accsfortniet
Scalable Application Engineer
Divine
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP

Hey Folks

From basic commands for package management, file manipulation, and text editing to advanced techniques for networking, process management, and security, this cheat sheet covers a wide array of topics essential for hacking and penetration testing on the go. Additionally, we’ll explore how Termux can be integrated with other tools and services to create powerful hacking workflows, enabling users to perform a diverse range of tasks directly from their Android devices.
Lets take a look

- Installation:
- Install Termux from the Google Play Store.
- Open Termux and allow necessary permissions.
- Basic Commands:
Code:pkg install <package>
Code:pkg upgrade
Code:pkg search <keyword>
Code:apt update
Code:apt upgrade
Code:apt install <package>
Code:apt remove <package>
Code:ls
Code:cd <directory>
Code:pwd
Code:mkdir <directory>
Code:touch <file>
Code:rm <file>
Code:mv <source> <destination>
Code:cp <source> <destination>
Code:cat <file>
Code:nano <file>
- Navigation:
- Use
Code:cd
- Use
Code:ls
- Use
Code:pwd
- Use
- Package Management:
- Use
Code:pkg
Code:apt
- Use
- Text Editing:
- Use
Code:nano
- Use
Code:vim
Code:emacs
- Use
- Networking:
Code:ping <host>
Code:ifconfig
Code:ip addr show
- SSH:
Code:ssh <user>@<host>
- File Management:
- Use basic Unix commands (
Code:ls
Code:cd
Code:cp
Code:mv
Code:rm
- Use basic Unix commands (
- Permissions:
Code:chmod
Code:chown
- Process Management:
Code:ps
Code:kill <PID>
Code:top
Termux is a versatile tool, and there’s a lot more you can do with it. This cheat sheet should help you get started with the basics.
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.