Professional Documents
Culture Documents
Termux All - in One
Termux All - in One
Before we drive into deep, let's start with some cool commands.
cmatrix
Type
pkg install sl
Now let's see what are the background running tasks through termux
Now let's find the factor of any number, for that install below package by typing
After that to find the factor of any number then type factor number
we can write text in different styles, firstly try with the figlet
Type
After that type figlet and type the text you want to write in the figlet style
For Colourful text, you have to install toilet package for that, type below command
Calendar in termux, if you can't to see the calendar in termux then type
cal
apt update
This command used to update the termux built-in busybox and other packages
apt upgrade
To manage and access files in termux then you must type below command
termux-setup-storage
To Access your External Sdcard the same command is used cd /sdcard0/ && ls
To check a particular website is accessible or not in your ISP then you can check that through termux by
typing
ping website
The Interesting thing is you can access the internet through termux, directly in the command line
w3m website
Now In this Section i will teach you How To Install Useful Packages/Hacking Tools On your Android
mobile
Now Type
Now Type
termux-setup-storage
Now You are Ready To install useful packages and hacking Tools on your Mobile, we are sharing some of
the tools with their installation and simple commands in termux
Nmap is a Information Gathering and Vulnerability Scanner Tool , to install nmap in termux type below
command
After that it will take few minutes to install after installation you can use nmap on termux by typing
nmap in termux
You can use nmap in termux for scanning targets on your mobile and also for basic attacks
Hydra is is Good Tool for Brute force Attack , hope you might already known about it and you may not
need more info about hydra
Red Hawk is used for Website Information Gathering such as who is Lookup , Reverse IP Lookup , xss, sqli
scanning etc
To use Red Hawk you Need Php environment so type below command
During installation you will be asked : termux will use some space on your device just simply type y for
Yes
After type
git is used to directly cloning files from github or you can download scripts, tools from github or other
sources and use
type cd
Then type ls
Type in Termux
Chmod +x RED_HAWK
After
type
cd RED_HAWK
Now Type ls
php rhawk.php
That's all Now You are able To use RED HAWK in your Mobile
ReconDog is also a information Gathering and Vulnerability Scanner Tool Written In Python
Firstly kill the session of Termux or You can start a New Session in a new window
Type
It will prompt you to Termux will use some space on your device simply reply y for yes
Now Type cd
Then type ls
Then type
cd ReconDog
Then type
python2 dog.py
Sqlmap is written in Python so we need python environment for that we have to install python in
Termux
After installation
cd
Then type
ls
Python2 sqlmap.py
We have presented some information gathering and Vulnerability scanning Tools and Told you How To
Install Them in Termux
You can Install and Use The Hacking Tools written in php, python or any other programming language
Lazymux contains Several Hacking Tools of Kali Linux at One Place so now its easy to Install Lazymux In
Termux
Lazymux Contains the Following Hacking Tools
Termux App
Then Now We need Python2 environment in Termux so type the command pkg install python2 to install
python2
cd Lazymux && ls
Now you have to type below command for menu of Lazymux Hacking Tools
python2 lazymux.py
Note you're installed tools will be save to Lazymux Directory so always check the Lazymux directory after
installing tools
Now its Possible even To Install Metasploit Frameworks and Many Other Hacking Frameworks in Termux
Hope you guys liked this tutorial and Wanted to Know more about all the available Hacking Tools for
Termux
Also Don't Forget To Read : 5 Must Have Apps For Your Android
We will soon present all the Possible Hacking tools for Termux
In this article we have used the words hack, hacking that belongs To Ethical Hacking Only