Tools for Termux Terminal emulator part one
There’s a lot hype about Termux Terminal emulator in the hacking world so i though was only fair to add a post on the top tools to install on termux.
What is termux
Termux turns a Android device into a lightweight and versatile Linux environment. The app requires no root privileges, The dedicated Termux:API add-on gives you access to Android’s APIs, given you the ability to control your Android device from the command line and shell scripts.
Metasploit can be installed on termux as well as msfvenom. Metaspoit is the one of the best tools a hacker can have.
How to install
pkg install wget
chmod +x metasploit.sh
Tool-X is a kali linux hacking Tool installer. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best hacking tools in Rooted or Non Rooted Android devices. In the Tool-X there are almost 251 hacking tools available for termux app and GNURoot Debian terminal. you can install any tool by single click. Tool-X is Specially made for Termux and GNURoot Debian Terminal. Now Tool-X is available for Ubuntu. credits to https://github.com/Rajkumrdusad/Tool-X
how to install
pkg install git
git clone https://github.com/Rajkumrdusad/Tool-X.git
chmod +x install.aex
sh install.aexif not work than type
nmap is a popular network scanner
pkg install nmap
Pkg install Hydra
5: Red Hawk
Pkg install php -y
pkg install git -y
git clone https://github.com/Tuhinshubhra/RED_HAWK.git
chmod +x REDHAWK
pkg install Python2
git clone https://github.com/UltimateHackers/ReconDog.git
Please consider downloading Brave Browser by downloading Brave Browser through our website you won’t only be downloading a great privacy browser you will also be supporting (HackingVision.com). We are not using Google Ads as we respect our users privacy. We encourage you to use an Ad-blocker or a browser that has a built in ad-blocker and other privacy features such as VPN.
- Advanced Bash Shell Scripting Guide PDF Programming eBook Download - 14th February 2019
- The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks - 13th February 2019
- Linux Basics for Hackers - 12th February 2019