The main objective of the creation of this laboratory is to transport the applications, tools and/or frameworks of a Linux computer environment to the palm of the user's hand thanks to the portability that the Android operating system can provide us. We hope that this project will help contribute to the cybersecurity community and that people can develop efficient countermeasures. The use of i-Haklab without prior mutual consistency may lead to illegal activity. It is the end user's responsibility to obey all applicable local, state, and federal laws. The authors take no responsibility and are not responsible for any misuse or damage caused by this program
To get help join to our support groups over Telegram group or over our IRC group running in i-Haklab the command :
i-Haklab weechat
Termux is a terminal emulator application that shares the same environment of the Android operating system by starting the command line of the program
shell
using the system callexecve
and redirecting the input, output and standard error flows to the screen. Termux has a vast number of packages under theapt
manager compiled with Android NDK and patched for compatibility, generally available on GNU/Linux systems.
i-Haklab is a hacking laboratory for Termux that contains open source tools for osint, pentesting, scan/find vulnerabilities, exploitation and post-exploitation recommended for me Ivam3 with automation commands, a many guides, books and tutorials to learn how to use tools. i-Haklab use oh my fish insteractive shell to provide core infrastructure to allow you to install packages which extend or modify the look of your termux. To get help about shell and its use going to OMF official site.
- CLONING THIS REPOSITORY:
git clone https://github.com/ivam3/i-Haklab \
cd i-Haklab \
chmod +x setup \
bash setup
- ADDING AT APT SOURCES LIST
yes|apt install wget gnupg && \
mkdir -p $PREFIX/etc/apt/sources.list.d && \
wget https://raw.githubusercontent.com/ivam3/termux-packages/gh-pages/ivam3-termux-packages.list -O \
$PREFIX/etc/apt/sources.list.d/ivam3-termux-packages.list && \
curl -fsSL "https://raw.githubusercontent.com/ivam3/termux-packages/gh-pages/dists/stable/public_key.gpg" \
|gpg --dearmor|tee "$PREFIX/etc/apt/trusted.gpg.d/ivam3.gpg" >/dev/null && \
apt update && apt install i-haklab
- Provides a diferent types of prompt with command:
omf theme
- Provides a login session by password(default=Ivam3byCinderella) or fingerprint(depends features device). It could set running:
i-Haklab passwd set
Or change it running:
i-Haklab passwd new
- Let you change the banner running:
i-Haklab setbanner
- Let you change the username running:
i-Haklab setuser
- Let you update Termux system package by package running:
i-Haklab aptup
- Provide you test your bandwidth network running:
i-Haklab speedtest
- Bring you a main activity from apk file running:
i-Haklab apkactivity
- Create a Termux backup and/or restore it running:
i-Haklab backup
- Automate brute force attacks running:
i-Haklab bruteforce
- Let you interact with all OpenAI modules running:
i-Haklab chatGPT
- Add your API key running:
i-Haklab setapikey
- Encode|decode secret message into a ASCII file running:
i-Haklab ESmsg
- Bring you a fake indentity card with real email and phone number running:
i-Haklab fakeID
- Provide you a port forwarding tunnel with a custom subdomain running:
i-Haklab tunnel
- Automate metasploit common process running:
i-Haklab msf
- Provide you the ngrok link running:
i-Haklab ngroklink
- Provide you a ngrok ssh connection running:
i-Haklab ngrokssh
- Hide a Reverse Shell with a Video File by Exploiting Linux OS running:
i-Haklab payvid
- Let you get information about telephone number running:
i-Haklab phonescan
- Provide you with a web site server running over your device with Termux, wich will you can share several files over all internet. Enable it running:
i-Haklab share
- Test usb device connected via OTG running:
i-Haklab usbtest
- Provide you with deliberately vulnerable web site servers as bWAPP, DVWA and MUTILLIDAE to practice your hacking skills searching, finding and exploiting the most common vulnerabilities. Enable those running:
i-Haklab servers4test
- Provide you more than 100 tools/frameworks with an easy install/remove over command
apt
. You can get the list of all availables running :
i-Haklab show alltools
If you want to suggest some tool, do it in the section of suggestions of our Telegram BOT.
There are several commands in i-Haklab that facilitate the use of Termux:
- i-Haklab: it is the main command that helps with automations of various processes such as visualization of user guides for the tools, download of hacking books, access to the community tutorials, payload creation automation, metaploit handler activation, brute force attacks among others. See all features running:
i-Haklab help
- Ask to Cinderella. A virtual assist exclusively about Termux themes:
cinderella
- Mannage android main settings over Termux:
cmd
- Search repositories in github over CLi:
gitbrowswering
- Returns the private ip of your local network:
LOCALHOST
- Manage internal/external storage with graphical interface:
adminfiles
- Run OSINT setoolkit:
osrframework
- Enable proxy connection by proxychains4:
proxy
- Provides information about the mounted memory:
df
- Provides recursive information about the weight of directories and files:
du
- Use the easy and faster Fuzzy finder:
fzf
- Get your public internet protocol(IP):
mypip
- Privide you with a root enviroment as root user(on rooted device) or fake root user(on NOT rooted device):
sudo root
- Or just run any command(s) with:
sudo <some command>
- Enable the php server:
serverphp
- Enable the apache server:
serverapache start/stop/restart
- Enables postgresql database:
postgresql start/stop/restart
- Remove current session cache, temporal files & residual APT packages:
rmcache
- Init a shell to translate any text:
traductor
- We know that each Android is different and this can generate various errors in the installation processes of ruby gems, python modules, among others. Automates the solving processes running:
fixer
- Block the termux screen and it will only be unlocked with said password or your fingerprint. It is worth mentioning that these access codes are encrypted for your security.
lock
i-Haklab automates the installation and configuration of a graphical environment with the xfce4 windows manager, which opens up the possibility of running tools such as wireshark and burpsuite. For this, the installation of the Termux:Wayland application is required. Once installed it to run this enviroment just execute:
apt install termux-desktop-xfce \
i-Haklab Xwayland
IRC (Internet Relay Chat) is an application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model. Under the command we will find the argument, with which you can join the official IRC Ivam3byCinderella where u can contact another i-Haklab.
If you want to suggest some book do it in the section of suggestions of our Telegram BOT.
i-Haklab is constantly updating tools and improvements. To stay updated you just have to run:
apt update i-haklab