TermuxHunter is a mobile pentesting framework that brings Kali Linux NetHunter to your Android device through Termux. No root access is required — just a few commands to unlock both CLI and GUI via VNC access.
Whether you're an ethical hacker, CTF player, or cybersecurity student, this project gives you a lightweight, fully featured, on-the-go Kali setup — with bash/zsh customizations and fixes for Android’s background-killing behavior.
- ✅ Rootless Kali NetHunter installation
- ✅ Choose between Minimal CLI or Full GUI (VNC)
- ✅ Shell enhancements using bash/zsh
- ✅ Easy user/root switching
- ✅ Phantom Process Killer fix via ADB
- ✅ Clean uninstall support
- 📱 Android device (ARM64 architecture)
- 💾 15GB free internal storage
- 📦 Termux v0.118.2 (GitHub build)
- 🖥️ VNC Viewer App (KeX)
pkg update && pkg install wget -y
wget -qO- https://raw.githubusercontent.com/KIRAN-KUMAR-K3/TermuxHunter/main/kali-full | bash && kali
pkg update && pkg install wget -y
wget -qO- https://raw.githubusercontent.com/KIRAN-KUMAR-K3/DistroLab-Termux/main/KaliLinux/Chroot/kali-minimal | bash && kali
-
Set your VNC password:
kali vnc passwd
-
Start the VNC server:
kali vnc &
-
Open your VNC Viewer app and connect to:
127.0.0.1:5901
Username:
kali
Password: (Use what you set in step 1. You can also usekali
for simplicity)
📌 Tip: You must keep Termux running in the background while using VNC.
Action | Command |
---|---|
Login (User) | kali |
Login (Root) | kali -r |
Exit | exit |
Uninstall Kali | kali-uninstall |
On some Android devices, background processes like VNC may be force-stopped. Here’s how to fix that:
adb shell /system/bin/device_config set_sync_disabled_for_tests persistent
adb shell /system/bin/device_config put activity_manager max_phantom_processes 2147483647
adb shell settings put global settings_enable_monitor_phantom_procs false
adb shell /system/bin/device_config get activity_manager max_phantom_processes
adb shell dumpsys activity settings | grep max_phantom_processes
🛑 Common Issue: If you see:
Process completed (signal 9) - press Enter
, it means the phantom process killer is active. Apply the fix above.
TermuxHunter/
├── README.md
├── images/
│ ├── kalinh.png
│ ├── kalivnc.jpg
│ └── vncsetup.png
├── kali
├── kali-full
├── neofetch
├── rcfiles/
│ ├── etcbash.bashrc
│ ├── home.bashrc
│ ├── home.zshrc
│ ├── homebash.bashrc
│ ├── root.zshrc
│ └── rootbash.bashrc
└── vnc
Password Prompt Example:
kali
Kiran Kumar K Cybersecurity Enthusiast | VAPT | Bug Bounty Hunter 📧 [email protected] 🔗 GitHub • LinkedIn • Blog
Released under the MIT License.
🚨 Disclaimer: This project is for educational and ethical hacking purposes only. Do not use it on unauthorized systems. You are responsible for your actions.