Cyber security

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools and/or frameworks of a Linux computer environment to the palm of the user’s hand thanks to the portability that the Android operating system can provide us.

We hope that this project will help contribute to the cybersecurity community and that people can develop efficient countermeasures.

The use of i-Haklab without prior mutual consistency may lead to illegal activity. It is the end user’s responsibility to obey all applicable local, state, and federal laws.

The authors take no responsibility and are not responsible for any misuse or damage caused by this program

To get help join to our support groups over Telegram group or over our IRC group running in i-Haklab the command :

i-Haklab weechat

What Is Termux?

Termux is a terminal emulator application that shares the same environment of the Android operating system by starting the command line of the program shell using the system call execve and redirecting the input, output and standard error flows to the screen. 

Termux has a vast number of packages under the apt manager compiled with Android NDK and patched for compatibility, generally available on GNU/Linux systems.

What Is i-Haklab?

i-Haklab is a hacking laboratory for Termux that contains open source tools for osint, pentesting, scan/find vulnerabilities, exploitation and post-exploitation recommended for me Ivam3 with automation commands, a many guides, books and tutorials to learn how to use tools. 

i-Haklab use oh my fish insteractive shell to provide core infrastructure to allow you to install packages which extend or modify the look of your termux. To get help about shell and its use going to OMF official site.

INSTALLATION.

  • CLONING THIS REPOSITORY:
git clone https://github.com/ivam3/i-Haklab \
cd i-Haklab \
chmod +x setup \
bash setup
  • ADDING AT APT SOURCES LIST
apt install wget && \
mkdir -p $PREFIX/etc/apt/sources.list.d && \
wget https://raw.githubusercontent.com/ivam3/termux-packages/gh-pages/ivam3-termux-packages.list -O $PREFIX/etc/apt/sources.list.d/ivam3-termux-packages.list && \
apt update && yes|apt upgrade && \
apt install i-haklab

i-Haklab Will …

  • Provides a diferent types of prompt with command:
omf theme

Provides a login session by password(default=Ivam3byCinderella) or fingerprint(depends features device). It could set running:

i-Haklab passwd set

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal Service

On March 4, 2025, a group claiming to be the notorious threat actor BianLian began…

6 hours ago

Blindsight : Advanced Techniques In Red Teaming And LSASS Memory Exploitation

Blindsight is a red teaming tool designed to dump LSASS (Local Security Authority Subsystem Service)…

6 hours ago

Hiphp : Mastering Remote Management Of PHP Websites

Hiphp, developed by Yasserbdj96, is an open-source tool designed to create a backdoor for controlling…

6 hours ago

PowerShell-Hunter : A Comprehensive Toolset For Threat Hunting

PowerShell-Hunter is a robust collection of PowerShell-based tools designed to aid security analysts in detecting…

6 hours ago

DE-TH-Aura : Detection Engineering And Threat Hunting By SecurityAura

DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using…

8 hours ago

MassVulScan : A Comprehensive Network Scanning Tool

MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify…

10 hours ago