Cyber security

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools and/or frameworks of a Linux computer environment to the palm of the user’s hand thanks to the portability that the Android operating system can provide us.

We hope that this project will help contribute to the cybersecurity community and that people can develop efficient countermeasures.

The use of i-Haklab without prior mutual consistency may lead to illegal activity. It is the end user’s responsibility to obey all applicable local, state, and federal laws.

The authors take no responsibility and are not responsible for any misuse or damage caused by this program

To get help join to our support groups over Telegram group or over our IRC group running in i-Haklab the command :

i-Haklab weechat

What Is Termux?

Termux is a terminal emulator application that shares the same environment of the Android operating system by starting the command line of the program shell using the system call execve and redirecting the input, output and standard error flows to the screen. 

Termux has a vast number of packages under the apt manager compiled with Android NDK and patched for compatibility, generally available on GNU/Linux systems.

What Is i-Haklab?

i-Haklab is a hacking laboratory for Termux that contains open source tools for osint, pentesting, scan/find vulnerabilities, exploitation and post-exploitation recommended for me Ivam3 with automation commands, a many guides, books and tutorials to learn how to use tools. 

i-Haklab use oh my fish insteractive shell to provide core infrastructure to allow you to install packages which extend or modify the look of your termux. To get help about shell and its use going to OMF official site.

INSTALLATION.

  • CLONING THIS REPOSITORY:
git clone https://github.com/ivam3/i-Haklab \
cd i-Haklab \
chmod +x setup \
bash setup
  • ADDING AT APT SOURCES LIST
apt install wget && \
mkdir -p $PREFIX/etc/apt/sources.list.d && \
wget https://raw.githubusercontent.com/ivam3/termux-packages/gh-pages/ivam3-termux-packages.list -O $PREFIX/etc/apt/sources.list.d/ivam3-termux-packages.list && \
apt update && yes|apt upgrade && \
apt install i-haklab

i-Haklab Will …

  • Provides a diferent types of prompt with command:
omf theme

Provides a login session by password(default=Ivam3byCinderella) or fingerprint(depends features device). It could set running:

i-Haklab passwd set

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago