


Download and install the BusyBox from the Google Playstore.You can download Nethunter all versions from here. There’s various NetHunter versions you can choose from for the installation.Recommended: Download Kali Linux for Android Steps to Follow

In order to install Kali Nethunter, you need the following required things to get started. How to Install Kali Nethunter on Android?.This app is built and signed by Kali NetHunter. Requires root, nethunter chroot and nethunter kernel * Searchsploit - Easy searching for exploits in the Exploit-DB. * Metasploit Payload Generator - Generating Metasploit payloads on the fly. * NMap Scan - Quick Nmap scanner interface. * MITM Framework - Inject binary backdoors into downloaded executables on the fly. * MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button. * DuckHunter HID - Rubber Ducky style HID attacks * HID Attacks - Various HID attacks, Teensy style. * KeX Manager - Set up an instant KeX session with your Kali chroot. * MAC Changer - Change your Wi-Fi MAC address (only on certain devices) * Custom Commands - Add your own custom commands and functions to the launcher. * Kali Services - Start / stop various chrooted services. * Check App Update - For checking Kali NetHunter Android App updates. * Kali Chroot Manager - For managing chroot metapackage installations. * Home Screen - General information panel, network interfaces and HID device status. NetHunter is an open-source project developed by Offensive Security and the community. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform.
