Onex : A Library Of Hacking Tools For Termux And Other Linux Distributions

Onex is a kali linux hacking tools installer for termux and other linux distribution. It’s package manager for hacker’s. It can manage large number’s of hacking tools that can be installed on single click.

Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali linux hacking tools. use onex install [tool_name] command to install any hacking tool.

Operating System Requirements

It works on any of the following operating systems:

  • Android (Using the Termux App)
  • Linux (Linux Based Systems)

How to Install?

Open the terminal and type following commands.

apt update
apt install git
git clone https://github.com/rajkumardusad/onex.git
chmod +x onex/install
sh onex/install if not work than use ./onex/install

How to use onex ?

CLI Mode :

onex -h or onex help for help.

Options :

onex install [tool_name] install any tool.
onex -i [tool_name] install any tool.
onex search [tool_name] search any tool.
onex -s [tool_name] search any tool.
onex list list all tools.
onex list -a list all tools.
onex -l list all tools.
onex -l -a list all tools.
onex help get help.
onex -h get help.

Menu Mode

onex start to start onex menu mode.

Enter a Number for a specific output:

  • To show all available tools and type the number of a tool which you want to install.
  • To show tools category.
  • If you want to update onex.
  • To exit the tool.
R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

18 minutes ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago