Cyber security

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools and/or frameworks of a Linux computer environment to the palm of the user’s hand thanks to the portability that the Android operating system can provide us.

We hope that this project will help contribute to the cybersecurity community and that people can develop efficient countermeasures.

The use of i-Haklab without prior mutual consistency may lead to illegal activity. It is the end user’s responsibility to obey all applicable local, state, and federal laws.

The authors take no responsibility and are not responsible for any misuse or damage caused by this program

To get help join to our support groups over Telegram group or over our IRC group running in i-Haklab the command :

i-Haklab weechat

What Is Termux?

Termux is a terminal emulator application that shares the same environment of the Android operating system by starting the command line of the program shell using the system call execve and redirecting the input, output and standard error flows to the screen. 

Termux has a vast number of packages under the apt manager compiled with Android NDK and patched for compatibility, generally available on GNU/Linux systems.

What Is i-Haklab?

i-Haklab is a hacking laboratory for Termux that contains open source tools for osint, pentesting, scan/find vulnerabilities, exploitation and post-exploitation recommended for me Ivam3 with automation commands, a many guides, books and tutorials to learn how to use tools. 

i-Haklab use oh my fish insteractive shell to provide core infrastructure to allow you to install packages which extend or modify the look of your termux. To get help about shell and its use going to OMF official site.

INSTALLATION.

  • CLONING THIS REPOSITORY:
git clone https://github.com/ivam3/i-Haklab \
cd i-Haklab \
chmod +x setup \
bash setup
  • ADDING AT APT SOURCES LIST
apt install wget && \
mkdir -p $PREFIX/etc/apt/sources.list.d && \
wget https://raw.githubusercontent.com/ivam3/termux-packages/gh-pages/ivam3-termux-packages.list -O $PREFIX/etc/apt/sources.list.d/ivam3-termux-packages.list && \
apt update && yes|apt upgrade && \
apt install i-haklab

i-Haklab Will …

  • Provides a diferent types of prompt with command:
omf theme

Provides a login session by password(default=Ivam3byCinderella) or fingerprint(depends features device). It could set running:

i-Haklab passwd set

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

20 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago