[ROM][Official] Kali NetHunter for the TicWatch Pro 3 WearOS - Wear OS Software and Hacking General

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I present to you: Kali NetHunter for the TicWatch Pro 3 WearOS
Kali NetHunter is an Android ROM overlay that turns an ordinary phone into the ultimate Mobile Penetration Testing Platform. Now it's available for your smartwatch with some limitations.
The overlay includes a custom kernel, a Kali Linux chroot, an accompanying Android application, which allows for easier interaction with various security tools and attacks.
Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, WPS attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page.
NetHunter is an open-source project developed by Offensive Security and the community.
All variants are supported (TicWatch Pro 3 GPS/LTE/Ultra GPS/Ultra LTE) with a generic installer as of now. This means there's no custom kernel yet, however all the features work from the TicWatch Pro, except BadUSB.
## 1. Unlock the bootloader
- Connect your watch to your PC with a DIY USB cable or a 3D printed data dock, and fire up a terminal.
- If you have set up your watch on the phone you can access settings, otherwise hold both buttons for a few seconds on the welcome screen.
- Enable developer settings by going to System -> About -> tap Build number 10 times
- Enable ADB, re-plug USB and accept debug from PC
- Reboot into bootloader with `adb reboot bootloader` from the terminal
- Unlock bootloader with `fastboot oem unlock`
## 2. Flash TWRP, WearOS image, Magisk, dm-verity disabler
Please note Magisk 24.3 is recommended.
- Again enable ADB, and reboot to bootloader with `adb reboot bootloader`
- Disable vbmeta verification: `fastboot --disable-verity --disable-verification flash vbmeta vbmeta.img`
- Flash recovery `fastboot flash recovery recovery.img`
- Boot into recovery by selecting it with the side buttons (switch with bottom one, select with upper button)
- Select Wipe -> Advanced Wipe -> select Format Data
- Reboot to recovery
- Select "Install -> ADB Sideload"
- Flash OneOS with `adb sideload`
- Flash Ultra addon with `adb sideload` only if you have an Ultra watch
- Flash Mobvoi Apps with `adb sideload`
- Make a copy of your Magisk apk file to Magisk-v24.3.zip
- Flash Magisk with `adb sideload`
- Flash Disabler with `adb push Disable_Dm-Verity_ForceEncrypt_11.02.2020.zip /sdcard/` and Install via TWRP
- Reboot & do initial setup (pair with your phone through WearOS app)
## 3. Finalise Magisk app to finish the rooting process
- Finalise Magisk installation with app `adb install Magisk-v24.3.apk`
- Launch Magisk Manager
- You might want to disable auto-update, set grant access in auto response, and disable toast notifications for easier navigation in the future
## 4. Install NetHunter
- Reboot to recovery
- Select Install -> ADB Sideload
- Flash NetHunter image with `adb sideload`
- Reboot
- Start NetHunter app & chroot
- Reboot
## 5. Set NetHunter watch face
- Install Facer onto your phone and watch from Play Store
- Search for NetHunter
- Select & Sync
### Enjoy Kali NetHunter on the TicWatch Pro 3
## Downloads
- Magisk
- TWRP images
- OneOS ROM, Mobvoi apps, Ultra addon
- vbmeta image
- dm-verity and forceencrypt disabler
- NetHunter zip
## Additional recommended apps
- TotalCommander: useful for selecting eg. a Ducky script, use "adb install" method
Download link: https://www.totalcommander.ch/android/tcandroid323-armeabi.apk
## Supported features
- Kali services
- Custom Commands
- MAC Changer
- HID Attacks
- DuckHunter
- Nmap Scan
- WPS Attacks
## Upcoming features (not guaranteed)
- Nexmon, as the chipset is supported, needs some time
- Bluetooth Arsenal (internal bluetooth via blueblinder, as carwhisperer fails to r/w when SCO channel is connected)
- Router Keygen (to be optimised)
- Hijacker (if nexmon succeeds)
- Mifare Classic Tool (need to build OS with android.hardware.nfc enabled)
## Hardware limitations
- Power resource is not enough for any external adapters, although this kernel might support Y cable in the future!
WearOS version:
XDA: DevDB Information
Kali Nethunter, Kernel & ROM for the TicWatch Pro 3
Contributors
@yesimxev
Source Code: https://gitlab.com/kalilinux/nethunter/

Reserved

Thank you so much for this
Is it working on twp3ultra?
And which stockrom img incase anything went wrong.
Thank you in advance

nelikp said:
Thank you so much for this
Is it working on twp3ultra?
And which stockrom img incase anything went wrong.
Thank you in advance
Click to expand...
Click to collapse
Yes it is, use rover for Ultra LTE and rubyfish for Ultra GPS. Link for stock ROMs is above in the OneOS dowbload page, scroll down for stock

yesimxev said:
Yes it is, use rover for Ultra LTE and rubyfish for Ultra GPS. Link for stock ROMs is above in the OneOS dowbload page, scroll down for stock
Click to expand...
Click to collapse
Thank you so much
Waiting my cable from alixpress
May i have the oneos download page sir

nelikp said:
Thank you so much
Waiting my cable from alixpress
May i have the oneos download page sir
Click to expand...
Click to collapse
Everything is there. Just scroll

Achi Shukuteki said:
Everything is there. Just scroll
Click to expand...
Click to collapse
Thanks sir
I found it
Here
Download •OneOS Wear•
wear.revtechs.me

any chance we’ll see a more vanilla rom for those of us that aren’t interested in network penetration etc, would be awesome to see a rom that could re-enable the compass in the ticwatch pro 3 ultra for example

kerode said:
any chance we’ll see a more vanilla rom for those of us that aren’t interested in network penetration etc, would be awesome to see a rom that could re-enable the compass in the ticwatch pro 3 ultra for example
Click to expand...
Click to collapse
I think the general forum would be more appropriate for that question. I was interested in the same thing, though.

kerode said:
any chance we’ll see a more vanilla rom for those of us that aren’t interested in network penetration etc, would be awesome to see a rom that could re-enable the compass in the ticwatch pro 3 ultra for example
Click to expand...
Click to collapse
Well that goes onto my list next to the enable android.hardware.nfc + android.hardware.sensor.compass in the ROM for building OneOS if it's not disabled in kernel

Edited:
My bad, kali chroot needs to be run first. Succes now
Just flashed nethunter to my twp3 but when i start nethunter app somehow there was a pop up saying "chroot is not yet installed".
Should i sideload nethunter zip again?
Can i flash zip file via twrp after push the file to the watch?.
Thanks

enter2explore said:
Edited:
My bad, kali chroot needs to be run first. Succes now
Just flashed nethunter to my twp3 but when i start nethunter app somehow there was a pop up saying "chroot is not yet installed".
Should i sideload nethunter zip again?
Can i flash zip file via twrp after push the file to the watch?.
Thanks
Click to expand...
Click to collapse
If all the steps were followed correctly, then show me /tmp/recovery.log after flashing again. Use pastebin please

yesimxev said:
If all the steps were followed correctly, then show me /tmp/recovery.log after flashing again. Use pastebin please
Click to expand...
Click to collapse
Hi @yesimxev
Already solved, it just the matter i forgot to start chroot. Work normally now.
Thanks

yesimxev said:
Well that goes onto my list next to the enable android.hardware.nfc + android.hardware.sensor.compass in the ROM for building OneOS if it's not disabled in kernel
Click to expand...
Click to collapse
awesome mate, looking forward to it!!

managed to install and chroot
but how to wps attack?
any guide would appreciate
TIA

Im stuck when running command fastboot oem unlock all I get it waiting for any device and thats it.

nemzzy668 said:
Im stuck when running command fastboot oem unlock all I get it waiting for any device and thats it.
Click to expand...
Click to collapse
Check the connection.

Achi Shukuteki said:
Check the connection.
Click to expand...
Click to collapse
Connewction is fine, ADB works, windows then also detects it when it reboots. Just fastboot that sticks. Using Windows 11

nemzzy668 said:
Connewction is fine, ADB works, windows then also detects it when it reboots. Just fastboot that sticks. Using Windows 11
Click to expand...
Click to collapse
Oh hmmm. Im on Win10. I'll leave it to the forum with that one. Unless you want to use a live Linux distro, grab the tools, you already have the files, and try that way.

Run fastboot devices first after reboot to bootloader..make sure ur watch detected.
Otherwise check ur driver

Related

[TOOL] Lx Multi Tool v1.3.2 [WIN/LIN/MAC][Unlock/Recovery/Stock/Kernel/More]

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
It has LINUX/UNIX and MAC support!
​
Due to the fact that there is another tool for Android called Android Multi Tools, I decided to rename this one to Lx Multi Tool, future releases will go under this name.
Features: ​Fastboot
- Unlock/Lock Bootloader
- Flash Recovery Menu (you can choose and add recoveries) - TWRP 2.8.7.1 Included
- Flash any partition (Flashing submenu)
- Flash full Stock images (you can choose and add images)
- Erase partitions (you can choose which of the partitions)
- Reboot (you can choose again...)
Adb
- Sideload .zip files (you can choose and add .zip files) - SuperSU v2.65 (Systemless!) included
- Backup (you can choose the name and place for your backup)
- Restore (you can choose your backup)
- Version (it just shows the version of your adb binaries) - platform-tools 23.1 included
- Logs (DMESG and Logcat)
- Screenshots (you can directly take screenshots to your PC with no Root)
- Reboot (lots of choices)
Others
- Refresh and delete files/folders from menus (Right click or key F5 and Del)
- Open tool folders from the menus (to add your own kernel/stock image/recovery/sideload zip files)
- Tab key support for easier keyboard navigation
- Tool-tips for all buttons
- Check for updates
- Link to xda-thread (here)
​
Download links: ​Windows x86|x64 - Linux x64 - MAC x64
All released versions can be found here.
​
[ROOT] Use SuperSU 2.62 or higher from here systemless for 6.0.1 and above.​
Known bugs/limitations: ​ - For partition Flashing, it is recommended(mandatory?) to do a reboot-bootloader if you want to flash multiple partitions one after the other. (according to the Google flashing scripts) (Implemented in 1.2.1)
- For return to stock, the tool will be stuck after your phone successfully boots, you need to reboot to fastboot again in order to flash the Radio and finish the full return to stock. (Fixed in 1.2.0)​
Changelog: ​
Check the changelog for each release here.
​
Tutorials/FAQ: ​
Q: How do I get in bootloader/fastboot mode?
Turn off the phone and turn it on by using Volume down + Power key.
Q: How do I check for updates in your tool?
Follow the instructions in the screen below.
Q: Where can I find the device driver to install it for windows?
Click here, download the driver and run the setup.
Q: How do I root my stock phone?
- Unlock bootloader.
- Flash recovery.
- Use SuperSU 2.62 systemless or higher from here.
(Usually the latest version upon tool release is included in the Sideload folder of the tool, you can either sideload it or copy it to recovery and flash it manually)
Q: I get an error "Cannot open file" on MAC, what should I do?
Open the terminal, go to your application path and paste this command:
Code:
chmod +x LxMultiTool.app/contents/macos/*
Q: What do I need to do in order to be in Fastboot or in ADB mode.
Fastboot mode will be detected only while being in bootloader.
ADB mode will be detected from Recovery (custom) and actual ROM with USB debugging active.
Refresh button needs to be used in order to check for what mode you are in.
Q: Are there any other software that I need to install in order to run this tool?
On Windows and MAC everything is bundled, so nothing needs to be installed, just run.
On Linux you need to install from your package manager libQt5Core, libQt5Widgets, libQt5Gui, libQt5Network.
If it's not enough, use ldd LxMultiTool in terminal to find out what you're missing from your environment.
Q: I have an yellow/orange/red text screen during boot, what's that?
When you unlock you usually get the Orange screen and it's normal, but if you really want to know what's this about, give a reading to this.
Q: Hey, my device is not detected, why?
On windows, you need to manually install the USB drivers, they are not included and probably they won't be included in this tool.
Also, make sure you click the connection Refresh button after connecting the device to your PC.
Q: What do i need to do in order to install a custom ROM?
1. Unlock Bootloader.
2. Flash a custom recovery of your choice.
3. Flash an insecure kernel (boot).
4. Flash custom ROM with no problems via recovery.
All those things are found and can be done via this tool.
Q: Hi, i just downloaded this tool, how do i use it?
First, extract the folder somewhere.
After that, run LxMultiTool.exe on windows by double clicking it, LxMultiTool on linux and the same on mac.
Q: Do I need android-sdk installed or something else?
No! This tool uses it's own supplied binaries for adb and fastboot, if you have android-sdk installed it will be ignored anyways.
This tool is fully portable and stand-alone.
Q: I get an error while trying to unlock the bootloader -> FAILED(remote: oem unlock is not allowed), what now?
Starting with Android 5.0, you need to enable Bootloader Unlocking from the developer settings, in order to do that, follow these steps:
- Enable Developer options
- Enable USB Debugging
- Look for the ‘OEM Unlock’ Option and toggle it.
Q: How do I use the return to stock feature?
First download the latest package from here, then extract the contents (there is an archive in the archive) untill you get the a folder like angler-mda89d
that contains the images, that folder needs to be copied in the /Data/StockPackages folder in order to be visible.
Easier steps -> Get your device in bootloader -> Start the tool -> Hit refresh -> go to Stock -> hit open folder -> copy the extracted folder with the name angler-xxxxxx in there, hit F5 or Right-click + Refresh -> you should see the folder in there like in the following screenshot. Thanks @ursa08 for the screenie.
Q: How do I enable Developer options?
- Launch the Settings
- Scroll Down and Tap on About Phone(or About Device)
- Locate the Build Number Section
- Tap on the Build Number Option 7 Times
- Go Back to the Main Settings Page
- Scroll Down and Tap on Developer Options
Q: Hi, i just bought a phone what should i do now?
Well, you firstly need to unlock your bootloader...
Q: What is logcat?
Well, you can pretty much use google for that answer, but to put it short, is that thingy that tells you what is happening behind the scenes of your phone.
It is usually used for debugging and entertaiment(?).
When you report an error/bug to somebody, it will be a blessing to provide a logcat (logfile)!
Q: What is a Custom Recovery and why do i need one?
A custom recovery is that thingy that let's you flash .zip files, use your logic and you wil get it why you need one.
Q:There are others guides/tutorials out there, should i check them instead of this?
If you manage to get things done using this one, no, otherwise yes, note that some could be outdated...
Q:What is sideload and how do I use it?
Sideload is a function from adb that let's you flash a zip file while in recovery directly from your PC.
Please note that you need to be in sideload mode on your recovery before doing this.
To enter sideload mode, in TWRP go to Advanced -> ADB Sideload -> Swipe to sideload​
Sources: ​The official and original repository can be found here.​
Bug reports/Feature requests: ​If you have any bug, or you consider a feature to be a must-have, please use the issue functionality on github for more traceability here.​
Licensing: ​Please note that this tool is open source and released under GPL v3 licence which can be read here.
Make sure you understand at least the short version of the license that's provided in the tool before using it or before contributing/forking and other related stuff.​
Tech and stuff: ​Some additional marketing for stuff used in this tool
Qt - An awesome cross-platform IDE
Vmware - For letting me test this tool on all platforms (Linux and MAC).
Icons8 - A nice platform for good-looking FREE icons. (Big thanks!)
UnixUtils - For the sed utility for Windows.
AndroidFileHost - For the awesome file-management platform for developers.​
Donations: ​Even though this tool is provided free of charge, full open-source, donations are very welcome to support the future development of this tool and to buy me a beer while coding future improvements on it.
This section will also include the hall of fame for donors, as well as on the github repository.
Special thanks for donations:
- @john7760
​
Disclaimer:​I will not be responsible for smashed screens, bricked phones or any other things that you can accuse me of, i've done this tool to help people, use it at your own risk and consider giving a THANKS if you use it and like it.​Please consider leaving some feedback, what to improve, what could be done better, what annoys you, it really helps me improve the tool.
Also, to avoid useless threads on general, Q&A or useless posts, please read the FAQ section upside, it's like a Mini-Guide!
Nice! Quick question, will this work for other phones other then nexus 6. Like sam note 3
Sent from my Nexus 6 using Tapatalk
warfenix said:
Nice! Quick question, will this work for other phones other then nexus 6. Like sam note 3
Sent from my Nexus 6 using Tapatalk
Click to expand...
Click to collapse
This tool has support only for 4 nexus devices, some features might work, some not, it's all down if the commands that are used by the tool are supported by the other device.
For example all fastboot flashing commands use the command:
Code:
fastboot flash <partition> <file_to_flash>
The same goes for the rest of the commads, I will try to investigate more and see if it's worth it to create a Sam Note 3 package for the tool.
The adb features should work though.
That would be awesome as i run only linux. And cant seem to get odin or heindall to work. Tried multiple times. So if there is something you could cook up. Amazing sauce. Its a att note 3. Either way. This will work great for my n6
Sent from my Nexus 6 using Tapatalk
New update with some fixes that should have been implemented a long time ago...
- Fixed Sideload flashing
- Enabled Recovery rebooting
- Fixed open folder for Stock menu
Wow - Great work on this. Love the fact that it supports mac/nix as well.
Nice! Keep up the good work.
Thank you!
This still the go to way to unlock and flash twrp? I'm on latest stock marshmallow.
bL33d said:
This still the go to way to unlock and flash twrp? I'm on latest stock marshmallow.
Click to expand...
Click to collapse
Yes, you can unlock the bootloader and flash TWRP recovery with it.
Support to Nougat?
ipan gulopuan said:
Support to Nougat?
Click to expand...
Click to collapse
Nougat should work with no problems, I personally used it to flash bootloader, radio and vendor images for Nougat update.

Kali NetHunter For HybridRom Concept EditioN

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
IF YOU DON'T KNOW WHAT IS NETHUNTER OR KALI(BACKTRACK) LINUX YOU DON'T NEED IT.
DISCLAIMER: I, ASSUME NO RESPONSIBILITY FOR ANY ILLEGAL ACTIONS AND/OR DAMAGE PERFORMED OR CAUSED BY INDIVIDUALS WHO USE IT FOR PURPOSES WHICH IT IS NOT INTENDED TO BE USED.
DESCRIPTION:
The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. NetHunter is an open-source project developed by Offensive Security and the community.
More info
Kali NetHunter Application
Home Screen - General information panel, network interfaces and HID device status.
Kali Chroot Manager - For managing chroot metapackage installations.
Check App Update - For checking Kali NetHunter Android App updates.
Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
Custom Commands - Add your own custom commands and functions to the launcher.
MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
VNC Manager - Set up an instant VNC session with your Kali chroot.
HID Attacks - Various HID attacks, Teensy style.
DuckHunter HID - Rubber Ducky style HID attacks
BadUSB MITM Attack - Nuff said.
MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
MITM Framework - Inject binary backdoors into downloaded executables on the fly.
NMap Scan - Quick Nmap scanner interface.
Metasploit Payload Generator - Generating Metasploit payloads on the fly.
Searchsploit - Easy searching for exploits in the Exploit-DB
3rd Party Android Applications (WIP)
NetHunter Terminal Application
DriveDroid
USB Keyboard
Shodan
Router Keygen
cSploit
BUGS
The same as on original Nexus 5 version
REQUIREMENTS
Latest HybridRom Concept Edition + Advanced Kernel v2 from this thread. Don't install anything else.
Hands growing from a right place
External WiFi Adapter for Monitor Mode
INSTALLATION
Make sure you've read the requirements
Boot in TWRP
Install what you need with aroma installer.
Wait until process is finished (will take some time to extract packages)
DOWNLOAD
Kernel Sources
XDA:DevDB Information
Kali NetHunter Togari, ROM for the Sony Xperia Z Ultra
Contributors
Uncle Lucifer
Source Code: https://github.com/offensive-security/kali-nethunter
ROM OS Version: 5.1.x Lollipop
Version Information
Status: Testing
Created 2016-03-11
Last Updated 2016-03-11
Reserved
Reserved
Most of the things will work out of the box.while some of the scripts requires modifications, like changing patch and etc.
Unless you don't want to change storage patches, don't upgrade SuperSU binary.
I just figured out that it's somehow breaks symlinks, which can break a lot of scripts.
Also. when you install it, don't pick supersu, may cause a bootloop.
Seems like something is broken in the new supersu update.
Also I did a kernel update.
It includes updates for modules necessary for external wifi and usb attacks support.
I hope that they will soon add our device officially.
I got cannot boot and red LED flashing after flash "Kali NetHunter For HybridRom Concept EditioN" on "HybridRom Concept EditioN V2.0 ". Any step or version wrong? I need to restore factory image now(downloading).
pckeung said:
I got cannot boot and red LED flashing after flash "Kali NetHunter For HybridRom Concept EditioN" on "HybridRom Concept EditioN V2.0 ". Any step or version wrong? I need to restore factory image now(downloading).
Click to expand...
Click to collapse
It may happen if you didn't have advanced kernel v2.
You don't need flash whole rom again.
Just flash boot.img from concept with hotboot and you will have recovery.
Uncle Lucifer said:
It may happen if you didn't have advanced kernel v2.
You don't need flash whole rom again.
Just flash boot.img from concept with hotboot and you will have recovery.
Click to expand...
Click to collapse
oh Thank! I can restart the flashing process now.
Dear developers, can you build your kernel for Samsung Galaxy Tab 3.8.0 SM T311? (Cyanogenmod 13)?
Finally , the nethunter installed into my z Ultra successfully. But it restart when i enable monitor mode with my USB wifi. This problem has not appear in my nexus 5. I already flashed the "kernel update". I will try other USB wifi.
*i have school project about this topic. Thanks for help.
pckeung said:
Finally , the nethunter installed into my z Ultra successfully. But it restart when i enable monitor mode with my USB wifi. This problem has not appear in my nexus 5. I already flashed the "kernel update". I will try other USB wifi.
*i have school project about this topic. Thanks for help.
Click to expand...
Click to collapse
LOL, I was writing an extended essay back in school about wireless packets injection.
I was using nokia n900.
I've got a TP-Link WN721N and monitor mode works fine.
Didn't have any networks around with WEP encryption, so idk about injection.
Phone may reboot, but only if I disconnect external wifi.
And yeah, I enabled drivers, which were avaliable in my sources, so if your adapter is too old, then it might be missing.
Good luck with your project.
Feel free to write,if you need anything.
i find my tp-link lsusb command dut i cant start wlan0 bacause when i type ifconfig its not find my tp-link tl-wdn3200, i use xperia x ultra c6833.anythink what i can do about that?
shadow8 said:
i find my tp-link lsusb command dut i cant start wlan0 bacause when i type ifconfig its not find my tp-link tl-wdn3200, i use xperia x ultra c6833.anythink what i can do about that?
Click to expand...
Click to collapse
Wlan0 is your internal adapter.
Try
Code:
ifconfig wlan1 down
iwconfig wlan1 mode monitor
ifconfig wlan1 up
wlan card not found
Uncle Lucifer said:
Wlan0 is your internal adapter.
Try
Code:
ifconfig wlan1 down
iwconfig wlan1 mode monitor
ifconfig wlan1 up
Click to expand...
Click to collapse
when i type ifconfig wlan1 down i get wlan1 error while getting interface flags: no such device
and iwconfig wlan1 mode monitor i get Error for wireless request "set mode" (8B06) :
shadow8 said:
when i type ifconfig wlan1 down i get wlan1 error while getting interface flags: no such device
and iwconfig wlan1 mode monitor i get Error for wireless request "set mode" (8B06) :
Click to expand...
Click to collapse
Not all wlan adapters are supported, I think you should go to official wiki page and find if your model is supported.
wlan adapter not find
Uncle Lucifer said:
Not all wlan adapters are supported, I think you should go to official wiki page and find if your model is supported.
Click to expand...
Click to collapse
its supported because i already use that with kali my pc.i read its mayby kernel bug and some people download and instal somekind other version because they have samekind broplem.but i want to keep this1.and thx fast reply hopefully i get this work.ps i build y cable also and that giving power tp-link but no luck that1
shadow8 said:
its supported because i already use that with kali my pc.i read its mayby kernel bug and some people download and instal somekind other version because they have samekind broplem.but i want to keep this1.and thx fast reply hopefully i get this work.ps i build y cable also and that giving power tp-link but no luck that1
Click to expand...
Click to collapse
If it works on kali on pc, it doesn't mean that it's going to work on mobile.
It's not bug, just means that it simply does not have drivers for the specific device
Thx.i need,To check if i find drivers.afterall its not many wlan adapters what support monitor Mode.so i am so happy if some1 can say what wlan adapter support Xperia z ultra.and ofg thats need monitor Mode
Its bossible To add More attack software inside romm? Mayby somekind Phone and Bluetooth attack
please create one for xperia sp
electro_nik said:
please create one for xperia sp
Click to expand...
Click to collapse
Instructions are available on the official website.
Compiling it,not harder if is not easier than using it.

[UPDATED][ROM OVERLAY][OnePlus One][Pie]Kali Nethunter[2020.1][22 Feb][Unofficial]

​
A Project By​
Code:
[FONT=Garamond][COLOR=Red][B][SIZE=4][CENTER]*** Disclaimer***[/CENTER][/SIZE][/B][/COLOR][/FONT]
[CENTER][FONT=System]The warranty of this device has ended ages ago but still, [B]please[/B] read this disclaimer.
This thing will break your device [B]HARD[/B] and possibly [B]HURT[/B] you if you don't follow instructions properly.
I [B][URL="https://en.wikipedia.org/wiki/Brick_(electronics)"][COLOR=Red]HARD BRICK[/COLOR][/URL][/B] my device 4 times before getting it right.
So please, if you follow these instructions, it [URL="https://en.wiktionary.org/wiki/should"][B]SHOULD[/B][COLOR=Gray][SIZE=1](3)[/SIZE][/COLOR][/URL] be safe for you to flash it without worries
since I have solved almost all of the problems that occur.
BUT nevertheless [B]myself, [URL="https://forum.xda-developers.com/member.php?u=6857433"]FiveO[/URL], [URL="https://www.kali.org/"]Kali Linux[/URL], [URL="https://www.offensive-security.com/"]Offensive Security[/URL], [URL="https://forum.xda-developers.com"]XDA[/URL][/B] and its staff, members and crew
and/or any of the [B]developers credited[/B] on this [B][URL="https://www.kali.org/kali-linux-nethunter/"]project[/URL][/B] will [B][COLOR=red][URL="https://dictionary.cambridge.org/dictionary/english/never"]NEVER[/URL][/COLOR][/B] be held responsible.
The tools provided in this thread are to be used in a legal context only.
Thank you.[/FONT][/CENTER]
PLEASE DO NOT QUOTE THE ENTIRE THREAD​Introduction
The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features.
Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB, Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit(1) Database(2)...
And yes, NetHunter natively supports wireless 802.11info frame(1) injection(2) with a variety of supported USB NICs.​
Click to expand...
Click to collapse
NetHunter Editions
NetHunter can be installed on every Android device under the sun using one of the following editions:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
The following table illustrates the differences in functionality:
The NetHunter-App specific chapters are only applicable to the NetHunter & NetHunter Lite editions.
The Kernel specific chapters are only applicable to the NetHunter edition.
Click to expand...
Click to collapse
Images
NetHunter Apps
NetHunter Companion Apps
Nethunter Kex
Kex Docs
Nethunter Store
Nethunter Store F-Droid and others repo add-on
Nethunter Terminal
Click to expand...
Click to collapse
NetHunter and NetHunter Lite ROM compatibility test result on Android PIE
[ROM][9.0][BACON][OFFICIAL]Syberia Project
syberia_bacon-v2.6-20190622-1327-OFFICIAL = Pending
syberia_bacon-v2.9-20190921-0756-OFFICIAL = Pending
[ROM][9.0][OFFICIAL][bacon] LineageOS 16.0 for OnePlus One
lineage-16.0-20190620-nightly-bacon-signed = Success
lineage-16.0-20190701-nightly-bacon-signed = Success
lineage-16.0-20191130-nightly-bacon-signed = Failed
[ROM][9][Pie][Bacon][UNOFFICIAL] crDroid 5.5 (6/16/2019)
crDroidAndroid-9.0-20190616-bacon-v5.5 = Pending
[ROM][9.0.0][PIE] ViperOS 6.1 [BACON][UNOFFICIAL]
Viper-bacon-20190219-v6.1-UNOFFICIAL = Pending
[ROM][9.0.0][WEEKLIES] CarbonROM | cr-7.0 [bacon]
CARBON-CR-7.0-OPAL-RELEASE-bacon-20191120-0302 = Pending
[ROM] [OFFICIAL] [AOSP] Arrow OS [Pie] [9.0.0_r44] | Bacon [2019-07-21]
Arrow-v9.0-bacon-OFFICIAL-20190613 = Pending
Arrow-v9.0-bacon-OFFICIAL-20191016 = Pending
[ROM][9.0][OFFICIAL]Superior OS Nemesis[Bacon][16-09-2019]
SuperiorOS-Nemesis-bacon-OFFICIAL-20190630-0838 = Failed
SuperiorOS-Nemesis-bacon-OFFICIAL-20191012-0637 = Failed
Will do 2nd test for SuperiorOS
[ROM]-[bacon]-[OFFICIAL]-Havoc-OS-[9.0.0]
Havoc-OS-v2.6-20190626-bacon-Official = Success
Havoc-OS-v2.9-20190912-bacon-Official = Success
[ROM][9.0.0_r37] POSP v2.3 - bacon [OFFICIAL][WEEKLIES]
potato_bacon-9-20190719.Baked-v2.3.WEEKLY = Pending
[ROM][LineageOS][Android 9.0.0r40][OMS]TugaPower™ 19.0
TugaPowerP21_OP1 = Failed
TugaPowerP22_OP1 = Failed
TugaPowerP23_OP1 = Failed
Result on TWRP
twrp-3.3.1-0-bacon = Nethunter Flashable
TWRP 3.3.1-K1 = Nethunter Unflashable
Unofficial TWRP 3.2.1-1 by TugaPower = Nethunter Flashable(Stable)
Click to expand...
Click to collapse
SELinux Issues
SELinux will effect HID Interface functionality as well as SafetyNet, please download SELinux mod changer to solve this problem.
Click to expand...
Click to collapse
Download
NetHunter
Nethunter 2020.1 Stable
NetHunter Lite
Nethunter Lite 2020.1 Stable
Gapps
MindTheGapps
F-Droid Store
F-Droid
Click to expand...
Click to collapse
NetHunter Rootless Editions
Maximum flexibility with no commitment
Usage
Note: The command nethunter can be abbreviated to nh.
Tip: If you run kex in the background (&) without having set a password, bring it back to the foreground first when prompted to enter the password, i.e. via fg <job id> - you can later send it to the background again via Ctrl + z and bg <job id>
To use KeX, start the KeX client, enter your password and click connect
Tip: For a better viewing experience, enter a custom resolution under “Advanced Settings” in the KeX Client
Tips
Run apt update && apt full-upgrade first thing after installation. If you have plenty of storage space available you might want to run apt install kali-linux-full as well.
Firefox won’t work on unrooted devices. Just replace it with Chromium via: apt remove firefox-esr apt install chromium Next: ~ Find the “Chromium Web Browser” item in the application menu ~ right click and select “Edit Application” ~ Change the “Command” to /usr/bin/chromium --no-sandbox %U
All of the penetration testing tools should work but some might have restrictions, e.g. metasploit works but doesn’t have database support. If you discover any tools that don’t work, please post it in our forums.
Some utilities like “top” won’t run on unrooted phones.
Non-root users still have root access in the chroot. That’s a proot thing. Just be aware of that.
Galaxy phone’s may prevent non-root users from using sudo. Just use “su -c” instead.
Perform regular backups of your rootfs by stopping all nethunter sessions and typing the following in a termux session: tar -cJf kali-arm64.tar.xz kali-arm64 && mv kali-arm64.tar.xz storage/downloads That will put the backup in your Android download folder. Note: on older devices, change “arm64” to “armhf”
Please join us in our forums to exchange tips and ideas and be part of a community that strives to make NetHunter even better.
Click to expand...
Click to collapse
Instructions
NetHunter & NetHunter Lite
Skip this step if device already rooted
Preparation
Backup everything including internal storage.
Download Bacon Root Toolkit
Unlock bootloader and root(+flash custom recovery) your device.
Reboot to recovery
Flash TWRP use TugaPower
Reboot back to recovery and continue with flashing instruction
Flashing
Please make sure batteries are above 90%
Backup everything including internal storage,
Erase everything, Advance Wipe tick on cache, dalvik, system, data and internal storage, after that Format Data type YES.
(you can proceed without wiping internal storage but it can cause unknown problem)
Reboot back to TWRP
Flash ROMs
(Please choose ROM that already tested if possible)
Flash Magisk 20.3
Flash Gapps
(Please use MindTheGappps version instead of OpenGapps since it's has BusyBox pre install that could cause problems after flashing)
Reboot System and proceed with the start-up, after start-up completed, enable developer’s mode.
Reboot back to TWRP and flash Nethunter 2020.1
Reboot back to system.
NetHunter Rootless
Android Device (Stock unmodified device, no root or custom recovery required)
Installation
Install the NetHunter-Store app from https://store.nethunter.com
From the NetHunter Store, install Termux, NetHunter-KeX client, and Hacker’s keyboard
Note: The button “install” may not change to “installed” in the store client after installation - just ignore it. Starting termux for the first time may seem stuck while displaying “installing” on some devices - just hit enter.
Open Termux and type:
Code:
[LIST=1]
[*]termux-setup-storage pkg
[*]install wget
[*]wget -O install-nethunter-termux https://offs.ec/2MceZWr
[*]chmod +x install-nethunter-termux
[*]./install-nethunter-termux
[/LIST]
Happy Hunting​
Click to expand...
Click to collapse
Post Installation Setup
Open the NetHunter App and start the Kali Chroot Manager.
Install the Hacker Keyboard from the NetHunter Store using the NetHunter Store app.
Install any other apps from the NetHunter app store as required.
Configure Kali Services, such as SSH.
Set up custom commands.
Initialize the Exploit Database.
Click to expand...
Click to collapse
Frequently Asked Questions
Q - Documentation and Attack Descriptions
A- Attack descriptions as well as some documentation to get you started with the installation and setup of Kali NetHunter can be found at Nethunter Wiki
Q - Is Kali NetHunter an Android ROM?
A- Kali Linux NetHunter is not a ROM but is meant to be installed over an existing stock factory image of Android. It can also be installed over some Cyanogenmod based ROMs depending on device support. It is heavily based on using custom kernels and only supports a select number of devices. We're relying on you, the community, to port your devices for the full Kali NetHunter experience.
Q - Does NetHunter support Marshmallow, or Nexus 9 devices?
A - Yes, check our wiki for more information on supported devices and ROMs wiki
Q - What kind of attacks does NetHunter support?
A - Our wiki has a list of included attack tools wiki
Q - NetHunter is awesome! How do I install it?
A - Follow the instructions on the Installation wiki
Q - What is the best wireless card for NetHunter?
A - A list of supported devices and chipsets wiki
Click to expand...
Click to collapse
Thanks To/Credits/Source Code
Code:
[FONT="Franklin Gothic Medium"]# [URL="https://www.gsmarena.com/oneplus_one-6327.php"]OnePlusOne[/URL]
[oneplus1]
author = "[URL="https://twitter.com/_binkybear?lang=en"]binkybear[/URL] & [URL="https://twitter.com/yesimxev/with_replies"]yesimxev[/URL]" for the [URL="https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-devices/tree/master/pie/oneplus1"]zImage-dtb and Module[/URL]
version = "2.2"
devicenames = bacon A0001 one OnePlus
block = /dev/block/platform/msm_sdcc.1/by-name/boot
[URL="https://forum.xda-developers.com/member.php?u=4544860"]osm0sis [/URL]for the [URL="https://github.com/osm0sis/AnyKernel3/"]AnyKernel3 Ramdisk Mod Script [/URL]Customized for NetHunter
[URL="https://forum.xda-developers.com/member.php?u=5672995"]jcadduono [/URL]for the [URL="https://github.com/jcadduono/lazyflasher"]lazyflasher[/URL]
[URL="https://twitter.com/re4sonkernel?lang=en"]re4son [/URL]for the [URL="https://gitlab.com/kalilinux/nethunter/apps/kali-nethunter-app"]Nethunter App[/URL], [URL="https://www.kali.org/docs/nethunter/"]Documentation[/URL] and [URL="https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project/-/tree/master/nethunter-rootless"]NetHunter Rootless[/URL]
[URL="https://www.kali.org/"]Kali Linux[/URL] for the [URL="https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project"]Nethunter Project[/URL]
[URL="https://lineageos.org/"]LineageOS[/URL] for the [URL="https://github.com/LineageOS/android_kernel_oppo_msm8974"]Kernel Source Code[/URL]
[URL="https://forum.xda-developers.com/member.php?u=4841620"]Timmmmaaahh[/URL] for Proofreading[/FONT]
​
Hello XDA Members,
This is Official Nethunter 2019.4 Originally for OnePlus One Android Marshmallow that i port with Android PIE Boot-Patcher.
It's a stable build if you flash with a suitable ROM, so please check the Test Results before flashing,
The ROM compatibility test is still ongoing, and i will update it regularly.
Nethunter 2019 has some issue with Older Devices on latest ROM build, For example on Lineage 16, Nethunter will not work after July build, it will cause boot loop or error on Lineage newer build,
but this problem is not the same with all ROM,
example Havoc-OS work with Nethunter 2019 without any issues, even with September build.
I still finding a way to fix this issues, and i intend to solve this before i release Nethunter 2020.1 next year.
That all update i have for now.
Thank You for participating, have a great day.
Sent from my OnePlus One using XDA Labs
Heck yeah, nice to see seething like this finally ported to pie
Glad to see you finally releasing! Looking forward to testing it on my sweet old Bacon (when I ever find some time, lol)!
wow really nice, any idea why Kex only show blue screen with pointer? now menu or something else? sorry its been a year since lastime im try kali net hunter/
ender1324 said:
Heck yeah, nice to see seething like this finally ported to pie
Click to expand...
Click to collapse
Thanks, I'm happy to see you like it.
Timmmmaaahh said:
Glad to see you finally releasing! Looking forward to testing it on my sweet old Bacon (when I ever find some time, lol)!
Click to expand...
Click to collapse
Thank you Timmy and thanks for all the help too, hope you do find some time to try it:good:.
xsetiadi said:
wow really nice, any idea why Kex only show blue screen with pointer? now menu or something else? sorry its been a year since lastime im try kali net hunter/
Click to expand...
Click to collapse
If this what you meant(refer attachment) then it's the new Kali Desktop Xfce user interface.
Not like that. There's no start menu. Only blank screen with pointer like this
Installation tips.
Hello FairuzOnn and thank you very much for your hard work, it is appreciated.
I like the way your post is written, it's easy to read.
I am preparing my OPO for Nethunter install over a new ROM (lineage-16.0-20190701-nightly-bacon-signed) and I have a question for you. You mentionned at point #2:
"Erase everything, Advance Wipe tick on cache, dalvik, system, data and internal storage, after that Format Data type YES".
That means there will nothing left on the OPO except TWRP. So my understanding is that I should use adb sideload to install the ROM.ZIP from my computer. If not, can you tell me more about this?
Normally, I download the ROM to my OPO and then flash it with TWRP but I think it's better to "clean" the phone and start fresh.
Can you run EDXposed and Multirom? If not, I'll backup after the ROM/Nethunter install before I install those.
Again, thank you very much.
xsetiadi said:
Not like that. There's no start menu. Only blank screen with pointer like this
Click to expand...
Click to collapse
Hi xsetiadi sorry for the very late reply.
Try update chroot
on nethunter terminal
Code:
apt-get update
apt-get dist-upgrade
That should solve the problem.
2643625 said:
Hello FairuzOnn and thank you very much for your hard work, it is appreciated.
I like the way your post is written, it's easy to read.
I am preparing my OPO for Nethunter install over a new ROM (lineage-16.0-20190701-nightly-bacon-signed) and I have a question for you. You mentionned at point #2:
"Erase everything, Advance Wipe tick on cache, dalvik, system, data and internal storage, after that Format Data type YES".
That means there will nothing left on the OPO except TWRP. So my understanding is that I should use adb sideload to install the ROM.ZIP from my computer. If not, can you tell me more about this?
Normally, I download the ROM to my OPO and then flash it with TWRP but I think it's better to "clean" the phone and start fresh.
Can you run EDXposed and Multirom? If not, I'll backup after the ROM/Nethunter install before I install those.
Again, thank you very much.
Click to expand...
Click to collapse
Hello
Thank you for the compliment
You can use adb sideload or adb push, but the best way to flash ROM is by using USB Pendrive or USB OTG.
By the way I recommend using Havoc ROM, it's currently the most stable for nethunter.
You can use EDXposed but it will break safety net,
As for Multirom, I'm still working on it, the current build i made for android pie has lot of issues and can cause hard brick.
I will update you if Multirom android pie build stable to use.
This looks so impressive. Wish I were smart enough to find use for it lol
Hi! How to fix? I'm using I am using TWRP from the developer Kutep0v. (TWRP 3.2.1-K2).
thoiloidainhan said:
This looks so impressive. Wish I were smart enough to find use for it lol
Click to expand...
Click to collapse
Hi thoiloidainhan,
You can visit offensive security to learn about ethical hacking, please try it if you got the time.
Бахрам Байрамза said:
Hi! How to fix? I'm using I am using TWRP from the developer Kutep0v. (TWRP 3.2.1-K2).
Click to expand...
Click to collapse
Hello Бахрам Байрамза,
You can solve this problem, by using stock TWRP or Unofficial TWRP 3.2.1-1 by TugaPower.
For some reason all KutepOv TWRP not compatible to flash NetHunter.
HAPPY HUNTING
FairuzOnn said:
Hi thoiloidainhan,
You can visit offensive security to learn about ethical hacking, please try it if you got the time.
Hello Бахрам Байрамза,
You can solve this problem, by using stock TWRP or Unofficial TWRP 3.2.1-1 by TugaPower.
For some reason all KutepOv TWRP not compatible to flash NetHunter.
HAPPY HUNTING
Click to expand...
Click to collapse
Thanks!
Бахрам Байрамза said:
Thanks!
Click to expand...
Click to collapse
Your Welcome:good:
Hi there, thanks for all your hard work. I'm about to install but which base rom would you recommend as some time has passed.
amd-dude said:
Hi there, thanks for all your hard work. I'm about to install but which base rom would you recommend as some time has passed.
Click to expand...
Click to collapse
Hi sorry for the late reply,
Right now I recommend HACOV ROM,
anyway I currently compile new update, version 2020.1,
I'm planing to finish it and upload it the latest by tomorrow,
batter wait for this update.
FairuzOnn said:
Hi sorry for the late reply,
Right now I recommend HACOV ROM,
anyway I currently compile new update, version 2020.1,
I'm planing to finish it and upload it the latest by tomorrow,
batter wait for this update.
Click to expand...
Click to collapse
Will do, I'll download all the other files in the meantime.
FairuzOnn, wondering if you completed the new version yet?
nickkilla said:
FairuzOnn, wondering if you completed the new version yet?
Click to expand...
Click to collapse
Hi sorry for the late reply, i Have finish most of it, got some problem with NetHunter App I'm working on it, I'm really sorry for the delay. I'm at Gaylord California right now, i have to attend a conference here, i think i will post the new update in 2 or 3 days time.
Sent from my OnePlus One using XDA Labs
FairuzOnn said:
Hi sorry for the late reply, i Have finish most of it, got some problem with NetHunter App I'm working on it, I'm really sorry for the delay. I'm at Gaylord California right now, i have to attend a conference here, i think i will post the new update in 2 or 3 days time.
Sent from my OnePlus One using XDA Labs
Click to expand...
Click to collapse
No worries. Thanks for the update.

[ROM][Official] Kali NetHunter for the TicWatch Pro WearOS

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
All variants are supported (TicWatch Pro, Pro 2020, Pro 4G/LTE)
I present to you: Kali NetHunter for the TicWatch Pro WearOS
Kali NetHunter is an Android ROM overlay that turns an ordinary phone into the ultimate Mobile Penetration Testing Platform. Now it's available for your smartwatch with some limitations.
The overlay includes a custom kernel, a Kali Linux chroot, an accompanying Android application, which allows for easier interaction with various security tools and attacks.
Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, WPS attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page.
NetHunter is an open-source project developed by Offensive Security and the community.
## 1. Unlock the bootloader
- Connect your watch to your PC with it's USB cable, and fire up a terminal.
- If you have set up your watch on the phone you can access settings, otherwise hold both buttons for a few seconds on the welcome screen.
- Enable developer settings by going to System -> About -> tap Build number 10 times
- Enable ADB, re-plug USB and accept debug from PC
- Reboot into bootloader with "adb reboot bootloader" from the terminal
- Unlock bootloader with "fastboot flashing unlock"
## 2. Flash vendor image, TWRP, and optimized WearOS
Download and extract the installation files into a folder. Please not this tutorial is for the TicWatch Pro 2020 (catfish), your ROM might be different on other models, please refer to @janjan's repo found here for the other ROMs.
Please note Magisk 21.0 is recommended, included in the following link.
Download link for ROM, vendor, TWRP, and Magisk: https://build.nethunter.com/contributors/re4son/catfish/
Download link for NetHunter zip. Scroll down to TicWatch for latest release: https://www.kali.org/get-kali/#kali-mobile
- Again enable ADB, and reboot to bootloader with "adb reboot bootloader"
- "fastboot flash vendor vendor.img"
- "fastboot flash recovery twrp-3.4.0-0-catfish.img"
- Boot into recovery by selecting it with the side buttons (switch with bottom one, select with upper button)
- Select "Wipe -> next page -> Format Data"
- Reboot to Recovery
- Select "Install -> ADB Sideload" and tick "Wipe Dalvik Cache, Wipe Cache
- "adb sideload 2-ROM-PWDD.190617.074-AUG-09.zip"
- Reboot & do initial setup (pair with your phone through WearOS app)
## 3. Resize system partition in TWRP
- Again enable ADB
- "adb reboot recovery"
- Select Wipe -> next page -> File System Options - select System - Resize (to have ~175MB free on /system instead of 0)
## 4. Flash and launch Magisk app to finish the rooting process
- "adb sideload Magisk-v21.0.zip"
- Reboot to System
- Launch Magisk Manager
- You might want to disable auto-update, set grant access in auto response, and disable toast notifications for easier navigation in the future
## 5. Flash NetHunter
- "adb reboot recovery"
- Select Install -> ADB Sideload
- "adb sideload" NetHunter image
- Reboot
- Start NetHunter app & chroot
- Reboot
## 6. Set NetHunter watch face
- Install Facer onto your phone from Play Store
- Search for NetHunter
- Install Facer companion app to watch
- Select & Sync
## Download link
TicWatch_Pro_NetHunter_files.zip | by yesimxev for Ticwatch Pro (2018)
Download GApps, Roms, Kernels, Themes, Firmware, and more. Free file hosting for all Android developers.
www.androidfilehost.com
## Additional supported apps
- Drivedroid: use "adb install" to install the latest version
Download link: https://store.nethunter.com/repo/com.softwarebakery.drivedroid_105000.apk
- TotalCommander: useful for selecting eg. a Ducky script, use "adb install" method
Download link: https://www.totalcommander.ch/android/tcandroid323-armeabi.apk
## Supported features
- Kali services
- Custom Commands
- MAC Changer
- HID Attacks
- DuckHunter
- Bad USB
- Nmap Scan
- WPS Attacks
## Upcoming features (not guaranteed)
- Nexmon, as the chipset is supported, needs some time
- Bluetooth Arsenal (internal bluetooth via blueblinder, as carwhisperer fails to r/w when SCO channel is connected)
- Router Keygen (to be optimised)
- Hijacker (if nexmon succeeds)
- Mifare Classic Tool (need to build OS with android.hardware.nfc enabled)
## Hardware limitations
- Power resource is not enough for any external adapters
Credits: The Offensive Security Team and the NetHunter community
Another extremely big thanks for @janjan for making this possible!
WearOS version: 2.17
XDA: DevDB Information
Kali Nethunter, Kernel & ROM for the TicWatch Pro
Contributors
@yesimxev
Source Code: https://gitlab.com/kalilinux/nethunter/
Kernel Source: https://github.com/yesimxev/msm-catfish-9.0-wear-os
RESERVED
Excited to try this with Catshark!
Thank you!
@yesimxev a fantastic contribution, just for the pleasure that "you do it because you can" you have my full support.
Can you upload screenshots or video, I'm curious how it interacts with the ROM when you do WPS attack, NMAP scan or any other of the functions you have enabled.
Is the ROM adapted to the much smaller screen size that the watches have?
bernarbernuli said:
@yesimxev a fantastic contribution, just for the pleasure that "you do it because you can" you have my full support.
Can you upload screenshots or video, I'm curious how it interacts with the ROM when you do WPS attack, NMAP scan or any other of the functions you have enabled.
Is the ROM adapted to the much smaller screen size that the watches have?
Click to expand...
Click to collapse
Yes I've optimised the NH app to fit. See some of my videos for HID, WPS attacks and even Konboot:
@yesimxev
Any advice for me please?
Failed before Last item in step 2. Reboot & do initial setup (pair with your phone through WearOS app)
Symptom long Boot animation for 90 seconds and booted to TWRP.
Attempt 1 using above process + JanJan files for Catshark.
Attempt 2 using Modified step + JanJan files
Modified step - Forum Post- https://forum.xda-developers.com/t/...kipjack-9aug20.3821013/page-186#post-82992173 (#3,714)
You don't need to flash the twrp. It usually cause bootloop. Use
adb reboot bootloader
fastboot boot name-of-the-twrp.img
## 1. Unlock the bootloader
## 2. Flash vendor image, TWRP, and optimized WearOS
Attempt 1
Manually
Reboot to bootloader with "adb reboot bootloader"
Fastboot flash vendor vendor.img
From TicWatch-Pro(4G)(Catshark)-EU-&-USA\TicWatch-Pro(4G)(Catshark)-EU-&-USA\Custom-ROM\TicWatch-Pro-4G-USA\ROM\2020\27-January-2020\Vendor-27-Jan-2020.zip (Vendor.img)
fastboot format userdata
fastboot format cache
"fastboot flash recovery catshark-4G-recovery.img"
From TicWatch-Pro(4G)(Catshark)-EU-&-USA\TicWatch-Pro(4G)(Catshark)-EU-&-USA\Custom-ROM\TicWatch-Pro-4G-USA\TWRP (catshark-4G-recovery.img)
Boot into recovery by selecting it with the side buttons (switch with bottom one, select with upper button)
Select "Wipe -> next page -> Format Data"
Reboot to Recovery
- Select "Install -> ADB Sideload" and tick "Wipe Dalvik Cache, Wipe Cache
"adb sideload Ticwatch-4G-USA-PWDD.190617.032-XDA-27-JAN-2020-LMKiller.zip"
- Reboot-
Symptom long Boot animation for 90 seconds and booted to TWRP.
Attempt 2
Manually
Reboot to bootloader with "adb reboot bootloader"
Fastboot flash vendor vendor.img
From TicWatch-Pro(4G)(Catshark)-EU-&-USA\TicWatch-Pro(4G)(Catshark)-EU-&-USA\Custom-ROM\TicWatch-Pro-4G-USA\ROM\2020\27-January-2020\Vendor-27-Jan-2020.zip (Vendor.img)
Fastboot format userdata
Fastboot format cache
Fastboot boot catshark-4G-recovery.img"
From TicWatch-Pro(4G)(Catshark)-EU-&-USA\TicWatch-Pro(4G)(Catshark)-EU-&-USA\Custom-ROM\TicWatch-Pro-4G-USA\TWRP (catshark-4G-recovery.img)
Boot into recovery by selecting it with the side buttons (switch with bottom one, select with upper button)
Select "Wipe -> next page -> Format Data"
Reboot to Recovery
- Select "Install -> ADB Sideload" and tick "Wipe Dalvik Cache, Wipe Cache
"adb sideload Ticwatch-4G-USA-PWDD.190617.032-XDA-27-JAN-2020-LMKiller.zip"
- Reboot-
Symptom long Boot animation for 90 seconds and booted to TWRP.
Roll back a build. Here's some instructions used by security researcher Lucas Stefanko
Installing NetHunter On the TicWatch Pro | Kali Linux Documentation
All variants are supported (TicWatch Pro, Pro 2020, Pro 4G/LTE) From unpacking to running NetHunter in 6 steps: Unlock the bootloader Flash vendor image, TWRP, and optimized WearOS Resize system partition in TWRP Flash and launch Magisk app to finish the rooting process Flash NetHunter Set...
www.kali.org
Achi Shukuteki said:
Roll back a build. Here's some instructions used by security researcher Lucas Stefanko
Installing NetHunter On the TicWatch Pro | Kali Linux Documentation
All variants are supported (TicWatch Pro, Pro 2020, Pro 4G/LTE) From unpacking to running NetHunter in 6 steps: Unlock the bootloader Flash vendor image, TWRP, and optimized WearOS Resize system partition in TWRP Flash and launch Magisk app to finish the rooting process Flash NetHunter Set...
www.kali.org
Click to expand...
Click to collapse
Thank you!,
If I am comprehending correctly this great write up includes the build for catfish only.
Meaning other models, must refer to @janjan's repo found here for the other ROM.
I used the only build for my device that is available in JanJan's repo.
Thanks for your patience.
Dmcpen said:
Thank you!,
If I am comprehending correctly this great write up includes the build for catfish only.
Meaning other models, must refer to @janjan's repo found here for the other ROM.
I used the only build for my device that is available in JanJan's repo.
Thanks for your patience.
Click to expand...
Click to collapse
Indeed. Keep us posted. I havent had the time, yet, to mod mine.
Achi Shukuteki said:
Roll back a build. Here's some instructions used by security researcher Lucas Stefanko
Installing NetHunter On the TicWatch Pro | Kali Linux Documentation
All variants are supported (TicWatch Pro, Pro 2020, Pro 4G/LTE) From unpacking to running NetHunter in 6 steps: Unlock the bootloader Flash vendor image, TWRP, and optimized WearOS Resize system partition in TWRP Flash and launch Magisk app to finish the rooting process Flash NetHunter Set...
www.kali.org
Click to expand...
Click to collapse
The kali[.]org and these instructions are the same. I've updated both in the same time. I'm afraid you might have a different way to flash. Or try the stock, you don't really need to be on the custom ROM. The NetHunter kernel will be the same and if you don't need any Mobvoi apps, we'll google how to remove them
Also, are you sure you've got a US model?
yesimxev said:
The kali[.]org and these instructions are the same. I've updated both in the same time. I'm afraid you might have a different way to flash. Or try the stock, you don't really need to be on the custom ROM. The NetHunter kernel will be the same and if you don't need any Mobvoi apps, we'll google how to remove them
Also, are you sure you've got a US model?
Click to expand...
Click to collapse
Thanks!
Success!
Nethunter works
Call and Text on 4G Works!
Dmcpen said:
Thanks!
Success!
Nethunter works
Call and Text on 4G Works!
Click to expand...
Click to collapse
What was the issue?
Please note I am very new to this and was only able to get this far because of hard work by @[yesimxev] and [@janjan]
Here are my notes. Use at own risk.
I had 3 failed attempts, and used [@janjan] return to stock process from:
[ROM+KERNEL+TWRP][Ticwatch Pro(Catfish)(Catshark-4G)]+[Ticwatch C2(Skipjack)[9Aug20]
-[Ticwatch Pro 4G/LTE (EU) (Catshark)-PWDD.190617.059]-[30-5-2020] - [Ticwatch Pro 2020 (Catfish-Ext)-PMP2.191203.001]-[22-6-2020] - [Ticwatch Pro (Catfish)-PWDD.190617.074]-[09-8-2020] ############################# - [Ticwatch Pro 4G/LTE (USA)...
forum.xda-developers.com
Hopefully you can learn from my mistakes with the details below.
Please note this is for the:
Ticwatch-Pro-4G(Catshark)-USA-PWDD.190617.032, your ROM might be different on other models, please refer to [@janjan](https://forum.xda-developers.com/m/490110/)'s [repo found here for the other ROM]https://forum.xda-developers.com/t/...shark-4g-ticwatch-c2-skipjack-9aug20.3821013/
Download and extract the installation files into a folder.
Please note Magisk 21.0 is recommended, included in the following link.
Download link for Magisk and Nethunter:
[https://build.nethunter.com/contrib...d.nethunter.com/contributors/re4son/catfish/)
[TicWatch_Pro_NetHunter_files.zip](https://build.nethunter.com/contributors/re4son/catfish/TicWatch_Pro_NetHunter_files.zip "TicWatch_Pro_NetHunter_files.zip")
Download link for NetHunter zip. Scroll down to TicWatch for latest release: [https://www.kali.org/get-kali/#kali-mobile](https://www.kali.org/get-kali/#kali-mobile)
**## 1. Unlock the bootloader**
- Connect your watch to your PC with it's USB cable, and fire up a terminal.
- If you have set up your watch on the phone you can access settings, otherwise hold both buttons for a few seconds on the welcome screen.
- Enable developer settings by going to System -> About -> tap Build number 10 times
- Enable ADB, re-plug USB and accept debug from PC
- Reboot into bootloader with "adb reboot bootloader" from the terminal
- Unlock bootloader with "fastboot flashing unlock"
**## 2. Flash TWRP, and optimized WearOS
- Again enable ADB, and reboot to bootloader with "adb reboot bootloader"
- "fastboot flash recovery catshark-4G-recovery" (From [@janjan] )
- Boot into recovery by selecting it with the side buttons (switch with bottom one, select with upper button)
- Select "Wipe -> next page -> Format Data"
- Reboot & do initial setup (pair with your phone through WearOS app)
**## 3. Resize system partition in TWRP**
- Again enable ADB
- "adb reboot recovery"
- Select Wipe -> next page -> File System Options - select System - Resize (to have ~175MB free on /system instead of 0)
**## 4. Flash and launch Magisk app to finish the rooting process**
- "adb sideload Magisk-v21.0.zip"
- Reboot to System
- Launch Magisk Manager
- You might want to disable auto-update, set grant access in auto response, and disable toast notifications for easier navigation in the future
**## 5. Flash NetHunter**
- "adb reboot recovery"
- Select Install -> ADB Sideload
- "adb sideload" NetHunter image
- Reboot
- Start NetHunter app & chroot
- Reboot
**## 6. Set NetHunter watch face**
- Install Facer onto your phone from Play Store
- Search for NetHunter
- Install Facer companion app to watch
- Select & Sync
Thank you and good luck.
yesimxev said:
The kali[.]org and these instructions are the same. I've updated both in the same time. I'm afraid you might have a different way to flash. Or try the stock, you don't really need to be on the custom ROM. The NetHunter kernel will be the same and if you don't need any Mobvoi apps, we'll google how to remove them
Also, are you sure you've got a US model?
Click to expand...
Click to collapse
Ha! I didn't notice the equivalence of the instructions. I should've read the first one in its entirety. I skimmed it thinking it was for a newer build. My bad.
Achi Shukuteki said:
Ha! I didn't notice the equivalence of the instructions. I should've read the first one in its entirety. I skimmed it thinking it was for a newer build. My bad.
Click to expand...
Click to collapse
Try stock for the win!
I followed the instructions to the letter on my ticwatch pro but after I adb sideloaded nethunter-2022.2b-ticwatchpro-wearos-kalifs-nano.zip and rebooted... it's not there.
I did it a few times and always the same result: I don't see it in the apps list, am I missing some hidden step?
Jackomel said:
I followed the instructions to the letter on my ticwatch pro but after I adb sideloaded nethunter-2022.2b-ticwatchpro-wearos-kalifs-nano.zip and rebooted... it's not there.
I did it a few times and always the same result: I don't see it in the apps list, am I missing some hidden step?
Click to expand...
Click to collapse
Did you setup the watch before flashing? Show me the /tmp/recovery.log using pastebin
yesimxev said:
Did you setup the watch before flashing? Show me the /tmp/recovery.log using pastebin
Click to expand...
Click to collapse
How do I extract that file from the watch? There is no terminal installed, even though I flashed nethunter
Just wanted to add to this that it's possible to get into the settings menu to enable ADB before pairing with your phone, by holding the top button for a couple seconds on the pairing screen. Should let you save a good chunk of time from installation by avoiding setting the watch up repeatedly
androidyl said:
Just wanted to add to this that it's possible to get into the settings menu to enable ADB before pairing with your phone, by holding the top button for a couple seconds on the pairing screen. Should let you save a good chunk of time from installation by avoiding setting the watch up repeatedly
Click to expand...
Click to collapse
I know, but left 'both buttons' in the instructions.
Jackomel said:
How do I extract that file from the watch? There is no terminal installed, even though I flashed nethunter
Click to expand...
Click to collapse
Flash NH in twrp, then run 'adb shell cat /tmp/recovery.log'

How To Guide [Close](Degoogle) microG with ArrowOS Unofficial GSI 12.1

*Update:MicroG revived 3.0​Note: use APKPure to download game. (Can't download from Google play).​Here is "GAME SPACE" features.​
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Exam.
Download https://sourceforge.net/projects/gsi-projects/files/A12.1/ArrowOS-12.1/19102022/
We used bvN variant ( ArrowOS-12.1-arm64_bvN-Unofficial.img.xz) ,the first time testing , better than bgN, supported exFAT sdcard.
All variant from NaZim Maintainer are R/W system by default.
GSI change log.​-October security update
-Base on PHH v415 patch
-Synced with latest A12.1 sources
-Add esim support
-Fixed Memory leak issues
Detail Step continue..​Before test...System on Android 12.
>>Make CustomAP Framework File for Odin flashing. (Not modify system )
CustomAP 2022
The only way to get away from the official firmware. Changes Degoogle (LeOS-TD.2.0 ) A13 GSI Home Launcher For SM-T225 https://forum.xda-developers.com/t/flash-gsi-with-odin-only-no-fastboot-d-or-twrp-needed.4599417/#post-8868065 FastbootD...
forum.xda-developers.com
>>Add Offline Charging.
>>No Google Service. (GMS)
>>Root with Magisk 24.3 ( UserData slot) <<--'option
Test Results.​**( There are overlay files for SM-T 220 together with this GSI.)
* No face-unlock
1. connect internet
2. setup magisk ( download additional required )
3. Fix and hide taskbar
https://github.com/Coxxs/hide-tablet-taskbar/releases/tag/1.0
Configured PHP Treble Setting. For Samsung Device.​
* UI is not for Tablet.
✓ using microG
- install root file manager. (Mixplorer)
- install Patched Phonesky.apk
- install microG magisk module.
Patch your own custom Phonesky.apk
Christopher Roy Bratusek / microG-Phonesky-iap-support · GitLab
microG (in-)app-purchases support patches for Phonesky (Google Play).
gitlab.com
Download:
microG_Installer_Revived.zip
Release microG Installer Revived 3.0.0-0 · nift4/microg_installer_revived
Fix minimum android version check (thanks ale5000) Uninstall microG and Play Store when uninstalling the module Update microG to v0.2.25 Fix network location for many devices by forcing microG as N...
github.com
microG Installer - Magisk
This is a Magisk module that installs microG GmsCore, GsfProxy and DroidGuard Helper to /system/priv-app.
themagisk.com
Setup​Supports Signature Spoofing GSI​
must enable
Add Account
Google device registration
Cloud messaging.
- Supported headphone or earbuds manager, connect devices.​
Supported sound equalizer magisk modules.​
Resources;
✓How to Dual Boot OS with DSU sideloader.?
[Close](Dual Boot)Stock ROM Android11 with VegaBobo DSU Sideloader v.2 .
*Didn't work with magisk and A12. -》Test GSIs with DSU First IF It works well -》 Use Native CustomAP (permanent installation) If new GSI error -》Just Reboot (back to Stock) First, try to install the VegaBobo App apk...
forum.xda-developers.com
✓Howto restored TWRP with Stock A11
https://forum.xda-developers.com/attachments/ain1-jpg.5691897/
✓ Howto first install TWRP with Stock A11
Note: TWRP didn't has touch function you must have USB OTG mouse.
Howto install TWRP For SM-T22x
# Patch Samsung AP Firmware via Magisk v24.0
1. Install Magisk.apk on your device SM-T22x with select no update checking, and transferred AP_xxx.tar.md5 from computer to your tab.
2. Patch Samsung AP Firmware via Magisk Manager.
( Once done, the newly created magisk_patched.tar file will be present under the
Downloads folder on your device.)
3. you may now transfer this patched TAR file to the folder on your PC where other extracted firmware files (AP, BL, CP, CSC, and HOME_CSC) are present.
4. FLASH it with ODin as usual by used magisk_patched.tar file at AP slot .
5. REBOOT SYSTEM Quick SETUP < NO NEED INTERNET>
6. Power Off and press Volum up +Volumn down + USB for boot into Download mode
7. FLASH TWRP.tar from https://github.com/DevZillion/android_device_samsung_gta7lite/releases at "AP slot"
But this time set Odin option NO Auto- REBOOT, yes do it yourself with key press ( power + volumn up). If you can't do this , let it reboot to system and uses cmd " adb reboot recovery".
When access to twrp
Go to Advanced > Terminal and type "multidisabler" (without quotes", then data wipe.
Now reboot into system, after completing first setup of the device reboot into TWRP again to see if you can see the contents of your Internal Storage, you should, if yes you have successfully disabled Samsung encryption of internal storage.
26 Oct 2022 update.
microG with bvN variant of ArrowsOS GSI unofficial.
Not for gaming except used APKPURE downloader. https://m.apkpure.com/apkpure/com.a...06&icn=aegon&ici=text_home-m&from=text_home-m
Note: ArrowsOS A13 bootloop at boot animation.
Update new MicroG revived 3.0
Update new MicroG revived 3.0
Release microG Installer Revived 3.0.0-0 · nift4/microg_installer_revived
Fix minimum android version check (thanks ale5000) Uninstall microG and Play Store when uninstalling the module Update microG to v0.2.25 Fix network location for many devices by forcing microG as N...
github.com
@tom.android are you using this as daily driver or switched to something else?
Abish4i said:
@tom.android are you using this as daily driver or switched to something else?
Click to expand...
Click to collapse
I'm using Dual Boot ArrowOS and Stock Android11.
Cool,
Is it possible to have one OS with root and another without it?
Abish4i said:
Cool,
Is it possible to have one OS with root and another without it?
Click to expand...
Click to collapse
CherishOS bgS (A12.1) + Stock A11( no root)
xiaomemeindex.com
TBH, I cannot unlock bootloader due to my work environment restrictions. Makes me jealous of your dual boot status
tom.android said:
CherishOS bgS (A12.1) + Stock A11( no root)
xiaomemeindex.com
Click to expand...
Click to collapse
May I kindly ask you if worth to update to A12 stock? If not... why? Thanks
francyspi80 said:
May I kindly ask you if worth to update to A12 stock? If not... why? Thanks
Click to expand...
Click to collapse
DSU Sideloader v2 not works on Android 12 , that why I didn't upgraded to Stock A12 but used Dual Boot with A12 or A13 GSI.
Awesome OS, fast and reliable.
But can't get rid of this bottom overlay from stock launcher.
Does anybody know how to fix this ?
pro100luk said:
Awesome OS, fast and reliable.
But can't get rid of this bottom overlay from stock launcher.
View attachment 5775921
Does anybody know how to fix this ?
Click to expand...
Click to collapse
Gesture bar can shrinked to line if you press and hold it.
I've tried this, unfortunately it doesn't fix the problem.
Thanks anyway.
pro100luk said:
I've tried this, unfortunately it doesn't fix the problem.
Thanks anyway.
Click to expand...
Click to collapse
Try https://github.com/Coxxs/hide-tablet-taskbar/releases/tag/1.0
hide: Long press taskbar to completely hide it (for Android 12.1+)
Long press bottom of the screen (when not in desktop) to show taskbar again
tom.android said:
Try https://github.com/Coxxs/hide-tablet-taskbar/releases/tag/1.0
hide: Long press taskbar to completely hide it (for Android 12.1+)
Long press bottom of the screen (when not in desktop) to show taskbar again
Click to expand...
Click to collapse
Thanks for help.
Found another solution. Installed Lawnchair launcher and then changed recent provider to Lawnchair using Quickswitch. Annoying favorites bar now doesn't appear.

Categories

Resources