Caution
Any unlawful usage is strictly prohibited.
A Flutter application consisting of TCP Port Scanner, Route Tracer, Pinger, File Hash Calculator, String Hash Calculator, Base Encoder, Morse Code Translator, Open Graph Protocol Data Extractor, Series URI Crawler, DNS Record Retriever, and WHOIS Retriever.
flowchart LR
Code[Code] --> Linux{Linux}
Linux --> Linux_x64_Executable(x64 Executable)
Linux_x64_Executable --> Linux_x64_AppImage(x64 AppImage)
Code --> Android{Android}
Android --> |Signing| Android_appbundle(appbundle)
Android --> |Signing| Android_ARMEABI_V7A_APK(ARMEABI-V7A APK)
Android --> |Signing| Android_ARM64_V8A_APK(ARM64-V8A APK)
Android --> |Signing| Android_x86_64_APK(x86_64 APK)
Code --> macOS{macOS}
macOS --> macOS_Executable(Executable)
Code --> iOS{iOS}
iOS --> |Not Signing Yet| iOS_Executable(Executable)
Code --> Windows{Windows}
Windows --> Windows_x64_Executable(x64 Executable)
Windows_x64_Executable --> |Signing| Windows_x64_MSIX_Package(MSIX Package)
Code --> |Not Recommended| Web{Web}
Linux_x64_Executable --> Release[Release]
Linux_x64_AppImage --> Release[Release]
Android_appbundle --> Release[Release]
Android_x86_64_APK --> Release[Release]
Android_ARM64_V8A_APK --> Release[Release]
Android_ARMEABI_V7A_APK --> Release[Release]
macOS_Executable --> Release[Release]
iOS_Executable --> Release[Release]
Windows_x64_Executable --> Release[Release]
Windows_x64_MSIX_Package --> Release[Release]
Web --> Release[Release]
Linux_x64_Executable --> Docker_Image(Docker Image)
Docker_Image --> GHCR[GHCR]
Docker_Image --> Amazon_ECR[Amazon ECR]
Android_appbundle --> |Manual Submission| Google_Play[Google Play]
Windows_x64_MSIX_Package --> |Manual Submission| Microsoft_Store[Microsoft Store]
Platform | Builds | Debug Symbols | Stores / Repositories | ||
---|---|---|---|---|---|
Linux | Linux_x64_Executable.zip | ZIP | - | ||
Bitscoper_Cyber_ToolBox-12.0.1-x64.AppImage | |||||
Android | appbundle | Android_appbundle.zip | ZIP | Google Play | |
APK | ARM | APK_ARMEABI_V7A.zip (32-bit) | ZIP | ||
APK_ARM64_V8A.zip (64-bit) | |||||
x86_64 | APK_x86_64.zip | ||||
macOS | macOS_Executable.zip | ZIP | - | ||
iOS | iOS_Executable.zip | ZIP | - | ||
Windows | Windows_x64_Executable.zip | ZIP | Microsoft Store | ||
Windows_x64_MSIX_Package.zip | |||||
Web |
Web_Application.zip
(Not Recommended) |
- | - | ||
Docker / Podman | - | - | GHCR | ||
Amazon ECR |
Important
Versions submitted to Google Play and Microsoft Store may vary and be delayed.
podman pull ghcr.io/bitscoper/bitscoper_cyber_toolbox:latest
# or
docker pull ghcr.io/bitscoper/bitscoper_cyber_toolbox:latest
podman run -it --rm ghcr.io/bitscoper/bitscoper_cyber_toolbox:latest
# or
docker run -it --rm ghcr.io/bitscoper/bitscoper_cyber_toolbox:latest
podman pull public.ecr.aws/n7r2f3q1/bitscoper/bitscoper_cyber_toolbox:latest
# or
docker pull public.ecr.aws/n7r2f3q1/bitscoper/bitscoper_cyber_toolbox:latest
podman run -it --rm public.ecr.aws/n7r2f3q1/bitscoper/bitscoper_cyber_toolbox:latest
# or
docker run -it --rm public.ecr.aws/n7r2f3q1/bitscoper/bitscoper_cyber_toolbox:latest
Scans ports from 0 to 65535 on a target server and reports the open ports.
Traces the route to a target server, showing each hop along the route with its corresponding IP address.
Pings a target server and reports the IP address, TTL, and time.
Calculates MD5, SHA1, SHA224, SHA256, SHA384, and SHA512 hashes of files.
Calculates MD5, SHA1, SHA224, SHA256, SHA384, and SHA512 hashes of a string.
Encodes a string into binary (Base2), ternary (Base3), quaternary (Base4), quinary (Base5), senary (Base6), octal (Base8), decimal (Base10), duodecimal (Base12), hexadecimal (Base16), Base32, Base32Hex, Base36, Base58, Base62, Base64, and Base64 URL.
Translates English to Morse code and vice versa.
Extracts Open Graph Protocol (OGP) data of an webpage.
Crawls the available webpages in series by number and lists the available ones.
Retrieves A, AAAA, ANY, CAA, CDS, CERT, CNAME, DNAME, DNSKEY, DS, HINFO, IPSECKEY, NSEC, NSEC3PARAM, NAPTR, PTR, RP, RRSIG, SOA, SPF, SRV, SSHFP, TLSA, WKS, TXT, NS, and MX records of a domain name (forward) or an IP address (reverse).
Retrieves WHOIS information about a domain name.
docker build -t bitscoper_cyber_toolbox .
xhost +si:localuser:root && docker run -it --rm -e DISPLAY=$DISPLAY -e WAYLAND_DISPLAY=$WAYLAND_DISPLAY -v /run/user/$(id -u)/wayland-0:/run/user/$(id -u)/wayland-0 -e XDG_RUNTIME_DIR=$XDG_RUNTIME_DIR bitscoper_cyber_toolbox
flutter pub run rename setAppName --targets linux --value "Bitscoper_Cyber_ToolBox"
flutter pub run rename setAppName --targets android,macos,ios,windows,web --value "Bitscoper Cyber ToolBox"
flutter pub run rename setBundleId --targets linux,android,macos,ios,windows,web --value "bitscoper.bitscoper_cyber_toolbox"
flutter pub run flutter_launcher_icons
flutter pub run flutter_native_splash:create
keytool -genkey -v -keystore ~/Laboratory/Bitscoper\ Cyber\ ToolBox/KeyStore.jks -keyalg RSA -keysize 4096 -validity 10000 -alias Bitscoper_Cyber_ToolBox
base64 ~/Laboratory/Bitscoper\ Cyber\ ToolBox/KeyStore.jks > ~/Laboratory/Bitscoper\ Cyber\ ToolBox/KeyStore.b64
Note
I sometimes clean up commit messages when they become too cringeworthy.