Master Termux - Hacking with Android Audiobook By Yonas Gebremichael cover art

Master Termux - Hacking with Android

Beginner to Advance Practical Guide

Virtual Voice Sample

Audible Standard 30-day free trial

Try Standard free
Select 1 audiobook a month from our entire collection of titles.
Yours as long as you’re a member.
Get unlimited access to bingeable podcasts.
Standard auto renews for $8.99 a month after 30 days. Cancel anytime.

Master Termux - Hacking with Android

By: Yonas Gebremichael
Narrated by: Virtual Voice
Try Standard free

$8.99 a month after 30 days. Cancel anytime.

Buy for $10.99

Buy for $10.99

Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

This is the first edition book for Mastering termux with detailed information from scratch to advance level. It's recommended that you download/read the 2nd edition - http://www.amazon.com/dp/B0CGNXTSVG

By reading this book, you will be able to know/master
  • Get familiar with Linus Commands and terminal nature through termux
  • Know how Linux distro works
  • Scripting and editing through bash, python and shell
  • Master termux terminal, able to do your own tutorials and memorize Installations from your heart
  • Perform pentesting, information gathering, scanning, enumerating and hacking from your smartphone
  • Monitor wifi network attacks like fake access point, WiFi Pineapple, Similar SSID, OPN Network Density
  • Solve different CLI errors .....etc

    The best thing about this book is its organized format and deep explanations. Every tool is placed into its category of function. For example, chapter 5 is for website tools with separate sub topics for pentesting, information gathering, DDOS attack tools and more. You can't imagine how much time I spent to categorize the tools and in fact it was the hardest part of writing this book. Now if you want website tools you can head to chapter 5 and if you want to hack wifi you can jump to chapter 8. Again, if you want tools for exploitation, Scanning Vulnerability & others you will simply get them well categorized within that chapter 5's sub topics.
    SO INSIDE THIS BOOK:

    In chapter one you will learn what is termux, how to use it, what is shell, what are packages, repositories, directories, frequently asked questions about termux, how to solve some errors....etc.
    In chapter two you will be able to know Installations of different tools in termux, why we use different packages and what is their meaning, you will see basic commands you should know before starting hacking with termux, you will learn how to set up your keyboard usage, network commands and many more... .
    Here it starts real hacking and using the termux tools in practical in chapter three. You will first learn how to attack victims using phishing tools and I have provided all phishing tools with newly created tools upto 2020. You will also learn about information gathering, vulnerability analyzing and exploitation tools.
    In chapter four, under the title "Android as Hacker's Device" you will definitely learn real hacking with android using termux. This is the main chapter you will get ultimate hacking guides and find a way to use the biggest Linux tools in your android phone. These are like Kali linux, Metasploit Framework, Nmap, Hacktronian and so on. Chapter five will let you know how to hack website, do DDOS, pentest, gather information of target websites, trace ip adress, secure your website, host a website in a phone using termux..etc. Every piece of information is categorized to its category of function and the tools are easy to get them in place. I have included all termux tools that are developed for website.
    In chapter six you will get many cool termux tricks and hacks. All tools given there are kind of tools that make termux interesting. You will enjoy discovering this chapter!
    As you may have been wondering if social media hacking is included chapter seven is all about hacking and securing Facebook, Instagram, and WhatsApp accounts. You will learn how to be aware of your private data from falling to hacker's trap through different luring techniques, know how to hack, bruteforce, make wordlist and other stuffs that enable you access someone's social media
    ..read more
Programming & Software Development Security & Encryption Technology Hacking Software Programming Software Development Computer Security
No reviews yet