunter/store/nethunter-storedata/blob/master/stats/categories.txt
Categories:
# the one license that the whole app is available under, use
# https://spdx.org/licenses/ short identifiers.
License:
# A URL for the project's website
WebSite: https://www.seemoo.tu-darmstadt.de/
# A link to the issue tracker where bugs are reported
IssueTracker:
# One sentence, no more than 30-50 chars, no trailing punctuation,
# focus on actions what the users does with the app, e.g. "Read and
# send emails" instead of "Email client".
Summary:
Description: NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer protocols or assess the security of protocols against traffic modifications.
# git, git-svn, svn, hg or bzr
RepoType: git
# source code repo URL (HTTPS required)
Repo: https://github.com/nfcgate/nfcgate
```Kali 2024.1yesimxevyesimxevhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/12Add Simple Protocol Player2023-12-08T19:07:05ZyesimxevAdd Simple Protocol Player```yaml
Name: Simple Protocol Player
# Categories (one per line, each starting with a space and a minus), chosen from the
# official list: https://gitlab.com/kalilinux/nethunter/store/nethunter-storedata/blob/master/stats/categories.txt...```yaml
Name: Simple Protocol Player
# Categories (one per line, each starting with a space and a minus), chosen from the
# official list: https://gitlab.com/kalilinux/nethunter/store/nethunter-storedata/blob/master/stats/categories.txt
Categories: Utilities
# the one license that the whole app is available under, use
# https://spdx.org/licenses/ short identifiers.
License: Apache-2.0
# A URL for the project's website
WebSite: https://kaytat.com
# A link to the issue tracker where bugs are reported
IssueTracker: https://github.com/kaytat/SimpleProtocolPlayer/issues
# One sentence, no more than 30-50 chars, no trailing punctuation,
# focus on actions what the users does with the app, e.g. "Read and
# send emails" instead of "Email client".
Summary: Stream Audio to KeX
Description: Playback the audio streamed by PulseAudio's simple protocol module.
# git, git-svn, svn, hg or bzr
RepoType: git
# source code repo URL (HTTPS required)
Repo: https://github.com/kaytat/SimpleProtocolPlayer
```Kali 2024.1Re4sonyesimxevRe4sonhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/11Add Stryker2023-12-08T19:07:09ZyesimxevAdd Stryker```yaml
Name: Stryker
# Categories (one per line, each starting with a space and a minus), chosen from the
# official list: https://gitlab.com/kalilinux/nethunter/store/nethunter-storedata/blob/master/stats/categories.txt
Categories:
-...```yaml
Name: Stryker
# Categories (one per line, each starting with a space and a minus), chosen from the
# official list: https://gitlab.com/kalilinux/nethunter/store/nethunter-storedata/blob/master/stats/categories.txt
Categories:
-Exploitation
-Wifi
-Sniffing & Spoofing
# the one license that the whole app is available under, use
# https://spdx.org/licenses/ short identifiers.
License:
# A URL for the project's website
WebSite: https://strykerdefence.com/
# A link to the issue tracker where bugs are reported
IssueTracker: https://github.com/stryker-project/app/issues
# One sentence, no more than 30-50 chars, no trailing punctuation,
# focus on actions what the users does with the app, e.g. "Read and
# send emails" instead of "Email client".
Summary: Stryker is a new generation mobile pentest application
Description: Test your networks and devices for common vulnerabilities without special skills and knowledge.
# git, git-svn, svn, hg or bzr
RepoType: git
# source code repo URL (HTTPS required)
Repo: https://github.com/stryker-project/app
```https://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/8Nexmon crashes on LineageOS 18.1 (Android 11) Official2023-12-09T07:10:55ZLava GitNexmon crashes on LineageOS 18.1 (Android 11) OfficialHello. I am in the process of trying to get Nethunter fully working on the Galaxy Note III (N9005), on Android 11. I'm having a few issues.
The Nexmon app crashes when I click the button `Grant root, permission & check installation`. I'...Hello. I am in the process of trying to get Nethunter fully working on the Galaxy Note III (N9005), on Android 11. I'm having a few issues.
The Nexmon app crashes when I click the button `Grant root, permission & check installation`. I'm using Magisk and the app has been granted superuser permission. I can however, open the apps side menu and click `Tools`. I cannot install any of the tools however, as the app just fails with `ERROR: Can't install to /system/bin/nexutil`. The same issue persists even when changing installation directory.https://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/6Add WPSApp2023-12-08T19:07:26ZyesimxevAdd WPSApp[WPSApp_v1.6.54.apk](/uploads/de9910cbb342aa8ba6176948cf38f93c/WPSApp_v1.6.54.apk)[WPSApp_v1.6.54.apk](/uploads/de9910cbb342aa8ba6176948cf38f93c/WPSApp_v1.6.54.apk)Re4sonyesimxevRe4sonhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/5Add MFC tool2023-12-08T19:04:26ZyesimxevAdd MFC tool[MifareClassicTool-4.0.2.apk](/uploads/55af048922556c404015f18b13b280de/MifareClassicTool-4.0.2.apk)
Source: https://github.com/ikarus23/MifareClassicTool[MifareClassicTool-4.0.2.apk](/uploads/55af048922556c404015f18b13b280de/MifareClassicTool-4.0.2.apk)
Source: https://github.com/ikarus23/MifareClassicToolRe4sonyesimxevRe4sonhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/4Add HushSMS2023-12-08T19:04:23ZyesimxevAdd HushSMS[HushSMS.apk](/uploads/1dce909825fa8f94e3de8af489c29cf3/HushSMS.apk)[HushSMS.apk](/uploads/1dce909825fa8f94e3de8af489c29cf3/HushSMS.apk)Re4sonyesimxevRe4sonhttps://gitlab.com/kalilinux/nethunter/store/rfp/-/issues/1Intercepter-NG updated to 2.62023-12-08T21:33:21Zintercepter-ngIntercepter-NG updated to 2.6Please update it in F-Droid.
General description:
Intercepter-NG is a multifunctional network toolkit for various types of IT specialists.
The main purpose is to recover *interesting* data from the network stream and perform different ...Please update it in F-Droid.
General description:
Intercepter-NG is a multifunctional network toolkit for various types of IT specialists.
The main purpose is to recover *interesting* data from the network stream and perform different kinds of MiTM attacks.
It offers the following features:
+ Sniffing passwords\hashes of the types:
ICQ\IRC\AIM\FTP\IMAP\POP3\SMTP\LDAP\BNC\SOCKS\HTTP\WWW\NNTP\CVS\
TELNET\MRA\DC++\VNC\MYSQL\ORACLE\NTLM\KRB5\RADIUS
+ Sniffing chat messages of: ICQ\AIM\JABBER\YAHOO\MSN\IRC\MRA
+ Smart Scanning with OS\Device detection using tcp fingerprints
+ Security Scanner X-Scan
+ ARP Poisoning \ SSLStrip with HSTS Spoofing \ DNS Spoofing \ Forced Download \ HTTP Injections
+ ARP Watch \ ARP Cage
+ Capturing packets and post-capture (offline) analyzing
Works on Android from 4.4 up to 10+ (x86, ARM, ARMv8) with Magisk (best choice) or other SU managers.
Changelog for new version 2.6:
+ Automatical Save&Restore of routing rules and iptables
+ Preloaded results of the last scan + prescan on startup
+ Text resize by gestures, tab switch by swipes, vibro reactions
+ OS Fingerprinting system based on Satori format
+ Port Scan upgraded to X-Scan with EternalBlue checker
+ Scanning engine is greatly improved
+ HSTS Spoofing with improved sslstrip
+ Self-diagnosis for troubleshooting
+ LOTS of other fixes and improvements
Contacts:
Site: sniff.su
Mirror: https://github.com/intercepter-ng/intercepter-ng.github.io
Mail: intercepter.mail@gmail.com
Twitter: twitter.com/IntercepterNG
Blog: intercepter-ng.blogspot.ru
Forum: intercepterng.boards.net
and fresh screenshots...
![1](/uploads/5fc9f8fcfd0aca822a07ceb8d1cad0e4/1.jpg)
![2](/uploads/570c0ffab316e06b1bd0c255f1a06477/2.jpg)
![3](/uploads/4a9403af59cf11408cac42723bd3e496/3.jpg)
![4](/uploads/4dd48f8820a6a72e1f6aef4728581fea/4.jpg)
![5](/uploads/ec98b231c80e16e4343afb9b3718cbe9/5.jpg)
![6](/uploads/071682360dfd0f1a4b814f5bec19653c/6.jpg)PaulSecRe4sonPaulSec