[EOL][KERNEL] [G93xx][2019-05-25] WirusMOD [Nethunter for Oreo] - Samsung Galaxy S7 (Exynos) ROMs, Kernels, Recoveri

End of Life WirusMOD Nethunter Kernel for Oreo ROMs
Samsung Galaxy S7 / Edge ​
Code:
I am not responsible for bricked devices.
If you going to flash it, you accepted it.
Of course your warranty is void.
This thread is for herolte. If you have S7 Edge go here
FEATURES:
BadUSB
HID gadget keyboard/mouse (with possibility to temporarily disable)
DriveDroid
USB WiFi, mac80211 (Monitor mode, packet capture, packet injection) [Compatibility List]
Ethernet
F2FS
Bluetooth HCI USB support
RTL-SDR DVB support
Most features of TGPKernel
Supported ROMs:
S7 Stock O ROMs - G930F / G930FD / G930W8 / G935F / G935FD / G935W8
S7 Hybrid O ROMs (G930F/G935F) - The Galaxy Project (TGP), Ambasadii S7, SilverRom, etc
S9 Port ROMs
N8 Oreo Port ROMs
Download:
Latest version Herolte here.
Installation:
1. Flash latest TWRP twrp-3.3.0-1+ ( to see data partition with enabled disk quota)
1. TWRP Backup your ROM
3. Flash Nethunter WirusMOD
4. Magisk and busybox is needed you can choose in aroma or install it later.
5. Install Magisk Nethunter module from Magisk Manager -> Downloads (Or another version of Nethunter)
If you get crashes in Magisk Nethunter app than install from here.
6. Install kalifs-armhf-*.tar.xz by Nethunter manager
7. Extract Nethunter_Binaries.7z and binaries to folders:
Firmwares: system/etc/firmware and give permissions to every file rw-r--r--
hid-keyboard binary: system/xbin/ and give permissions to it rwxr-xr-x
Now you have Nethunter on your herolte/hero2lte.
EXTRA:
1.In Utilities.7z are wifi testing tools binaries like aircrack-ng compiled from source of nexmon (Not needed for Nethunter only for test tools direct from android without Nethunter)
If you want use binaries you need to copy it to /system/bin or /system/xbin and give permissions to it rwxr-xr-x
2. DriveDroid without bugs made by disabling HID Patch:
To disable HID Patch: use this command in terminal: "echo Y > /sys/module/g_android/parameters/hid_disable"
Changing mode isn't instant after changing module status. Use DriveDroid (mount iso -> dismount) to active hid_disable.
To enable HID Patch: "echo N > /sys/module/g_android/parameters/hid_disable" and use DriveDroid like with disabling HID Patch.
HIDPatchSwitch this is simple script which can switch between HID enabled and disabled and show changed status.
Old Installation steps:
1. TWRP Backup your ROM
2. Flash Nethunter.WirusMOD.G93xx.vx.x.XXXXXXXX.zip
2.1.Look at EXTRA.
3. Busybox is needed you can choose in aroma or install another version.
6. Install Magisk Nethunter module from Magisk Manager -> Downloads (Or another version of Nethunter)
If you get crashes in Magisk Nethunter app than install this version.
7. Install kalifs-armhf-*.tar.xz by Nethunter manager
8. Extract Nethunter_Binaries.7z and binaries to folders:
Firmwares: system/etc/firmware and give permissions to every file rw-r--r--
hid-keyboard binary: system/xbin/ and give permissions to it rwxr-xr-x
9. Download Modules for your version of smartphone and copy it anywhere in your phone.
By using modules you can add features to kernel for which i hadn't memory in kernel and aren't most important like rarely used wifi card modules or file systems modules. Load only those which you need.
You can use modules by those commands insmod, rmmod, lsmod or use Module Loader this app is outdated but works fine.
Now you have Nethunter on your herolte/hero2lte.
EXTRA:
If you want to have unencrypted data partition:
1. Format data partition(you lose your data).
2 Flash Kernel with option NO ROOT
2. After flashing kernel flash "remove encryption.zip".
3. Reboot to system (First start configuration wizard).
4. Reboot to twrp and flash Magisk.
Screens:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Credits:
djb77 for his TGPkernel source
Nethunter creators for the best portable penetration testing tool.
XDA:DevDB Information
[KERNEL][G93xx][2019-05-25] WirusMOD [Nethunter for Oreo], Kernel for the Samsung Galaxy S7
Contributors
Svirusx
Source Code: https://github.com/Svirusx/Nethunter-s7-kernel-WirusMOD-Oreo
Kernel Special Features: Powered by TGPKernel
Version Information
Status: Testing
Created 2019-02-09
Last Updated 2019-06-22

CHANGELOG
2019.09.27- v1.4
Upstream to tgpkernel source Version 6.15.2[EOL]
2019.06.22- v1.3
Update source to TGPKernel Version 6.15.0
2019.05.25 - v1.2
Updated TGPkernel source to v6.14.0 (release from 2019-05-23)
Rebased source, removed loadable modules
Ramdisk compressed with xz to get more free space for drivers.
Little fixes in defconfig
2019-04-20 - v1.1
Added monitor mode patches to some wifi usb drivers.
Added possibility to disable HIDPatch (this fixes DriveDroid)
Added HIDPatchSwitch: Simple sh script to switch status of HIDPatch (Info in comments in script)
Updated TGP source to Version 6.12.8
2019-02-09 - v1.0
Initial release.

Reserved

What's different between 2 of your kali net hunter or wiresmod nethunter

I'm not sure if this is related but could this help me with the 5 GHz Wi-Fi disconnects on my phone every 10 minutes from the AP?
No other device has this issue for me, only this phone and I tried changing channels already, they all drop exactly at 10 minutes and I've given the phone permanent local IP, no lease time.
On the other hand 2.4 GHz is rock solid.

shabbir143 said:
What's different between 2 of your kali net hunter or wiresmod nethunter
Click to expand...
Click to collapse
This WirusMOD Nethunter is based on TGPKernel so it have features of TGPKernel too. Normal Nethunter is based on Stock Kernel.
GlossGhost said:
I'm not sure if this is related but could this help me with the 5 GHz Wi-Fi disconnects on my phone every 10 minutes from the AP?
No other device has this issue for me, only this phone and I tried changing channels already, they all drop exactly at 10 minutes and I've given the phone permanent local IP, no lease time.
On the other hand 2.4 GHz is rock solid.
Click to expand...
Click to collapse
No, this kernel can't help you for disconnects.

I'm going to buy a usb wifi dongle with an AR9271. By connecting it, I can use it in monitoring mode and send deauthentication packets. I understand correctly?

_Danil_ said:
I'm going to buy a usb wifi dongle with an AR9271. By connecting it, I can use it in monitoring mode and send deauthentication packets. I understand correctly?
Click to expand...
Click to collapse
Yes. You can do all what you can do in normal Kali Linux. Only you need to have htc_9271.fw in /system/etc/firmware/ in your android. ( It is included in Nethunter_Binaries.7z)

Hi! First of all, thanks a lot for your amazing job!
I'm trying to get my usb adapter tp-link tl-wn821n and I couldnt... I've installed the drivers from the tplink website, some drivers from this link and others sources with no success... any idea how to make it work?
Thanks!

maty25 said:
Hi! First of all, thanks a lot for your amazing job!
I'm trying to get my usb adapter tp-link tl-wn821n and I couldnt... I've installed the drivers from the tplink website, some drivers from this link and others sources with no success... any idea how to make it work?
Thanks!
Click to expand...
Click to collapse
I don't know which version of tp-link tl-wn821n you have. I heard that v1 - v3 are on atheros chipset. Next versions are on RTL8192.... and i don't know about compatibility v4+ versions with kali linux.
Looking at source code of which you used. I think you have v4+ so first you need to insmod modules RTL8192 than you need copy firmware.
In NetHunter_Binaries.7z are firmwares for RTL8192... in \system\etc\firmware\rtlwifi\ extract all of they direct in \system\etc\firmware
I think that android might not load drivers which are in extra folders in \system\etc\firmware\
All those things you need to do in Android not in Kali chroot.
If you have problems with inserting modules than try my kernel for Oreo Stock it have no modules, all are included in kernel. With this kernel you need only copy firmware.
My TGP based kernel is too big to have all modules included.

Svirusx said:
I don't know which version of tp-link tl-wn821n you have. I heard that v1 - v3 are on atheros chipset. Next versions are on RTL8192.... and i don't know about compatibility v4+ versions with kali linux.
Looking at source code of which you used. I think you have v4+ so first you need to insmod modules RTL8192 than you need copy firmware.
In NetHunter_Binaries.7z are firmwares for RTL8192... in \system\etc\firmware\rtlwifi\ extract all of they direct in \system\etc\firmware
I think that android might not load drivers which are in extra folders in \system\etc\firmware\
All those things you need to do in Android not in Kali chroot.
If you have problems with inserting modules than try my kernel for Oreo Stock it have no modules, all are included in kernel. With this kernel you need only copy firmware.
My TGP based kernel is too big to have all modules included.
Click to expand...
Click to collapse
Thanks for the info! I've tried to copy the files from the "rtlwifi" folder to the firmware folder but when I reboot the phone they get deleted :/ I supossed I'll try with an stock version... thanks!

maty25 said:
Thanks for the info! I've tried to copy the files from the "rtlwifi" folder to the firmware folder but when I reboot the phone they get deleted :/ I supossed I'll try with an stock version... thanks!
Click to expand...
Click to collapse
In my old phone i used this path /vendor/firmware maybe it can working for you.
I had too this problem but with copying to system/xbin. Solved by copying those files to system/bin

I just want to ask, can't hold my self.
Will it work on latest rr with android 9.x ?

SomniusX said:
I just want to ask, can't hold my self.
Will it work on latest rr with android 9.x ?
Click to expand...
Click to collapse
No, it's only for Oreo

Svirusx said:
No, it's only for Oreo
Click to expand...
Click to collapse
Yeah, figures.. just had one hope

Can you update to the latest version of TGP?
Also, what modules are included in the kernel?

_Danil_ said:
Can you update to the latest version of TGP?
Also, what modules are included in the kernel?
Click to expand...
Click to collapse
All what is in FEATURES is included, if you want look at all included in kernel modules you need to look at defconfig in kernel source.
When i get free time i try update it.

Sometimes the smartphone reboot itself. In a random time, with various actions. Sometimes in a couple of hours there can be 4 restarts.
Firmware: latest THE GALAXY PROJECT
But nethunter works fine, monitoring, injections and even interception of PMKID ?

_Danil_ said:
Sometimes the smartphone reboot itself. In a random time, with various actions. Sometimes in a couple of hours there can be 4 restarts.
Firmware: latest THE GALAXY PROJECT
But nethunter works fine, monitoring, injections and even interception of PMKID
Click to expand...
Click to collapse
Maybe try LineageOS 14.1 version this one is more stable than STOCK one. I switched to LineageOS 15.1. Later i going to publicate my new port of Nethunter kernel for LineageOS 15.1 and now i'm testing LineageOS 16.0 build which is not yet stable.

@Svirusx It may be to early to ask this, but do you have any plans to port either this or just bethunter to stock pie? https://www.google.com/amp/s/forum....t/blackdiamondfesmooth-fastv1-0-t3915483/amp/

Related

[Kernel+][Exynos] Kali NetHunter for the Galaxy S7

​
WARNING: When using custom kernels on the S7, never turn off developer options or OEM unlock. If you do, you will lose all your data and have to flash a full stock firmware restore to use your device again!
OKAY SO
This is Kali NetHunter 3.15.2 for the Galaxy S7.
If you don't know what Kali NetHunter is, well, it's the entire Kali Linux operating system in a chroot on your phone, plus a bunch of awesome apps for executing exploits, fixing things, doing cool things. It goes on, I suppose.
I'm gonna be honest guys, I'm not a security person. When it comes to security, I'm more of a Paul Blart.
What I do know though, is that there is apt-get, and apt-get is life.
Find much more information here: https://github.com/offensive-security/kali-nethunter/wiki
The answer to all your questions, generally the answer is YES, IT CAN DO THAT.
Most ROMs should be supported, as our installer uses a dynamic patching method on your current boot image!
The NetHunter installer zip will add a few files to your /system partition, and install all of the NetHunter apps to your /data partition.
The chroot is located in /data/local/nhsystem, so you don't have to worry about your system partition being full. It's full read/write capable.
Understand that the zip will replace your current kernel with a completely different one.
This is necessary because most stock or custom kernels don't provide the drivers needed to operate most of Kali NetHunter's features.
NetHunter also includes its own Busybox that gives you full large file support and some extra applets.
It will not overwrite your current one, and will happily install alongside it as busybox_nh.
DOWNLOAD
Current version: 3.15.2 (stable, 2016-11-04)
Please be careful to download the right version based on this table:
SM-G930F, SM-G930FD, SM-G930W8, SM-G930X: kernel-nethunter-herolte-*
SM-G930K, SM-G930L, SM-G930S: kernel-nethunter-heroltekor-*
S7 edge: You're in the wrong forum!
All others be sad.
For the apps, chroot, and everything other than just the kernel, you will also need to download:
nethunter-generic-arm64-*
See installation instructions before proceeding!
Downloads are available at: http://build.nethunter.com/nightly/
BEFORE INSTALLING
IMPORTANT: Kali NetHunter requires write access to your data partition!
This means that if your data partition is encrypted, you will need to use the [Format Data] button in TWRP to remove encryption.
This will delete all your data, including internal storage.
You should back everything up first before installing Kali NetHunter.
Samsung Smart Switch Mobile can be useful for this, and allows you to back up your apps to a location on an external SDcard.
Unfortunately it doesn't back up most app data.
The Kali chroot and apps are installed on your data partition (in /data/local/nhsystem for chroot). To initialize the chroot and install Kali Linux, you need to start the Kali NetHunter app.
The generic NetHunter installer will automatically install SuperSU. We try to keep it up to date, but it isn't always.
If you already have SuperSU or another root method installed, please simply delete the supersu.zip from the root of the zip file before installing it.
It's recommended that you restore or flash your ROM's original kernel before installing NetHunter.
It's become apparent that there may be issues with the stock ROM and this kernel, and that it might run best on a Note 7 port.
FULL INSTALLATION STEPS
Install Team Win Recovery Project to your recovery partition.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Recommended: If you have a custom kernel or SuperSU installed, restore your stock kernel. (called Boot in TWRP)
This isn't entirely necessary, but you may need to flash the NetHunter kernel again if SuperSU replaces it.
If your data partition doesn't mount in TWRP:
Go to [Wipe] -> [Format Data] (not advanced wipe) -> type "yes".
WARNING: This will wipe your internal storage, disable encryption, and factory reset your phone!
Once your data partition is formatted, go to [Reboot] -> [Recovery].
Download the kernel-nethunter zip specific to your device.
Without exiting TWRP, transfer the NetHunter kernel installer zip to your device over MTP* and flash it using [Install] in TWRP.
If you wiped your data partition in step 2:
Go to [Reboot] -> [System].
Set up your phone by following the Android setup wizard.
Once it's set up, reboot back into recovery.
For new installations: Download the nethunter-generic-arm64-kalifs zip.
For upgrades: Download the update-nethunter-generic-arm64 zip.
Without exiting TWRP, transfer the NetHunter generic arm64 installer zip to your device over MTP* and flash it using [Install] in TWRP.
Go to [Reboot] -> [System].
Wait 2-5 minutes for your device to finish setting itself up.
Open the NetHunter app to initialize the environment
You're done!
* MTP, known as Media Transfer Protocol, is the same way you transfer files from your PC to your device when booted into system.
UPDATING TO A NEWER BUILD OR UPDATING YOUR ROM
Follow the installation steps above. NetHunter can be installed over itself as many times as you'd like.
If you don't want to lose your chroot, flash the smaller update-nethunter-generic-arm64 zip instead.
THE KERNEL
The NetHunter kernel for the Galaxy S7 is based on Samsung's OSRC N930SKSU2BPID Note 7 kernel sources.
It has the following changes:
Carefully updated to Linux 3.18.44 (with dirtycow vulnerability patched)
SELinux permissive
F2FS updated to Jaeguek Kim's latest kernel.org f2fs-stable sources
F2FS formatted data partition support
Enabled USB (OTG) Atheros, Ralink, and Realtek WiFi drivers
FIOPS IO scheduler as default IO scheduler, SIO available
USB HID Gadget keyboard & mouse support
mac80211 packet injection support
DriveDroid compatibility
Additional drivers built in for the full Kali NetHunter experience
Data partition encryption disabled (not supported by custom kernels at the moment)
Kernel module support, insert your own modules!
CIFS, NFS available through included kernel modules
RAN INTO AN ISSUE OR BUG?
In order for me to help you, you have to at minimum reply with:
The link to the exact zip you downloaded
Your device model
The name of the ROM you're flashing it on
The version and build date of the ROM you're flashing it on
A complete description of your problem
If your issue is with a specific app, it might be better to contact the developer of that app.
For Kali NetHunter bugs/issues, you can open a ticket at: https://github.com/offensive-security/kali-nethunter/issues
If your issue is during the installation (ex. flashing the NetHunter zip), then please collect a TWRP recovery.log for me.
If you found a problem and were able to fix it, and no one's mentioned it in the thread already, it would be kind to state the issue and your fix for others to make use of as well.
You can join me and the other NetHunter developers on IRC at the #nethunter room on freenode to more handily diagnose problems together.
I apologize, but I can't do house calls at this time.
KNOWN ISSUES
USB Keyboard - The keyboard is unusable when using Google Keyboard as your input method. Switch to Hacker's Keyboard.
Reboot after 60 seconds - Sometimes when you boot your device it could reboot after 60 seconds because of a Samsung secure service not responding. Unresolved, but rare, and only happens within 60 seconds of a boot.
DEVELOPMENT
You can see the main branch of NetHunter's development on the Offensive Security GitHub: https://github.com/offensive-security/kali-nethunter
Galaxy S7 NetHunter kernel source: https://github.com/jcadduono/android_kernel_samsung_universal8890/tree/nethunter-6.0
SCREENSHOTS
DISCLAIMER
I am not affiliated with Offensive Security. They seem like cool guys though.
I'm not even a novice when it comes to security and penetration. I'm just a simple system administrator with a passion for breaking Android.
Please restrain yourselves from asking me security related questions.
XDA:DevDB Information
Kali NetHunter for the Galaxy S7, Kernel for the Samsung Galaxy S7
Contributors
jcadduono, The Kali NetHunter team
Source Code: https://github.com/offensive-security/kali-nethunter
Kernel Special Features:
Version Information
Status: Stable
Current Stable Version: 3.15.2
Stable Release Date: 2016-11-04
Created 2016-10-06
Last Updated 2016-11-04
I cannot test this today, but i ****in love you !
saphirrot said:
I cannot test this today, but i ****in love you !
Click to expand...
Click to collapse
Yeah I just hope it's all working fine this time Last time I opened a thread for NetHunter on S7 it was a little embarrassing as I didn't own any recent Galaxy phones I had no idea they'd be such a challenge to get custom development going on.
I still haven't exactly tested this, but I do have the Note 7 now so I'm really hoping that everything done to make it work on the Note 7 makes it work on the S7 and S7 edge too... *crosses fingers*
We've got a few issues to fix before an actual release but they're all related to the apps.
1. The NetHunter Terminal app is quite buggy, so you might want to use JuiceSSH local terminal for now. (type su -c bootkali_login to enter Kali environment)
2. The NetHunter app's scripts are all hardcoded for armhf right now. I've actually completed arm64 support in the installer and we can build working arm64 rootfs and install it, just the NetHunter app can't see it yet so we're using armhf on arm64 instead for now.
Anyways, hope to hear some good news from ya! These remaining issues shouldn't take long for us to overcome...
For s7 edge do I have download the arm packages or arm64 packages?
Handeman707 said:
For s7 edge do I have download the arm packages or arm64 packages?
Click to expand...
Click to collapse
you're in the wrong forum, go to S7 edge forum
http://forum.xda-developers.com/s7-edge/development/kernel-kali-nethunter-galaxy-s7-edge-t3475413
this probably isn't something you want to play around with if you don't know if your phone is arm or arm64 :/
Has anyone else been able to get DriveDroid working bootabley (definitely a real word) on this build / Galaxy S7?
I can get the device to show in Windows, but none of the configuration options seem to make it show up as a boot option.
I've tried with both the DriveDroid apk in the nethunter installer, and the latest one from the DriveDroid website.
(P.S. It's not a configuration issue on my laptop as it works with DriveDroid on a Nexus 5. )
XanSama said:
Has anyone else been able to get DriveDroid working bootabley (definitely a real word) on this build / Galaxy S7?
I can get the device to show in Windows, but none of the configuration options seem to make it show up as a boot option.
I've tried with both the DriveDroid apk in the nethunter installer, and the latest one from the DriveDroid website.
(P.S. It's not a configuration issue on my laptop as it works with DriveDroid on a Nexus 5. )
Click to expand...
Click to collapse
I've never been able to boot from DriveDroid CDROM mode but always just mounted ISOs as USB Storage and booted off that, essentially the same as dd'ing an ISO to a flash drive.
Not sure what the Nexus 5 is doing differently... It is kernel related though, as actually mounting this stuff is very trivial and can be done through terminal.
jcadduono said:
I've never been able to boot from DriveDroid CDROM mode but always just mounted ISOs as USB Storage and booted off that, essentially the same as dd'ing an ISO to a flash drive.
Not sure what the Nexus 5 is doing differently... It is kernel related though, as actually mounting this stuff is very trivial and can be done through terminal.
Click to expand...
Click to collapse
Doesn't seem to be working for me in USB RW, USB RO, or CDROM mode on this build; are you saying that the one of the USB modes -is- functioning for you currently? or none at all (same as me?)
XanSama said:
Doesn't seem to be working for me in USB RW, USB RO, or CDROM mode on this build; are you saying that the one of the USB modes -is- functioning for you currently? or none at all (same as me?)
Click to expand...
Click to collapse
Used USB RO to install Windows 10 from boot the other day, but that was in UEFI mode
dude pls tell me what is the best rom to have nethunter because i tried a lot of roms it keeps ending in bootloop. also pls tell me whether it works in stock rom...
ahamed.rafi135 said:
dude pls tell me what is the best rom to have nethunter because i tried a lot of roms it keeps ending in bootloop. also pls tell me whether it works in stock rom...
Click to expand...
Click to collapse
Only tested on latest stock FXXU1BPI firmware
jcadduono said:
Only tested on latest stock FXXU1BPI firmware
Click to expand...
Click to collapse
but when i try flashing on stock it says boot image failed
boot image file xxxxxbits larger
ahamed.rafi135 said:
but when i try flashing on stock it says boot image failed
boot image file xxxxxbits larger
Click to expand...
Click to collapse
recovery log...
doesnt make sense, by my calculations the resulting image should be close to 40953856 bytes and partition should fit it at *41943040‬ bytes :/
jcadduono said:
recovery log...
doesnt make sense, by my calculations the resulting image should be close to 40953856 bytes and partition should fit it at *41943040‬ bytes :/
Click to expand...
Click to collapse
yeah dude just gimme a moment flashing stock rom, btw i just did all the setup in bobcat rom it is soooooo lagggy
and i would like to have this on stock rom. And one more thing thanks for your continuous support.
AND MY FIRMWARE IS G935FXXU1APB6 is it ok?
ahamed.rafi135 said:
yeah dude just gimme a moment flashing stock rom, btw i just did all the setup in bobcat rom it is soooooo lagggy
and i would like to have this on stock rom. And one more thing thanks for your continuous support.
AND MY FIRMWARE IS G935FXXU1APB6 is it ok?
Click to expand...
Click to collapse
i have no idea...only tested on FXXU1BP firmware... maybe consider updating?
i will see about maybe removing ffu and signature checker binaries to reduce size, i dont think they are even able to run except by OTAs/stock anyway which are broken by custom kernels
i have attached the log
jcadduono said:
i have no idea...only tested on FXXU1BP firmware... maybe consider updating?
i will see about maybe removing ffu and signature checker binaries to reduce size, i dont think they are even able to run except by OTAs/stock anyway which are broken by custom kernels
Click to expand...
Click to collapse
also which rom do you recommend?
ahamed.rafi135 said:
also which rom do you recommend?
Click to expand...
Click to collapse
the one that matches your boot image...
i will always recommend stock over anything else though
ok try a build from here instead:
http://build.nethunter.com/test-builds/
update: tested myself and it worked fine, posted new nightly build with changes
it will remove the firmware upgrade service from boot image, which is useless anyway as we can't take OTAs with custom kernels
Hi, I have flashed both of the lastest kernels (kernel-nethunter-herolte-marshmallow-3.15.2-20161024-2241) and (kernel-nethunter-herolte-marshmallow-3.15.2-20161023-0148) but they are still laggy and are having poor CPU performance in geekbench tests. Any fix?
Does it requires an external WiFi adapter to test my internet security or does the WiFi adapter of the S7 can do the job ?
Thank you

KaliLinux NetHunter v1.0 [Kali v2.0/Backtrack 5][athene]

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, [URL="https://github.com/offensive-security/kali-nethunter/wiki/NetHunter-Mana-Wireless"]Evil AP MANA attacks[/URL], and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. NetHunter is an open-source project developed by Offensive Security and the community.
FIRST THINGS FIRST, SERIOUSLY:
Your warranty was void as soon as you unlocked your bootloader.
Although Kali Nethunter should be safe to use, I am not responsible for whatever happens to your device, router, or whatever networking infrastructure because of YOU misusing the available facilities of Kali.
Remember that while Kali can be absolutely safe, if you handle root access improperly, no one will help you.
Make sure you read all of the info here and have some basic knowledge about networking, kernels and Linux/Unix.
Even if you're able to find a vulnerability on a different host (often called victim) , don't misuse the advantage you have.
Report the issue to the device's owner and the OEM. Do not complain if the attacks aren't working. Security has been ramping up ever since the wikileaks incident and the Edward Snowden thing.
FEATURES:
Kali NetHunter Application
Home Screen - General information panel, network interfaces and HID device status.
Kali Chroot Manager - For managing chroot metapackage installations.
Check App Update - For checking Kali NetHunter Android App updates.
Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
Custom Commands - Add your own custom commands and functions to the launcher.
MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
VNC Manager - Set up an instant VNC session with your Kali chroot.
HID Attacks - Various HID attacks, Teensy style.
DuckHunter HID - Rubber Ducky style HID attacks
BadUSB MITM Attack - Nuff said.
MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
MITM Framework - Inject binary backdoors into downloaded executables on the fly.
NMap Scan - Quick Nmap scanner interface.
Metasploit Payload Generator - Generating Metasploit payloads on the fly.
Searchsploit - Easy searching for exploits in the Exploit-DB.
3rd Party Android Applications (WIP)
NetHunter Terminal Application
DriveDroid
USB Keyboard
Shodan
Router Keygen
cSploit
Remember that there might be many other exploits and attack features available online, the ones mentioned above are officially documented by Kali. Secondly, not much support will be possible regarding the attacking since not everyone will have the same opportunities.
DOWNLOADS
Sourceforge might show this file as Malware for obvious reasons, but open the filename and choose the directlink. I will contact their support team for this soon, meanwhile you can also check the Android File Host mirror.
1. For N Custom ROMs :
Sourceforge folder
Android Filehost
2. For stock N:
3. For MM Custom ROMs:
4. For Stock MM:
INSTALLATION
IMPORTANT NOTE: Kali NetHunter is NOT an Android ROM, but it is an overlay ( you have to flash it above android).
The builds currently provided are to be used on Nougat based custom ROMs ONLY. (which use the LineageOS kernel)
Installing it on a ROM which uses the LineageOS 14.1 kernel. (examples include all of our N custom ROMs like Lineage, AEX, AICP, AOKP, DU ) :
1. Make sure you are running the latest available build of the ROM you have installed.
2. Reboot to TWRP.
3. Make sure you backup Boot, System and Data partitions, just incase you want to remove Kali, you can restore it.
3. Wipe Cache and ART Cache (Formerly known as Dalvik Cache). Do NOT wipe your data partition.
4. Install the zip file.
5. Reboot to System.
POST INSTALLATION:
1. Open the NetHunter App and start the Kali Chroot Manager.
2. You might want to download the real packages which might be around 400-500 MB in size.
3. Set up Hacker Keyboard.
4. Configure Kali Services, such as SSH.
5. Set up custom commands.
6. Initialize the Exploit Database.
BUGS:
Please read the help thread before you point out issues here. It has been created specifically to help new users to adapt to custom roms easier. Before you post your issue, please check if it has already been reported and if a fix has already been mentioned.
SCREENSHOTS:
https://vimeo.com/132329259
https://youtu.be/yV6AzqgdBo4
IMPORTANT LINKS:
1. My build of TWRP
2. KaliLinux NetHunter Github Wiki
3. KaliLinux NetHunter Website
4. Source for athene: https://github.com/tywinlannister7/nethunter-devices
XDA:DevDB Information
KaliNethunter for athene, ROM for the Moto G4 Plus
Contributors
tywinlannister7 @keerten
Source Code: https://github.com/offensive-security/kali-nethunter
ROM OS Version: 7.x Nougat
ROM Kernel: Linux 3.10.x
ROM Firmware Required: Latest stock Nougat firmware
Version Information
Status: Stable
Created 2017-07-20
Last Updated 2017-07-20
Reserved
Reserved
Will it work on AOSP CAF?
aravindmj said:
Will it work on AOSP CAF?
Click to expand...
Click to collapse
It uses the LineageOS kernel, so YES. :good:
First off thank you for this second how do we add HID devices to kali
khaoticking said:
First off thank you for this second how do we add HID devices to kali
Click to expand...
Click to collapse
You're welcome.
The NetHunter HID Atacks turn any device and its OTG USB cable into a pre-programmed keyboard, able to type any given commands. HID here refers to the Human Interface Devices like your keyboard mouse touchpad etc. The mounting process should be similar like you do on any android device. If you're not sure that kali isn't detecting the device, you might want to try running this command in the terminal:
Code:
lsusb
tywinlannister7 said:
You're welcome.
The NetHunter HID Atacks turn any device and its OTG USB cable into a pre-programmed keyboard, able to type any given commands. HID here refers to the Human Interface Devices like your keyboard mouse touchpad etc. The mounting process should be similar like you do on any android device. If you're not sure that kali isn't detecting the device, you might want to try running this command in the terminal:
Click to expand...
Click to collapse
Kali doesn't detect any HID devices when trying to run the hello world duck script it won't type anything
Can you give me the link to the kernel sources...
khaoticking said:
First off thank you for this second how do we add HID devices to kali
Click to expand...
Click to collapse
The Android HID patch as mentioned by pelya has not been applied to the kernel sources. That's why there is no HID Interfaces...
If anybody knows how to custom compile a kernel then one can look at @pelya guide how to patch it..
Link to kernel source of tywinlannister https://github.com/tywinlannister7/elementalx_kernel_motorola_msm8952
Link to patched kernel sources Jleeblanch but it is not compiling he is the official maintainer of Resurrection remix for Athene "the Kali branch"
https://github.com/Jleeblanch/android_kernel_motorola_msm8952
If anybody looks into the matter we can get fully functional Kali nethunter...
Thanks in advance..:good:
Does it work on Moto g4 plus and how to remove the Kali overlay latter. Thanks
Sobhan Bhuyan said:
Does it work on Moto g4 plus and how to remove the Kali overlay latter. Thanks
Click to expand...
Click to collapse
This is in the G4 Plus forum. That usually means it works on the G4 Plus.
zeomal said:
This is in the G4 Plus forum. That usually means it works on the G4 Plus.
Click to expand...
Click to collapse
I flashed it and got an error in twrp ( named error one or something) and then there were no overlays to be seen inside. Later I knew that caller ID is not visible while calling or being called. Restored then. Pls advice. Should I flash again.
Managed to get the error message from twrp. Pls advice
Sobhan Bhuyan said:
Managed to get the error message from twrp. Pls advice
Click to expand...
Click to collapse
As it says in the TWRP error, did you boot and set up your device, then reboot to flash the Kali overlay? From the opening post, this appears to flash over existing custom ROMs.
What ROM are you attempting to flash Kali over?
Sobhan Bhuyan said:
Managed to get the error message from twrp. Pls advice
Click to expand...
Click to collapse
First of all a ROM must be installed and on top of that only nethunter should be flashed(so only it is called overlay ROM ,something has to be underneath it...:good: )
echo92 said:
As it says in the TWRP error, did you boot and set up your device, then reboot to flash the Kali overlay? From the opening post, this appears to flash over existing custom ROMs.
What ROM are you attempting to flash Kali over?
Click to expand...
Click to collapse
I m currently on ressurection remix ROM ,device XT1643
So you mean that after wiping cache I must set up device as new first then reboot and flash the overlay. Ok I will try and let you know
Sorry to bother, but what about ElementalEx kernel? Is it compatible, untested, or uncompatible?
Also, does it need a fresh ROM flash, or could it be used over an already flashed, rooted and used ROM with EX ?
Will it work for Viper OS 7.1 nougat?
What is the difference between this version and version 3.0?
'

[KERNEL+][Q][PIE][Treble][Nethunter][Andrax]

A project by Offensive Security
The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs.
AN ALTERNATIVE TO NETHUNTER
ANDRAX - A project by Weidsom Nascimento of The Cracker Technology - Advanced Pentest
ANDRAX is a penetration testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution!
The development of ANDRAX began on 08/09/2016 (DD/MM/YYYY) only for people in Brazil.
ANDRAX has been fully redefined and reloaded on 05/10/2018 (DD/MM/YYYY) open to the international public.
ANDRAX enable to all Android device with root access enabled and a good unlocked rom become a weapon for advanced Penetration Testing.
Downloads:
For Android PIE:
[url]https://sourceforge.net/projects/nethunterkernel-z2plus-pie/files/[/URL]
For Android Q:
https://sourceforge.net/projects/nethunter-andrax-android-10/files/​
GUIDE:​1.Simply flash it through TWRP ,clear cache and reboot
It will take around 10-15 mins to boot..
2.For the rest guide on how to install nethunter and all ,you can easily find it on google
OR
Refer to:[url]https://forum.xda-developers.com/lenovo-zuk-z2/development/kernel-kali-nethunter-t3813746[/URL]
IF ANYONE FACES TWRP "ERROR 1" WHILE FLASHING THE ZIP FILE
Flash this TWRP(V 3.2.3) by kubersharma and flash the zip
NOTE: This TWRP is only for those ROM users who have mounted /vendor as /factory partition.
If you do not belong in this category ,simply flash vendor to factory.zip and then flash this twrp.​
https://www.androidfilehost.com/?fid=11410963190603913223
Disclaimer:
This Kernel was tested only on Arrow OS 9.0 ROM only.***It works "ALMOST" almost on any ROM now.***
"I WONT BE RESPONSIBLE FOR ANY BRICKED,DAMAGED PHONES ETC. FLASH IT AT YOUR OWN RISK.
I DO NOT TAKE ANY RESPONSIBILITY FOR ANY MISUSE OF THIS KERNEL. THIS KERNEL IS TOTALLY MEANT FOR SECURITY PENTESTING."​
WHATS WORKING?​Wifi Injection and monitor mode​
Bugs:​1.HID (because currently there is no patch available for 4.4.X Kernel.So anyone interested to create the patch message me)
2.You tell me.​
Credits:​Offensive Security, Andrax
@Atharva Ambre[AT]
@faizauthar12
@kenny3fcb
@kubersharma
@frap129(For spectrum support)
#teamfirangi(Bubblewrap)​
XDAevDB Information
Kali Nethunter, Kernel for the Lenovo ZUK Z2 (Plus)
Source Code:https://github.com/theimprobableoneATSH/nethunter
Source Code(Bubblewrap):
[url]https://github.com/theimprobableoneATSH/kernel_bubblewrap_4.4[/URL]
For Android 10:-
Source Code:https://github.com/VarshankDhiman/kernel_zuk_msm8996
Status: Stable
Beta Release Date: 2019-02-26
Latest release: 2020-04-26
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Initial Release:
-Test build : Have enabled Wifi modules for Ralink,Realtek and Atheros(partial support for ath9k_htc based chipset based i.e. monitor mode works problems faced during injecting packets)
V2 Release:
-Fixed Atheros(ath9k_htc based) partial support. Now it works completely fine with atheros chipset based cards
Eg: Tp link 722N.
-USB Modem -CDC ACM support is available for Proxmark and Similar devices
V3 Release:
-Updated to latest CAF kernel version 4.4.176 for the latest Arrow build.
-Bug fixes.
-Improved Stability
Reserved pt.2
Due to various changes in new version of kernel 4.4.X , the kernel might not work as expected or you may face bugs.Be sure to report it!
Finally Nethunter is back to life. Thank You Dev for this update. Make this kernel as stable as BubbleWrap. :good: By the way, zuk z2's internal wifi adaptor work in monitor mode or I have to use evternal wifi adaptor?
ChetanLokhande said:
Finally Nethunter is back to life. Thank You Dev for this update. Make this kernel as stable as BubbleWrap. :good: By the way, zuk z2's internal wifi adaptor work in monitor mode or I have to use evternal wifi adaptor?
Click to expand...
Click to collapse
External adapter
Internal is not supported.
Yes the next update will be available maybe by this weekend which might fix all the major issues.
Could you push repo with commit history?
Star_king12 said:
Could you push repo with commit history?
Click to expand...
Click to collapse
Yes my apologies. I didnt had any commit history i will add it shortly
hey! I'm not into this nethunter thing but i want to start, can anyone help me where can I start because I want to use this kernel!
Installation stuck when trying to install nethunter apk. Kernel installs and boots
Artap~ said:
Installation stuck when trying to install nethunter apk. Kernel installs and boots
Click to expand...
Click to collapse
You should flash this through Magisk Manager not TWRP
Under modules section and add this zip file and reboot.
Atharva Ambre[AT said:
;79011418]You should flash this through Magisk Manager not TWRP
Under modules section and add this zip file and reboot.
Click to expand...
Click to collapse
Ok ty so much
the_harsh said:
hey! I'm not into this nethunter thing but i want to start, can anyone help me where can I start because I want to use this kernel!
Click to expand...
Click to collapse
First learn linux basic commands and how to use it , become familiar with the linux OS and CLI (Debian is a good start or maybe ubuntu)then u try to learn kali linux and its tools. This kernel will help only with wifi pentesting. But u must first how to use it..
Pro tip: Dont use this kernel for any bad purpose. I and Offensive Security do not take any responsibility for any misuse . It comes with absolutely no warranty. So any misuse willl be treated as illegal. Its absolutely for security pentesting.
#Build 2 is up!
https://sourceforge.net/projects/nethunterkernel-z2plus-pie/files/
Changelog is present in post #1
Atharva Ambre[AT said:
;79016363]First learn linux basic commands and how to use it , become familiar with the linux OS and CLI (Debian is a good start or maybe ubuntu)then u try to learn kali linux and its tools. This kernel will help only with wifi pentesting. But u must first how to use it..
Pro tip: Dont use this kernel for any bad purpose. I and Offensive Security do not take any responsibility for any misuse . It comes with absolutely no warranty. So any misuse willl be treated as illegal. Its absolutely for security pentesting.
Click to expand...
Click to collapse
aye captain ! no harm will be caused to anyone. it's only for education purposes. I'll use it for penetration testing of my WiFi only! ?
---------- Post added at 06:13 AM ---------- Previous post was at 05:49 AM ----------
one guide on how to uninstall it completely would also help alot!
Atharva Ambre[AT said:
;79016407]#Build 2 is up!
https://sourceforge.net/projects/nethunterkernel-z2plus-pie/files/
Changelog is present in post #1
Click to expand...
Click to collapse
Fking love this project.
Deleted
the_harsh said:
aye captain ! no harm will be caused to anyone. it's only for education purposes. I'll use it for penetration testing of my WiFi only! ?
---------- Post added at 06:13 AM ---------- Previous post was at 05:49 AM ----------
one guide on how to uninstall it completely would also help alot!
Click to expand...
Click to collapse
Uninstall what kernel or Kali nethunter?
If u r speaking of kernel simply extract the boot.img from ur ROM zip
And den boot into twrp and select Install Image and den flash it under boot section.
Also make sure to resintall the Magisk if u r gonna need root back again(since it reverts all the changes)
Or else simply clear cache and boot
I would like the kernel testers out there for their feedback!
Any bug report etc..
Atharva Ambre[AT said:
;79021175]Uninstall what kernel or Kali nethunter?
If u r speaking of kernel simply extract the boot.img from ur ROM zip
And den boot into twrp and select Install Image and den flash it under boot section.
Also make sure to resintall the Magisk if u r gonna need root back again(since it reverts all the changes)
Or else simply clear cache and boot
Click to expand...
Click to collapse
Dirty flashing rom won't work?
BTW spectrum is working for me. I can change profiles and all, not sure how. Im on pixys and came from bubble wrap.

[ROM][Official] Kali NetHunter for the Nokia 3.1 Android 9

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I present to you: Kali NetHunter for the Nokia 3.1 Android 9
The first Nokia with Kali Nethunter! (in chronological order)
Kali NetHunter is an Android ROM overlay that turns an ordinary phone into the ultimate Mobile Penetration Testing Platform.
The overlay includes a custom kernel, a Kali Linux chroot, an accompanying Android application, which allows for easier interaction with various security tools and attacks, as well as a client to the Kali NetHunter App Store.
Beyond the penetration testing tools arsenal within Kali Linux and the Kali NetHunter App Store, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page.
NetHunter is an open-source project developed by Offensive Security and the community.
~ Prerequisites ~
- Android 9 Stock (V3.180) https://androidfilehost.com/?fid=4349826312261827395
- Universal Force Encryption Disabler - https://www.androidfilehost.com/?fid=8889791610682920239
- TWRP with fixed touch by @belkaliz - https://forum.xda-developers.com/attachments/recovery-boot_a_twrp_nokia31-20211016-0945-img.5435907/
- TWRP (no touch) unofficial - https://www.androidfilehost.com/?fid=8889791610682928997
- Magisk – https://forum.xda-developers.com/apps/magisk
- Unlocked bootloader by Hikari Calyx https://t.me/HikariCalyxFIH
~~ Downloads ~~
- NetHunter installer: https://kali.org/get-kali#kali-mobile
- NetHunter bootanimation and firmwares: https://www.androidfilehost.com/?fid=8889791610682929010
~~ How to Install ~~
Assuming you have unlocked bootloader, stock Pie (v3.180).
Please note due to the lack of device tree, my TWRP porting skills and time, we're using my TWRP with no touch. Several methods and solutions were tried by not only me without success.
I can only think of that the touch driver is being initialised from /vendor during boot.
Feel free to contribute if you make a working TWRP
You'll need an OTG cable and mouse to do one step of the following process. You'll also need a Linux or Windows PC with adb tools downloaded
- Do initial setup after unlocked bootloader - don't use wifi at setup, as you don't want OTA, they are not supported
- Plug your phone into your PC
- Turn on ADB debug in Developer Settings, then adb reboot bootloader - or do it with plug in USB when powered off and hold power + vol down
- Flash TWRP
Code:
fastboot flash boot_a boot_a_twrp.img
- Do "fastboot reboot" into TWRP (to do this, as soon as it vibrates, hold power+vol up, release power on AndriodOne logo, release vol on twrp logo)
- Use OTG mouse: Format data and reboot into TWRP
- Do adb push FBEDisabler and install it
Code:
adb push DisableForceEncryption_Treble.zip /sdcard/
twrp install zip /sdcard/DisableForceEncryption_Treble.zip
- Do initial setup, enable ADB
- Reboot to recovery,
Code:
adb reboot recovery
- Do adb push NH, Magisk, bootanimation, firmware zip and scripts (from unzipped nokia_nh.zip) to /sdcard/ and flash them.
Code:
adb push <DOWNLOADED_FILES_PATH>/* /sdcard/
adb shell
twrp install zip /sdcard/nethunter-2020.3-es2-pie-kalifs-minimal.zip
twrp install zip /sdcard/Magisk-v20.1.zip
cd /sdcard/
sh bootanimation.sh
sh firmware.sh
reboot
- Start Kali NH App and do a final reboot
- To upgrade to full Kali fs, do
Code:
apt-get update && apt-get install kali-linux-nethunter -y
~~~ Notes & Updates ~~~
Credits: The Offensive Security Team and the NetHunter community
Android Version: 9.0
XDA: DevDB Information
Kali Nethunter, Kernel & ROM for the Nokia 3.1
Contributors
@yesimxev
For bootloader unlock and general Nokia support: @hikari_calyx
Source Code: https://gitlab.com/kalilinux/nethunter
Kernel Source: https://github.com/yesimxev/android_kernel_nokia_es2
Reserved
Reserved #2
Hi there,
Thank for very much for the release and the flashing instructions. I'm wondering though if you'll be releasing the TWRP sources. Perhaps your work will help others make a release with touch support.
Cheers
ivan_the_persnickety said:
Hi there,
Thank for very much for the release and the flashing instructions. I'm wondering though if you'll be releasing the TWRP sources. Perhaps your work will help others make a release with touch support.
Cheers
Click to expand...
Click to collapse
Sorry for the late reply, I wanted to give a better code for you but I mainly used this in the above TWRP hybrid :laugh:
Built with twrpbuilder device tree generator with omni 7 source. I'm aware that 8 or 9 should have been used but it didn't build successfully for me.
https://github.com/yesimxev/android_device_nokia_ES2_sprout/
twrp.fstab is with with system_a vendor_a etc now, because it was always using _b even if I was booting into _a, but I left it like that because slotselect should really work
Hey again Yesimxev, Does the Nokia 3.1 offer Wireless monitor mode? Thanks
TrillbyMcTipp said:
Hey again Yesimxev, Does the Nokia 3.1 offer Wireless monitor mode? Thanks
Click to expand...
Click to collapse
No, unfortunately it doesn't
Hello! Does the TWRP recovery work on Android 10? (I don't need the ROM, just the recovery)
Gabi_203 said:
Hello! Does the TWRP recovery work on Android 10? (I don't need the ROM, just the recovery)
Click to expand...
Click to collapse
Not sure as this was made of and for Pie source
Hello, wanted to ask if anyone here has tried this or knows it'll work for the 3.1 Plus?
AFAIK it has a different kernel source and no TWRP, so not likely
I fixed touch in your TWRP.
belkaliz said:
I fixed touch in your TWRP.
Click to expand...
Click to collapse
You're a champ! Unfortunately I don't own a 3.1 since, but I'll try as soon as I get one again
Hi all! I guess I'm stuck on the step #1 and all other are failing. I get Error 1 when tring to install Nethunter, both full and minimal versions.
Where do I get the Android 9 Stock (V3.180)?
Марија said:
Hi all! I guess I'm stuck on the step #1 and all other are failing. I get Error 1 when tring to install Nethunter, both full and minimal versions.
Where do I get the Android 9 Stock (V3.180)?
Click to expand...
Click to collapse
Do you have android 10 now? @hikari_calyx is 3.1 downgradable to v3.180? He has the images but I don't remember
Марија said:
Hi all! I guess I'm stuck on the step #1 and all other are failing. I get Error 1 when tring to install Nethunter, both full and minimal versions.
Where do I get the Android 9 Stock (V3.180)?
Click to expand...
Click to collapse
Hello here : https://sourceforge.net/projects/fihsw-mtk/ . I downloaded, and i install in my nokia 3.1. it's a good version 9.0 pie. Is the @hikari_calix link.
Hi yesimxev, I see you are here, just a quick question. I installed your Kali nh in my nokia 3.1. I followed step by step, and every folder or zip downloaded, and installed well in my phone. But I have a problem at the end, when I restart my phone I don't have the nh app and the magisk app, just a nice screenshot, and the standard google apps. in the second to last command you say: and flash them,, but in the commands below I don't see for example: "fastboot flash boot_a /path to nethunter/".
Could you just clarify these lines of code, please.
Dooblewoops said:
Hi yesimxev, I see you are here, just a quick question. I installed your Kali nh in my nokia 3.1. I followed step by step, and every folder or zip downloaded, and installed well in my phone. But I have a problem at the end, when I restart my phone I don't have the nh app and the magisk app, just a nice screenshot, and the standard google apps. in the second to last command you say: and flash them,, but in the commands below I don't see for example: "fastboot flash boot_a /path to nethunter/".
Could you just clarify these lines of code, please.
Click to expand...
Click to collapse
I see. Flash NH means to install the NH zip through recovery
hi yesimxev, tank's for you quick reply. i do make something false, because i have the confirmation the magisk is installed, but i have not magisk in my phone ? You say "do initial setup" where ? in the twrp or in app magisk on the phone ?
Initial setup is android first start after formatting data and flashing force encryption disabler and Magisk. NetHunter can only be installed after android setup is done. And Magisk has to be started once, to finish it's setup after installed in TWRP

[KERNEL] EvilKernel to work properly with Nethunter and Andrax

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I am not responsible for using my kernel with bad intentions, the kernel only serves to test my network and devices.
Click to expand...
Click to collapse
Status: Beta
Developer: mozahist228
Kernel for Linux version: 4.9.226
Spoiler: Features
Generic IEEE 802.11 Networking Stack (mac80211)
HCI USB driver
HCI VHCI (Virtual HCI device) driver
USB RTL8150 based ethernet device support
Realtek RTL8152/RTL8153 Based USB Ethernet Adapters
Multi-purpose USB Networking Framework
CDC NCM support
OTG support
USB Wireless Device Management support
USB 2.0 OTG FSM implementation
USB Modem (CDC ACM) support
Atheros Wireless Cards
Linux Community AR9170 802.11n USB support
Ralink driver support
Spoiler: Note
Put it through TWRP. If necessary, then flash magisk because with the installation of the kernel, it will be erased.
Only for Lineage OS-based firmwares
Spoiler: Bags
Working with the Bluetooth interface is not available
Spoiler: Screenshots
Spoiler: Download
GoogleDisk
Source code: GitHub
Just created an account to say thanks! This worked for me. I've been trying for the last week to get Nethunter to recognize my Wi-Fi USB adapters, and I think this package is what did it.
If anybody is curious, these are the steps I took
fastboot into TWRP, format everything/factory reset
in TWRP, adb sideload the new Lineage 18.1 ROM from this thread
still in TWRP, adb sideload the custom kernel OP posted
mozahist228 said:
Spoiler: Download GoogleDisk
Click to expand...
Click to collapse
Boot up Lineage OS, run through initial setup
Reboot back into recovery, use TWRP to sideload OpenGApps (optional) if you're going to do this, you *have* to get OpenGApps from this page, as their support for Android 11 is still in beta
use TWRP to sideload Magisk
use TWRP to sideload the Generic ARM64 Nethunter image from this page (or direct download by clicking me)
Boot back into Lineage, run the Nethunter app and ensure chroot is working properly (mine wasn't I had to do a bit of futzing around with it, but this was my own fault)
Finally, open the Magisk Manager app, go to the modules tab, search for and install "Wireless Firmware for Nethunter". Do *not* install the "KaliNethunter" module, as this continually caused problems for me.
I don't know if this is the best order to do it in, I'm very new with Android stuff, but just thought I'd share what worked for me. Thanks again OP!
Finally some Nethunter kernel for this device, Would love to see the feature : Monitor Mode on the SoC (SD625)
rubrex said:
Finally some Nethunter kernel for this device, Would love to see the feature : Monitor Mode on the SoC (SD625)
Click to expand...
Click to collapse
At the moment this is impossible, any patches do not work, and my knowledge is not enough to expand the driver's functionality
So, there is just usb adapters support with no monitor mode, or mode is available for external adapters? Anyway thanks for any movements to the right way!
mr.onegin said:
So, there is just usb adapters support with no monitor mode, or mode is available for external adapters? Anyway thanks for any movements to the right way!
Click to expand...
Click to collapse
I think this is all you wanted to see)
Are you planning to add HID support?
Firerust said:
Are you planning to add HID support?
Click to expand...
Click to collapse
It is already present
mozahist228 said:
It is already present
Click to expand...
Click to collapse
It doesn't work for me, using pelya's app to test HID feature
Firerust said:
View attachment 5219973
It doesn't work for me, using pelya's app to test HID feature
Click to expand...
Click to collapse
I don’t think it was adapted for new kernel versions.
mozahist228 said:
I don’t think it was adapted for new kernel versions.
Click to expand...
Click to collapse
Even last version of Rucky which was updated on 2020 doesn't work, it says kernel does not support HID, does this feature work for you?
Firerust said:
Even last version of Rucky which was updated on 2020 doesn't work, it says kernel does not support HID, does this feature work for you?
Click to expand...
Click to collapse
If you do not know the basic things then you should not go into this field
mozahist228 said:
If you do not know the basic things then you should not go into this field
Click to expand...
Click to collapse
Yeah you're right, just looking at your source I realized you have no idea of what I'm referring to, since f_hid.c hasn't been modified. Thanks anyway.
Firerust said:
Even last version of Rucky which was updated on 2020 doesn't work, it says kernel does not support HID, does this feature work for you?
Click to expand...
Click to collapse
I got Rucky to work, however I eventually had to reflash my device because it wouldn't boot up. Even before that, it would routinely take 5+ minutes to boot with this kernel installed. Not sure if this kernel is to blame or something Nethunter related.
Firerust said:
Yeah you're right, just looking at your source I realized you have no idea of what I'm referring to, since f_hid.c hasn't been modified. Thanks anyway.
Click to expand...
Click to collapse
He shouldn't have been changed
lmfao, so you literally got sleepy, kanged the defconfig + the commits you advertise as features. At least put proper authorship lmfao + no mention of lacia anywhere. NIce job sir
And FYI the sleepy source you used as a base is old af, newer one is in https://github.com/Couchpotato-sauce/kernel_xiaomi_sleepy
forsalebypwner said:
Just created an account to say thanks! This worked for me. I've been trying for the last week to get Nethunter to recognize my Wi-Fi USB adapters, and I think this package is what did it.
If anybody is curious, these are the steps I took
fastboot into TWRP, format everything/factory reset
in TWRP, adb sideload the new Lineage 18.1 ROM from this thread
still in TWRP, adb sideload the custom kernel OP posted
Boot up Lineage OS, run through initial setup
Reboot back into recovery, use TWRP to sideload OpenGApps (optional) if you're going to do this, you *have* to get OpenGApps from this page, as their support for Android 11 is still in beta
use TWRP to sideload Magisk
use TWRP to sideload the Generic ARM64 Nethunter image from this page (or direct download by clicking me)
Boot back into Lineage, run the Nethunter app and ensure chroot is working properly (mine wasn't I had to do a bit of futzing around with it, but this was my own fault)
Finally, open the Magisk Manager app, go to the modules tab, search for and install "Wireless Firmware for Nethunter". Do *not* install the "KaliNethunter" module, as this continually caused problems for me.
I don't know if this is the best order to do it in, I'm very new with Android stuff, but just thought I'd share what worked for me. Thanks again OP!
Click to expand...
Click to collapse
when i choose kali in the terminal, it just crashes, any idea on how to fix that?
Don't stop this project please, you are the one who delivered this "special" kernel!
Hello! I installed everything right. I tried a lot of variations. But when i boot into the system it shows the kali icon for a sec and then nothing visible its just a black screen. it reacts to the side buttons. This problem is only happen when i install nethunter on it, the kernel the lineageOS and the magisk is working properly.
Please help! I working on this for a very long time and i cant fix it.
Thanks in advance

Categories

Resources