Ethical Hacking With Termux: Android Hacking Course

Ethical Hacking With Termux: Android Hacks. With the help of this course you can Make Your Android Device as a Hacking Machine With Termux.

1. What is Termux?


Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically – additional packages are available using the APT package manager.

Termux combines powerful terminal emulation with an extensive Linux package collection. Commands to use in Termux App. Termux is primarily a command-line environment. Termux uses the same package installer as found in Kali, Debian, Ubuntu, and related Linux distros. Advanced Packaging Termux Tools is used to find, install, and remove software in Termux.

2.Termux Installation:-

#Android:-you can install termux on android using google play store or click here.

3.Setup:- termux install some pakages for termux , Use Below commands step by step 

apt update && apt upgrade

apt install git -y

apt install python3

apt install python2

apt install python

apt install php

pkg install wget

pkg install curl

pkg install clang

 now setup is complete.

4.Some Basic commands :

  COMMANDS                                             USAGE                                                                    

cp -vused to prints informative massage
cp -rused to copy any directory
mv -uupdate-move when source is newer than destination
mv -vto move any directory
ls -nto display UID and GID directory
ls –versionto check the version of ls command
cd —show last working directory from where we moved
ls -lshow file action like – modified, date and time, owner of file, permissions Etc.
ls helpshow display how to use “ls” command
cp -nno file overwrite
cd ~move to users home directory from anywhere
mv [file1 name] [new file2 name]move or rename two file at a time
cd –move one directory back from current location
mv [file name]move any file and folder
lslist directory
ls -alist all files including hidden files
pwdit show your current working directory
mv -iinteractive prompt before overwrit
wget [url]install tool , apt install wget
git clone [url]install any tools with git clone, apt install git
ls -alformatted listing with hidden files
mv -fforce move by overwriting destination files without prompt
ls -iDisplay number of file or directory
cpcopy any file
cd /change to root directory
cdchange directory
cd ..change current directory to parent directory
curl -O [url]apt install curl
rmremove or delete files
rm [filename]remove any text files
rmdir [dir name]remove any directory
rm -rfforce remove a directory or a folder
rm -r [name]delete a directory called name
apt remove [package name]uninstall / remove a package
touch [file name]create new file
mkdir [name]create a directory or folder
more [file name]output the contents of file
head [file name]output the first 10 line of file
tail -f [file name]output the contents of file as it grows
apt install zipinstall zip file tool
zip [file]compress file using this commands
unzip [zip file]to unzip file
ftplaunch ftp client from terminal
-puse passive mode
byeterminate current ftp session, exit
asciiset file transfer to ascii protocols
bellbell sound after each command
statusshows current status about ftp server
open hostopen a connection to remote host
remotehelp [cmdname]request help from ftp server
account [password]supply a password required by remote
uname -mused to find the architecture of your device
dudisplay directory space usage
dfdisplay disk usages
calshow display calendar
wshow display who is currently online
cat /proc/meminfoshow memory related information
cat /proc/cpuinfoshow cpu information
whoamishow your login name
fingure usernameshows information about user
dateshow the current date and time
uptimeshow the system current uptime
man commandshow manual a command
freedisplay memory and swap usage
killsend signal to process
kill- llist all of the signal that are possible to send with kill
lspcishow PCI devices
lsusbshow usb devices
apt search [qurey]
pkg search [qurey]
find a package
locate [file]find all files with filename
locate [query]find all path names contains a pharse
whereis [command]find location binary /source/man file for a command
which [command]find of an executable
grep pattern [files]searching for pattern in files
grep -r pattern filessearching for certain pattern in files
command | grep patternsearch for pattern in the output of command
find / -atime40to find all the files, which are accessed 40 days back
find / -cmin -60find change files in last 1 hour
find / -type d -name mllfind all directories whose name is mll in directory
find . -type f -perm 0777 -printfind all tghe files, whose permission are 777
ifconfigshows all configuration a network interface like ip, mac
ifconfig eth0used view the network setting on the interface eth0
ifconfig wlan0view the network setting on wlan0
ping [host]to ping host ip and show results
arpcheck network card & show ip adress
hostdisplay specific server
netstatreview network connection
nslookupfind out DNS related query
tracerout ipadressdisplay number of hops & respone time to get to a remote
system and website
whois domainget whois information of domain
telnet [ip address [post]telnet connection
dig domainget DNS information of domain
scpcopies file, over a source
uname -aused to display kernal information
whereis appshows possible location for an app
nano [file name]display and edit text files
apt showview package information
append [local-file] remote fileappend a local file to one on the remote
$execute a macro

5.Tool Installation :


The Metasploit framework is a very powerful tool which can be used by cybercriminals as well as ethical hackers to probe systematic vulnerabilities on networks and servers. Because it’s an open-source framework, it can be easily customized and used with most operating systems.


chmod +x


After installation complete:-

 1.Start postgresql 

./ start

2.And run msfconsole


now your metasploit is complete use it for exploit.

SET (Social Engineering Toolkit) 

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack in a fraction of time. These kind of tools use human behaviors to trick them to the attack vectors.

curl -LO

./ or bash

cd setoolkit

chmod +x


and run using below command


Hydra (bruteforce attack) 

Hydra Tool is a password detection tool (cracking) that can be used in a wide range of situations, including authentication-based forms commonly used in web applications. … When you need brute force cracking remote authentication, Hydra Tool is a service often a tool of choice.

apt install hydra

How to attack with hydra:-

we can perform lots of bruteforce attacks on websites and gmail accounts using hydra.


hydra -l user -ppasslist.txt 


-l = list of user

-p = list of password

user = usernames

passlist.txt = password list = attacking website url

Nexphisher (phishing Tool) 

NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30 Websites.There are 5 Port Forwarding Options including Localhost !!


git clone git://

cd nexphisher

bash setup or bash tmux_setup

and run using below command:-

bash nexphisher

open your mobile Hotspot when nexphisher generate port forwarding Link 

Sqlmap (website database hacking) 

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.


git clone

cd sqlmap

chmod +x

now run using below commands 

python2 or ./

Xerxes DDos Tool 

XerXeS is an extremely efficient DoS tool, developed by the hacker The Jester (th3j35t3r) to automate DoS attacks. It provides the capacity to launch multiple independent attacks against several target sites without necessarily requiring a botnet.

git clone

cd xerxes

clang  xerxes.c  -o  xerxes

run using below command 


Usage Example:-

attack on a website like using http port 80

./xerxes  80 

Tool-X (All In One Hacking Tools)

Tool-X is a Kali Linux hacking tools installer for Termux and linux system. Tool-X was developed for Termux and linux based systems. Using Tool-X, you can install almost 370+ hacking tools in Termux (android) and other Linux based distributions. Now Tool-X is available for Ubuntu, Debian etc.


git clone

cd Tool-X

chmod +x install

sh install if not work than use ./install

Type Tool-X or toolx from anywhere in your terminal to open Tool-X. 

How to Use ?

Enter a Number for a specific output:

  • (1) : To show all available tools and type the number of a tool which you want to install. 
  • (2) : To show tools category. 
  • (3) : If you want to update Tool-X. 
  • (4) : If you want to know About Us. 
  • (x) : To exit the tool.

It is a simple Bash Script to hide phishing URL under a normal looking URL( or

git clone

cd maskphish

run using below command



What is Termux?

Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically – additional packages are available using the APT package manager. Read the wiki to learn more. Secure.

Is Termux safe for android?

It is safe. Just do not execute random scripts from the Internet unless you well understand what they do. If you still decide to execute one, make sure that storage permission is revoked and root (if device is rooted) is not allowed for Termux app. Termux is as safe as any app that has been responsibility developed.

How can we use Termux in android phone?

Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically – additional packages are available using the APT package manager. Read the wiki to learn more. Secure.

What is TechNo CP?

TechNo CP is a ethical hacking & cyber security website.

Spread the love

Related Post

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *