0% found this document useful (0 votes)
77 views5 pages

TERMUX

Termux is an open-source terminal emulator for Android that provides a Linux command environment without requiring root access. It supports various penetration testing tools and can be installed via Google Play, with a size of 17 MB and compatibility for Android 5.0 and later. The document outlines installation steps and commands for various hacking tools, as well as basic commands for navigating and managing files within the Termux environment.

Uploaded by

anyichukwu2023z
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views5 pages

TERMUX

Termux is an open-source terminal emulator for Android that provides a Linux command environment without requiring root access. It supports various penetration testing tools and can be installed via Google Play, with a size of 17 MB and compatibility for Android 5.0 and later. The document outlines installation steps and commands for various hacking tools, as well as basic commands for navigating and managing files within the Termux environment.

Uploaded by

anyichukwu2023z
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

TERMUX

Termux (in English) is a terminal emulator, an open source application that adds a
Linux command environment to phones without the need to root the phone or
install an external system or a modified ROM, but it is sufficient to install it directly
via Google Play, as the application provides many additional packages using the
famous APT package manager on Ubuntu.
Name on Google Play: Termux
Developer: Fredrik Fornwall
Official website: https://termux.com
Size: 17 MB
Installation mirror: +10M
Supports only: Android 5.0 and later.
Termux application:
It is a terrible tool in penetration testing, as it is built on the Linux kernel, and
combines the terminal and Linux tools, and helps you get started in the world of
penetration testing.
⇐ Step 1:Download the "termux" application You can download the application
from Google Play "Play Store" after opening Google Play and writing "termux" in the
search box and downloading the application, as its size does not exceed 5 MB, and
you can download the application directly from Media Fire Download.
⇐ Step 2:After downloading the application, you must enter the following
commands:
1 - apt Update
2 - apt upgrade
Step 3: Write this command to finish configuring the application "termux-setup-
storage". Now you are ready to start hacking and using all the hacker tools to test
the penetration, and here are the most important tools and the best ethical hacking
testing tools that you can use on the "termux" application.

⇓ Tools ⇓
1. Nmap Tool
You can use the Nmap tool to identify and search for targets on your mobile phone.
It is one of the most important tools and must be available and installed on the
application to start professionalizing the Termux program. To install the tool, enter
the command "pkg install nmap" and click Continue. The installation of the Nmap
tool may take a few minutes depending on the internet speed. To run the tool to
start working, type "nmap" in the application.
2. Hydra Tool
The "Hydra" tool is one of the most important tools in the Kali Linux system, and is
used in Brute force Attack. It is known to users of the Kali Linux distribution. To
install the tool, enter "Pkg install Hydra". This command may take a few minutes
depending on the internet speed. To run the tool, type the command Hydra.
3. RED_HAWK Tool
This tool is used to hack websites and provides you with all the information you are
looking for about the website you want to test the penetration on. To install this
tool, enter the following commands in order.
1 - " Pkg install php "
2 - " pkg install git "
3 - " git clone https://github.com/Tuhinshubhra/RED_HAWK.git "
4 - " ls "
5 - " cd RED_HAWK "
6 - " chmod +x rhawk.php "
After these steps, the “RED_HAWK” tool has been successfully installed and you can
now start using it. To run the tool, open a new window on " termux " and write the
following commands.
1 - "ls"
2 - "cd RED_HAWK"
3 - "php rhawk.php"
4. Recongdog Tool
A very important tool in detecting vulnerabilities and searching for loopholes
through which you can, using "python" to install this tool, write the following
commands,
1 - "pkg install Python2"
2 - "git clone https://github.com/UltimateHackers/ReconDog.git"
3 - "cd RecongDog"
4 - "chmod 777 dog.py"
5 - "python2 dog.py"
Now, after entering these commands in "termux", you can use the "Recongdog"
tool.
5. SQLMAP Tool
It is the most used tool by Kali Linux professionals, the most accurate in searching
for vulnerabilities and loopholes that are relied upon in the world of information
security. To install the tool, type the following commands:
1 - " Pkg install python2 "
2 - " git clone https://github.com/sqlmapproject/sqlmap.git "
3 - " cd "
4 - " ls "
5 - " cd sqlmap-dev "
6 - " Python2 sqlmap.py "

TERMUX BASICS AND COMMANDS


Copy each command and paste it into Termux then press Enter one by one.
1: pkg update
2: pkg upgrade
3: pkg install python
4: pkg install python2
5: pkg install python3
6: pkg install ruby
7: pkg install git
8: pkg install php
9: pkg install java
10: pkg install google
11: pkg install bash
12: pkg install perl
13: pkg install nmap
14: pkg install clang
15: pkg install macchanger
16: pkg install nano
17:pkg install figlet
18: pkg install cowsay
19: pkg install curl
20: pkg install tar
21: pkg install zip
22: pkg install unzip
23: pkg install tor
24: pkg install sudo
25: pkg install wget
26: pkg install wcalc
27: pkg install openssl
28: pkg install bmon

In the tools that require (y/n), type y and enter

A. The cd command
The "cd" command is used to move to a specific folder, for example, if you are in
the main folder Home, and you want to move to the downloads folder, you can type
“cd Downloads”, Assuming that Download is the name of the folder you want to
enter.

B. The ls command
The ls command is used to display the files and folders in the desired folder; type
the ls command in your terminal and it will display a list of files and folders in the
home folder (Home). You can show the names of hidden files using the command "ls
-a".

C. The pwd command


pwd - This command shows you the path of the folder you are currently in.

D. The mkdir command


We use the mkdir command, which means make directory, meaning create a
folder, for example;
mkdir myfolder
-Here we created a folder named “myfolder”.

E. rmdir and rm command


To delete a folder, we use the rmdir command, meaning remove directory. To
delete a file, we use the rm command

Example:
Delete folder myfolder, Use “rmdir myfolder”

Delete file, Use “rm myimage.jpg”. Assuming that myimage.jpg is an image file.

F. Touch command
The touch command is used to create a new file, whether it is an empty txt text file
or an empty doc file. For example:
touch log.txt

G. cat command

We use the cat command to display the contents of a specific file, such as the file
we created previously, for example.
cat log.txt

H. cp command
Use the cp command to copy files from one folder to another. The command
requires two variables: the first is the path of the file to be copied, and the second is
the target folder to which the file is to be copied.
Example We will copy a file in Downloads and put it in the main folder Home
cp /Downloads/onsec.jpg /Home/onsec.jpg

I. The mv command
Use the mv command to move files via the command line. We can also use the mv
command to rename files. For example, if we want to rename the file "text" to the
file "new", we can use the command "mv old new" and to move it we use the same
copying method.
mv oldName newName

J. The echo command


It is used to print any writing on the terminal, for example echo Hello CortexHacker
and if we want to write it inside a file we use the arrow < for example
echo Hello > file.txt. We wrote the word Hello in a file we named file.txt. If the file
does not exist, it will be created automatically.
If you want to add a word to an existing file, we use the arrows << Example
echo World >> file.txt

K. The nano and vi commands


You can consider them a text editor like notepad through which you can modify or
edit a text file by writing the name of the tool and passing it the path of the file you
want to open and modify. Example
nano /Downloads/site.txt

L. The zip and unzip commands


Use the zip command to compress files into a compressed archive, and unzip to
decompress and extract files from the compressed archive. The command may not
work at first and show command not found because it does not come by default, but
you install it first via the command “pkg install zip”.
If you want to decompress a file, use the unzip command and pass it the path of the
compressed file.
Example:
unzip /Downloads/cortexhacker.zip

The command to delete a folder or tool


rm -rif

Example:
mr -rif black-max
And the black-max tool will be deleted

Storm-BREAKER Social Engineering Tool


Specialized in hacking the camera and microphone and determining the device
location on Termux Works on all Linux distributions

Installation commands
$ git clone https://github.com/xaviha/stormbreaker
$ cd stormbreaker
$ sudo bash linux-installer.sh
$ python3 -m pip install -r requirments.txt
$ python3 Storm-Breaker.py

Note: Some beginners when installing a tool for the first time the second time put
all the installation and operation commands This is a mistake when you install any
tool for the first time All you have to do is enter the tool folder and run it: Example
cd Storm-Breaker
python3 Storm-Breaker.py

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy