[MODULE] LHROOT | Systemless Linux Chroot Installer and Bootscript - Magisk

LHROOT
Systemless Linux Chroot Installer and Bootscript Magisk Module​
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Dependancies:
busybox
coreutils for make_image
mke2fs for make_image
Installation:
Just flash the zip release via Magisk Manager.
Usage :
Code:
lhroot
on terminal emulator and follow the instructions
Once installed, to boot into Linux Chroot use :
Code:
bootlinux
After v2.1 you can run 2 or more chroot instances, just pass chroot folder, e.g.
Code:
bootlinux /data/alpine
To unmount bind directory use :
Code:
killlinux
After v2.1 you can terminate specific instance, just pass chroot folder, e.g.
Code:
killlinux /data/alpine
To make image use :
Code:
make_image <path to img> <img name.img> <size img in MB>
To mount image use :
Code:
mount_image <path to img> <path to linux directory>
Available Distro :
Alpine Linux, Installed on /data/alpine
Arch Linux, Installed on /data/arch
Debian, Installed on /data/debian
Fedora, Installed on /data/fedora
Kali Linux, Installed on /data/kali
Manjaro ARM, Installed on /data/manjaro
Ubuntu, Installed on /data/ubuntu
Void Linux, Installed on /data/void
....more distro added soon
Supported Architectures :
arm
aarch64
x86
x64
Credits :
mod-util by @veez21
Magisk by @topjohnwu
License :
Licensed under GNU GPL v3
Git Repository : https://github.com/FerryAr/lhroot
The rootfs tarball is taken from AnLinux Resources Repository
Most of distro rootfs tarballs had been rebuilt and stored at lhroot-repo
Note :
If you want to store your chroot in image file, make image file first using make_image then mount the image using mount_image script.
coreutils can be installed via @Zackptg5 's [URL="https://github.com/Magisk-Modules-Repo/ccbins]ccbins[/URL] module.
mke2fs can be installed via my [URL="https://github.com/FerryAr/e2fsprogs-arm]e2fsprogs module[/URL], support for arm device only, other arch will be use busybox mke2fs applets,will use ext2 filesystem and limited 2GB image size.

v2.1 Released (14/05/2022)
Changelog :
Code cleanup
Add Void Linux
Remove Parrot as it is outdated, and I can't build the tarball
Now you can seamlessly run 2 or more chroot instances, just pass chroot folder after bootlinux
v2.0:
Add Android environment so it can execute termux api commands, requested at #2. Still beta though, tested on Manjaro rootfs with Android 12.1 host
Added Manjaro ARM
Updated Arch Linux and Alpine Linux tarball link
v1.9:
Code Cleanup
Migrate Alpine Linux tarball download to official repository
Update Arch Linux to 2021.01
Update Alpine Linux to v3.13
v1.8:
Remove SELinux Permissive on boot
Change way to verify the device online
v1.7:
Update mod-util to v2.6.1
Add Parrot OS, supported x86 and x64 device only.
Add Fedora, Supported arm and x64 device only.
Add 15 seconds sleep on remove chroot function
v1.4:
Add make_image and mount_image script to store a chroot in img file
Add Arch Linux (Support for ARM and x64 only)
Add Kali Linux
Change login to chroot from /bin/bash to /usr/bin/env su -l
v1.0:
Initial Release

Download Release from here : https://github.com/FerryAr/lhroot/releases/

install

Need a tester for Android 6+
PM me or open Issue at Github
Thanks.

FerryAr said:
Need a tester for Android 6+
PM me or open Issue at Github
Thanks.
Click to expand...
Click to collapse
I have a device that can run android 4-7

Will test on Android 12 Aarch64

KillSkill said:
Will test on Android 12 Aarch64
Click to expand...
Click to collapse
Works?

Long time no see!, as I busy with my job, I'd be slow updating this project.
I've tested this on Android 12 and its mostly works, some part may need selinux to be permissive.
If anyone want to contribute and/or request feature, just make issue or pull request at Github!

Very good project.
Chroot is always useful.
Thank you very much

hello

Download link missing

am i missing something or are there just no programs in the apt repository? where can i get binaries?
i tried adding the repo's from the andronix build of ubuntu to /etc/apt/sources.list and it just didnt work - failed to resolve any of the repos including the built in one. unclear how to use this without a package manager
I was able to wget a zip from github but there doesnt seem to be a way to install something to unzip it

Hmm why dont you update the linux deploy

Hi, how to bootlinux /data/debian, with different, non root user? (user and sudo are already added and configured)

Related

Kali Linux Nethunter v1.0 [Kali v2.0 / Backtrack 5] [osprey]

The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. NetHunter is an open-source project developed by Offensive Security and the community.​
FIRST THINGS FIRST, SERIOUSLY:​
Your warranty was void as soon as you unlocked your bootloader.
Although Kali Nethunter should be safe to use, I am not responsible for whatever happens to your device, router, or whatever networking infrastructure because of YOU misusing the available facilities of Kali.
Remember that while Kali can be absolutely safe, if you handle root access improperly, no one will help you.
Make sure you read all of the info here and have some basic knowledge about networking, kernels and Linux/Unix.
Even if you're able to find a vulnerability on a different host (often called victim) , don't misuse the advantage you have.
Report the issue to the device's owner and the OEM. Do not complain if the attacks aren't working. Security has been ramping up ever since the wikileaks incident and the Edward Snowden thing.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
FEATURES:
Kali NetHunter Application
Home Screen - General information panel, network interfaces and HID device status.
Kali Chroot Manager - For managing chroot metapackage installations.
Check App Update - For checking Kali NetHunter Android App updates.
Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
Custom Commands - Add your own custom commands and functions to the launcher.
MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
VNC Manager - Set up an instant VNC session with your Kali chroot.
HID Attacks - Various HID attacks, Teensy style.
DuckHunter HID - Rubber Ducky style HID attacks
BadUSB MITM Attack - Nuff said.
MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
MITM Framework - Inject binary backdoors into downloaded executables on the fly.
NMap Scan - Quick Nmap scanner interface.
Metasploit Payload Generator - Generating Metasploit payloads on the fly.
Searchsploit - Easy searching for exploits in the Exploit-DB.
3rd Party Android Applications (WIP)
NetHunter Terminal Application
DriveDroid
USB Keyboard
Shodan
Router Keygen
cSploit
Remember that there might be many other exploits and attack features available online, the ones mentioned above are officially documented by Kali. Secondly, not much support will be possible regarding the attacking since not everyone will have the same opportunities.
DOWNLOADS
N Custom ROMs :
Android File Host
INSTALLATION
IMPORTANT NOTE: Kali NetHunter is NOT an Android ROM, but it is an overlay ( you have to flash it above android).
The builds currently provided are to be used on Nougat based custom ROMs ONLY. (which use the LineageOS kernel)
Installing it on a ROM which uses the LineageOS 14.1 kernel. (examples include all of our N custom ROMs like Lineage, AEX, AICP, AOKP, DU ) :
1. Make sure you are running the latest available build of the ROM you have installed.
2. Reboot to TWRP.
3. Make sure you backup Boot, System and Data partitions, just incase you want to remove Kali, you can restore it.
3. Wipe Cache and ART Cache (Formerly known as Dalvik Cache). Do NOT wipe your data partition.
4. Install the zip file.
5. Reboot to System.
POST INSTALLATION:
1. Open the NetHunter App and start the Kali Chroot Manager.
2. You might want to download the real packages which might be around 400-500 MB in size.
3. Set up Hacker Keyboard.
4. Configure Kali Services, such as SSH.
5. Set up custom commands.
6. Initialize the Exploit Database.
IMPORTANT LINKS:
1. TWRP
2. KaliLinux NetHunter Github Wiki
3. KaliLinux NetHunter Website
4. Source for harpia: https://github.com/tywinlannister7/nethunter-devices
XDA:DevDB Information
Kali Linux Nethunter v1.0 [Kali v2.0 / Backtrack 5] [osprey], ROM for the Moto G 2015
Contributors
althafvly
ROM OS Version: 7.x Nougat
Version Information
Status: Testing
Created 2017-07-22
Last Updated 2017-07-22
althafvly said:
MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
Click to expand...
Click to collapse
It would be useful if it said whether this device supports it or not, since it's a device specific thread it does not make sense to say "only on certain devices".
Awesome work!!!!!
Can we expect this for merlin
thanks for bringing nethunter for osprey but it has many bugs . Almost all the apps (nethunter app) force close when i open them..
please fix it and thanks again for this
thank you so much,i was waiting for this, please provide minimal chroot , i tried in paranoid rom but it stopped working cause downloading of chroot via kali breaks cause of slow net and pausing not possible, please upload it in Androidfilehost,
Can it be used with UD kernel? Or only LinageOS 14.1?
Edit: Anyways, I am going to try both ways when I've got time
Nikos dima said:
thanks for bringing nethunter for osprey but it has many bugs . Almost all the apps (nethunter app) force close when i open them..
please fix it and thanks again for this
Click to expand...
Click to collapse
Yup, I can confirm this, most apps force closes.
There is absolutely no problem here. I'm running Lineage OS 14.1 with Open GApps and this Kali Linux package. Installed chroot perfectly, I'm even running VNC server. The only thing that doesn't work is hacking Wi-Fi networks with a USB adapter but that's because the Kali Kernel still hasn't been ported yet. My device is Osprey XT1541 (2GB RAM and 16 GB of storage). I even posted some screenshots there:
I just have to say, if you reboot your phone and Nethunter Terminal keeps crashing, don't worry. Just wait 2-5 minutes and everything is going to be OK. If it still doesn't work, try opening Terminal Emulator and type in "bootkali". If that doesn't work too, try installing BusyBox from the Play Store.
There are the ROMs on which I confirm that Kali works with default kernel:
Lineage OS 14.1
CyanogenMod 13
Paranoid Android 7.2.3
Dirty Unicorns (7.1.2 Nougat)
Will it work on Mokee rom ?
I almost did everything like installing busy box in the xbin directory and trying to bootkali from the local terminal
The thing is even the local terminal keeps crashing
The ROM I'm using is cm14.1
Plz find a solution
Is there a way I can install Kali Linux in my merlin over a nougat rom??
Plz help...:crying:

[EOL][KERNEL][G935F]Nethunter for S7 Edge LineageOS 14.1

End of Life Nethunter Kernel for Samsung Galaxy S7 (SM-G935F/FD) LineageOS 14.1 ​
Code:
I am not responsible for bricked devices.
If you going to flash it, you accepted it.
Of course your warranty is void after flashing LineageOS 14.1
This kernel is only for hero2lte . If you have Flat version go here
FEATURES:
BadUSB
HID gadget keyboard/mouse (with possibility to temporarily disable)
DriveDroid
USB WiFi, mac80211 (Monitor mode, packet capture, packet injection) [Compatibility List]
Ethernet
F2FS
Bluetooth HCI USB support
RTL-SDR DVB support
Nexmon firmware bcm4359 monitor mode + packet injection, packet capture(partially)
Nexmon firmware bcm4359 native monitor mode, no packet injection, buggy
Extra:
Boeffla wakelock blocker v1.10
Wireguard
Download:
Latest version G935F here.
Installation:
Here isn't AiO package yet...
1. TWRP Backup your ROM
2. Flash NethunterKernel_LineageOS14.1_*.img
3. Flash latest Magisk
4. Install busybox can be one from Magisk repository
5. Install Magisk Nethunter module from repository
6. Install kalifs-armhf-*.tar.xz by Nethunter manager
7. Extract Nethunter_Binaries.7z and binaries to folders:
Firmwares: system/etc/firmware and give permissions to every file rw-r--r--
hid-keyboard binary: system/xbin/ and give permissions to it rwxr-xr-x
8. Reboot
Now you have Nethunter on your LineageOS 14.1.
EXTRA:
1. If you want to try monitor mode with your bcm4359 FIRST MAKE BACKUP your firmware in /system/etc/wifi/bcmdhd_sta.bin_c0 than you can install Nexmon_Binaries.7z like Nethunter_Binaries.7z. Modded firmware have troubles to connect to wifi network so use it only when you want monitor mode.
2.In Utilities.7z are wifi testing tools binaries like aircrack-ng compiled from source of nexmon
Screens:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
XDA:DevDB Information
[KERNEL] [G935F] Nethunter for LineageOS 14.1, Kernel for the Samsung Galaxy S7 Edge
Contributors
Wirusx
Source Code: https://github.com/Svirusx/NetHunter-s7-kernel-LineageOS14.1
Kernel Special Features:
Version Information
Status: Beta
Created 2019-01-15
Last Updated 2019-06-24
CHANGELOG
2019-06.24 - v1.5
added wireguard
added rtl8187 patch
added possibility to disable hid patch
added bluetooth carwhisperer fix
added boeffla wakeblocker
updated nethunter_defconfig
2019-02-25 - v1.4
Added missing drivers like SUNRPC, NFS v4 etc.
Removed unnecessary drivers.
hero2lte have two versions because of touchscreen problem.
If touchscreen doesn't work in test1 try test2.
2019-01-15 - v1.3
Added support G935F
2019-01-12 - v1.2
Added some Nethunter drivers:
System V IPC
Netfilter
TCP Cubic
Bridge
CD-ROM/DVD Filesystems
2019-01-11 - v1.1
Added:
F2FS partition support
Bluetooth HCI USB support
RTL-SDR DVB support
2019-01-10 - v1.0
Initial release
Added:
HID gadget keyboard/mouse support
DriveDroid support
USB WiFi, mac80211 (Monitor mode + packet injection)
partially working nexmon firmware
Reserved
I have a s7e g935f, with LineageOS 14.1 Rom, working, but when i try to flash NethunterKernel_LineageOS14.1_*.img and it boots back up the screen touch does not work, buttons on phone work but not the screen? any thoughts?
zuruikyubi said:
I have a s7e g935f, with LineageOS 14.1 Rom, working, but when i try to flash NethunterKernel_LineageOS14.1_*.img and it boots back up the screen touch does not work, buttons on phone work but not the screen? any thoughts?
Click to expand...
Click to collapse
Do you have flashed G935F_NethunterKernel_LineageOS14.1_v1.3? It's look like you flashed G930F version hmm.
zuruikyubi said:
I have a s7e g935f, with LineageOS 14.1 Rom, working, but when i try to flash NethunterKernel_LineageOS14.1_*.img and it boots back up the screen touch does not work, buttons on phone work but not the screen? any thoughts?
Click to expand...
Click to collapse
+1
zuruikyubi said:
I have a s7e g935f, with LineageOS 14.1 Rom, working, but when i try to flash NethunterKernel_LineageOS14.1_*.img and it boots back up the screen touch does not work, buttons on phone work but not the screen? any thoughts?
Click to expand...
Click to collapse
peachman said:
+1
Click to expand...
Click to collapse
I added new test release could you try it and write if it helped for touchscreen? TEST_G935F_NethunterKernel_LineageOS14.1_v1.3.img
Will test when i get home from work. Thank you
Svirusx said:
I added new test release could you try it and write if it helped for touchscreen? TEST_G935F_NethunterKernel_LineageOS14.1_v1.3.img
Click to expand...
Click to collapse
The Test_G935F works touchscreen is working, question for you I am stuck on step 6, how do i install this, do I load it on the phone and install the zip thur TRWP?
zuruikyubi said:
The Test_G935F works touchscreen is working, question for you I am stuck on step 6, how do i install this, do I load it on the phone and install the zip thur TRWP?
Click to expand...
Click to collapse
kalifs-armhf-full.tar.xz or kalifs-armhf-minimal.tar.xz you need to rename to kalifs-full.tar.xz or kalifs-minimal.tar.xz and copy it to internal storage than you open Nethunter app > Check Chroot Manager > Install chroot -> from sdcard -> choose your version and its begin installation.
Hello! Help guys. I have a phone with android 7.0 out of the box. I want to put LineageOS 14.1. Tell me this is the only way to install NetHunter on LineageOS 14.1?
Ser9ik said:
Hello! Help guys. I have a phone with android 7.0 out of the box. I want to put LineageOS 14.1. Tell me this is the only way to install NetHunter on LineageOS 14.1?
Click to expand...
Click to collapse
No, this is only example. You can find in this forum another nethunter packages like here Only you need to have special kernel to use some functions of Nethunter.
Thanks for this kernel! Gonna try this in a couple of days and maybe I'll make a nougat viperos cuz it is a lot better than Los
The kernel is good smooth no reboots keep it up bro iven usb keyboard is working
Ethernet is supported, but how can I use it? In the tab "more connection settings" I cant see an option to enable ethernet? When I connect my OTG ethernet adapter nothing happens.

[EOL][KERNEL] [G935F] Nethunter for LineageOS 16.0 ROM

End of Life WirusMOD Nethunter Kernel for StockOreo, StockPie, LineageOS 1.6, TreblePie
Samsung Galaxy S7 / Edge ​
Code:
I am not responsible for bricked devices.
If you going to flash it, you accepted it.
Of course your warranty is void.
This thread is only for hero2lte . If you have Flat go here
Nethunter Features:
BadUSB
HID gadget keyboard/mouse (with possibility to temporarily disable)
DriveDroid
USB WiFi, mac80211 (Monitor mode, packet capture, packet injection) [Compatibility List]
support rtl88xxau USB WiFi
Ethernet
F2FS
Bluetooth HCI USB support
RTL-SDR DVB support
Extra:
Boeffla wakelock blocker v1.10
Wireguard
Download:
Latest version G93XF here.
Old download link G93XF here.
Installation:
1. TWRP Backup your ROM
2. Flash Nethunter Kernel
3. Flash latest Magisk
4. Install busybox can be one from Magisk repository
5. Install Magisk Nethunter module from repository it have all apps which are needed to get fully working Nethunter (Another version of Nethunter apk link)
6. Install kalifs-armhf-*.tar.xz by Nethunter manager
7. Extract Nethunter_Binaries.7z and binaries to folders:
Firmwares: system/etc/firmware and give permissions to every file rw-r--r--
hid-keyboard binary: system/xbin/ and give permissions to it rwxr-xr-x
8. Reboot
Loadable modules:
Modules_Nethunter_WirusMOD_v1.7.7z extract only modules for your version of kernel.
In every kernel folder are modules and firmware. You need only modules which you want to use.
For example if you don't want use tuners and dvb-frontends. Don't load modules from /modules/drivers/media tuners and dvb-frontends
In firmware are compiled firmwares for some of modules to use they you need to copy they to system/etc/firmware.
basic commands:
insmod 88XXau.ko - load module
rmmod 88XXau.ko - unload module
lsmod - list loaded modules
Some modules depend on another modules. If you want load rt2800usb.ko, you need first load rt2800lib.ko.
Another way to load modules is Module Loader
Copy modules to storage and choose modules which you want to load (load they more than 1 times, this apk load modules from up to down it don't look at dependence from modules)
Extra:
In Utilities.7z are wifi testing tools binaries like aircrack-ng(Not needed for Nethunter only for test tools direct from android without Nethunter)
DriveDroid without bugs made by disabling HID Patch:
To disable HID Patch: use this command in terminal: "echo Y > /sys/module/g_android/parameters/hid_disable"
Changing mode isn't instant after changing module status. Use DriveDroid (mount iso -> dismount) to active hid_disable.
To enable HID Patch: "echo N > /sys/module/g_android/parameters/hid_disable" and use DriveDroid like with disabling HID Patch.
HIDPatchSwitch this is simple script which can switch between HID enabled and disabled and show changed status.
Screens:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Credits:
morogoku for his MoRoKernel source
ananjaser1211 for his USB modes fix with OneUI based ROMs
Nethunter creators for the best portable penetration testing tool.
XDA:DevDB Information
[KERNEL] [G935F] Nethunter for LineageOS 16.0 ROM, Kernel for the Samsung Galaxy S7 Edge
Contributors
Svirusx
Source Code: https://github.com/Svirusx/Nethunter-s7-kernel-LineageOS16.0
Kernel Special Features:
Version Information
Status: Stable
Created 2019-04-14
Last Updated 2020-04-08
CHANGELOG
2019-09-15 - v1.3
Update to kernel source to 10.09.2019.
2019-06-11 - v1.2
Update kernel source to 09.06.2019.
2019-05-14 - v1.1
Update kernel source to 12.05.2019.
2019-04-14 - v1.0
Initial release
Reserved
thank you very much .. your work is really appreciated .. respect
marsdroid
using a s7 edge live demo unit.. "sm-g935x" with "f oreo" rom as base.. now lineage 16.0 from ivan. and your kernel.
Hello,
Any of you have a link to LineageOS 16.0 build 21? I've tried to lookup in the thread but didn't find anything. Could you help me out?
Best regards

[UNOFFICIAL][RECOVERY] TWRP 3.5.1 for Galaxy J5 PRO

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
TWRP is an open source, community project. A custom recovery is used for installing custom software on your device. This custom software can include smaller modifications like rooting your device or even replacing the firmware of the device with a completely custom “ROM” like LineageOS or OmniROM.
Disclaimer
I'm not responsible if something went wrong on your phone(Usually nothing goes wrong). You are doing this on your own responsibility. Rooting your phone may void warranty so don't root your device unless you know what you are doing.
Downloads
MEGA : TWRP_3.5.1
Flashing
Recovery : Download Recovery.img file from link and flash it through your current recovery in recovery Partiton
ODIN : else pack recovery img in .tar and flash it through ODIN in AP.
Changelog
Fixes
Build compilation in 7.1 tree - CaptainThrowback
SAR: Don't follow symbolic links for block devices - bigbiff
SAR Update script name for clarity - CaptainThrowback
Wrappedkey support running only on FBE devices - CaptainThrowback
TWRP App log information reduced - epicX67
Refresh details after system wipe and adb sideload - AdrianDC
Chinese translation updates - betaxb
Support keymaster 2 - PeterCxy
add tzdata to TWRP for timezones - CaptainThrowback
ParitionManager: support delayed adopted storage mount - PeterCxy
Support to start terminal from file manager directory - AndroiableDroid
Nano support - nebrassy
Add nano support to open files from file manager - CaptainThrowback
Include new magisk apk support to be installed by TWRP - ianmacd
Add support to change directory name where TWRP stores backups - epicX67
Add bash support - not the default shell - DarthJabba9
ORS support to format data - AdrianDC
Add support to flash both slots when flashing an image - epicX67
NL translation updates - ianmacd
Cleanup
Installation cleanup - remove dupe PackageExtractFn - klabit87
Remove logd-reinit service - CaptainThrowback
Fixes
Restore system root context - bigbiff
Only include keymaster 2 if tree supports it - CaptainThrowback
Strip lines containing '--' in language_helper.py - ianmacd
Unlocalized string fix - ianmacd
Credits
all goes to @Astrako for his hard work with all exynos7870 device trees without him this would not be possible
Device trees : https://github.com/samsungexynos7870
7870 Group : https://t.me/samsungexynos7870
PrishSupport : https://t.me/prishsupport
PrishChannel : https://t.me/prishupdates
TWRP : https://twrp.me/site/update/2021/03/17/twrp-3.5.1-released.html
Note : Test it and if you found any issue do let me know by PMing me on telegram @neel0210 .
J530fn installed, runs, so far no problems
Decryption works?
Nope,
Works fine in principal, but could't mount vendor-partition on my SM-J530F.
Does someone have a solution?
So ... I have now tested the TWRP intensively.
WORKS PERFECTLY!
MANY THANKS neel0210 !!!
Only the error message with the vendor partition bothers me.
I thought we had a vendor partition on our device?
Anyway ... dear neel0210, if in doubt, you can't turn off the attempt to mount the vendor partition?
Broken link
Here it is!

[KERNEL][RMX1971] Nethunter for Realme 5 Pro

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
ALYNX Nethunter Kernel for REALME 5 PRO - [Stock] / Compatible with other android 12 roms (STILL TESTING)
What is Nethunter ?
Kali NetHunter is a free & Open-source Mobile Penetration Testing Platform for Android devices, based on Kali Linux.​
Click to expand...
Click to collapse
Code:
I'm not responsible for bricked devices, dead SD cards.
Do some research if you have any concerns about features included in this Kernel.
About the kernel :
The kernel is based on stock config doesn't contain any custom kernel specific features. it only contains drivers and fixes required for nethunter to fully work.
Features:
HID gadget keyboard/mouse
USB WiFi, mac80211 (Monitor mode, packet capture, packet injection) [Compatibility List]
RTL88XXAU USB WIFI Support
RTL8188EUS USB WIFI Support
ATH9K_HTC USB WIFI Support
Ethernet Support
Bluetooth USB Support
SDR Support
BadUSB
Installation:
Boot the device into Twrp recovery .
Backup your current kernel inside Twrp
Download Alynx-RMX1971.zip
Flash the zip
Install Busybox
Download Wireless_firmware module, open Magisk and install the zip as Magisk module
Install Nethunter store
Install Nethunter app & Nethunter terminal from Nethunter store
Open Nethunter app & Download the full chroot kalifs within the app and let the app setup everything. After it finishes it'll start the chroot automatically.
Update the sources with apt-get update && apt-get upgrade in the chroot using nethunter terminal
Reboot the device
Note: if nethunter app crashes open any android terminal in su environment and paste the following.
Code:
pm grant com.offsec.nethunter android.permission.ACCESS_FINE_LOCATION
pm grant com.offsec.nethunter android.permission.ACCESS_COARSE_LOCATION
pm grant com.offsec.nethunter android.permission.READ_EXTERNAL_STORAGE
pm grant com.offsec.nethunter android.permission.WRITE_EXTERNAL_STORAGE
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_SU
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH
pm grant com.offsec.nethunter com.offsec.nhterm.permission.RUN_SCRIPT_NH_LOGIN
Screenshots:
TPLINK WN722N V3 TESTED ON ANDROID 12 ROM RMX1971
Extra:
if you want to replace nethunter terminal with termux (not completely nethunter main app will still launch nethunter terminal everytime for any operation but you can access kali chroot environment from termux.
(i know nethunter terminal sucks)
Follow these steps to access the environment from termux:
Install termux from f-droid or from nethunter store
Open termux and install root repo using pkg update && pkg install root-repo tsu wget
Download the script from termux wget https://raw.githubusercontent.com/name-is-cipher/boot-nethunter/main/install_boot-kali.sh
chmod +x install_boot-kali.sh && ./install_boot-kali.sh
let it setup everything.
restart termux and type boot-kali to access the nethunter chroot environment
if you like my work give this post a like : )
Credits:
- Team Kali​
XDA:DevDB Information
Nethunter Kernel for RMX1971
Contributors: V3rB0se
Source Code: https://github.com/V3rB0se/Alynx-RMX1971
Version Information
Status: Stable
Stable Release Date: 02/08/2022
Created 09/08/2022
Last Updated 02/08/2022
I tried it but hid didn't work on nethunter and rucky app = kernal not supported + My android is 13 ROM is ricedroid suggest if there is rom most comfortable
Abdoelrhman said:
I tried it but hid didn't work on nethunter and rucky app = kernal not supported + My android is 13 ROM is ricedroid suggest if there is rom most comfortable View attachment 5733067
Click to expand...
Click to collapse
yeah, rucky is not working in newer version of android
Can I use tp-link ac600 with it?
If yes then how to set it up
Parks18 said:
Can I use tp-link ac600 with it?
If yes then how to set it up
Click to expand...
Click to collapse
i don't know ask such questions in the telegram group of kali nethunter. i'll update the kernel if there's a support for it.
Hi, man, I don't want to seem intrusive, but could you build a kernel NetHunter for realme 6 pro as well. android 12
can you please tell me how to build nethunter kernel for realme 3 pro ?
i searched all over the internet but couldn't find for realme 3 pro. And i don't know realme 3 pro code name and the location of defconfig file on the realme 3 pro kernel source code.
If you tell me location of defconfig file of realme 3 pro on its original source code it will be super helpful
Thanks

Categories

Resources