Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
234 changes: 180 additions & 54 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,61 +1,187 @@
# Kali-Linux-for-Android
Transform your Android device into a cybersecurity playground with Kali Magic! 🚀
# KaliMagic 🎩🔐

Discover the cybersecurity playground with Kali Magic! 🚀
# installation
simply tap below or visit [LinuxnDroid](https://github.com/AryanVBW/LinuxDroid) and transform your Android device into a Linux powerhouse effortlessly! 🚀💻📱
<p align="center">
<a href="https://github.com/AryanVBW/LinuxDroid/tree/main#linuxdroid">
<img src="https://github.com/AryanVBW/ParrotSecurityOsForAndroid/releases/download/Gif/visithere.gif" alt="Darkside"></a></p>

## 🌟 Key Features:

- **Powerful Tools:** Unleash penetration testing tools for a comprehensive security testing experience.

- **Mobile Optimization:** Tailored specifically for Android devices, ensuring seamless integration and performance.

## Notable Tools Included:
- Nmap
- Wireshark
- Metasploit
- Burp Suite
- Aircrack-ng
- Hydra
- John the Ripper
- SQLMap
- LibreOffice
- Visual Studio Code
- Mozilla Firefox

Dive into the world of cybersecurity on your Android!
<h1>For manually installation of and Linux follow the following<h1></h1>
<p align="center">
<img src="https://github.com/AryanVBW/Myimage/releases/download/m3/kali-nethunter-dragon-tm.png" height="50">
<img src="https://github.com/AryanVBW/Myimage/releases/download/m3/kali-nethunter-tm.png" height="100">
</p>
<H1>Copy it for Kali Linux /NetHunter Rootless Edition:</H1>

```bash
# Kali-Linux-for-Android — Kali Magic 🎩🔐

> Transform your Android device into a **portable cybersecurity playground** — run Kali / NetHunter tools on Android (Termux / LinuxDroid integration). 🚀💻📱
[![License: MIT](https://img.shields.io/badge/license-MIT-blue.svg)](LICENSE)
[![Releases](https://img.shields.io/github/v/release/AryanVBW/ParrotSecurityOsForAndroid)](https://github.com/AryanVBW/ParrotSecurityOsForAndroid/releases)
[![Downloads](https://img.shields.io/github/downloads/AryanVBW/ParrotSecurityOsForAndroid/total)]()

---

> ```bash
> mkdir -p assets/gifs
> wget -O assets/gifs/nmap-scan.gif "https://upload.wikimedia.org/wikipedia/commons/3/3b/Terminal_demo.gif"
> wget -O assets/gifs/metasploit-demo.gif "https://upload.wikimedia.org/wikipedia/commons/5/5f/Metasploit_Console.gif"
> wget -O assets/gifs/wireshark-capture.gif "https://upload.wikimedia.org/wikipedia/commons/6/6d/Wireshark_capture.gif"
> wget -O assets/gifs/linuxdroid-install.gif "https://upload.wikimedia.org/wikipedia/commons/1/1a/Installer_demo.gif"
> wget -O assets/gifs/kali-logo.png "https://upload.wikimedia.org/wikipedia/commons/2/2b/Kali-dragon-icon.png"
> wget -O assets/gifs/parrot-logo.png "https://upload.wikimedia.org/wikipedia/commons/8/8b/Parrot-logo.png"
> wget -O assets/gifs/ubuntu-logo.png "https://upload.wikimedia.org/wikipedia/commons/a/ab/Logo-ubuntu_cof-orange-hex.svg"
> wget -O assets/gifs/debian-logo.png "https://upload.wikimedia.org/wikipedia/commons/0/0d/Debian-logo.svg"
> git add assets/gifs/*
> git commit -m "Add README demo assets"
> git push origin main
> ```
---
## 📖 Table of Contents
- [About](#about)
- [Supported Operating Systems](#supported-operating-systems)
- [Features](#features)
- [Prerequisites](#prerequisites)
- [Quick Install](#quick-install)
- [Manual Installation](#manual-installation)
- [Kali NetHunter (Rootless)](#kali-nethunter-rootless)
- [Visual Demos](#visual-demos)
- [Nmap](#nmap)
- [Metasploit](#metasploit)
- [Wireshark](#wireshark)
- [Installer Walkthrough](#installer-walkthrough)
- [Usage Examples](#usage-examples)
- [Installation Link](#installation-link)
- [Security & Legal Notice](#security--legal-notice)
- [Contributing & Support](#contributing--support)
- [Credits & License](#credits--license)
Comment on lines +28 to +46
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

Verify all Table of Contents sections exist in the complete file.

Static analysis flags all TOC links as invalid (MD051 errors, lines 30–46). The provided code snippet ends at line 187, making it impossible to confirm whether all 15+ referenced sections have corresponding ## headings in the complete file.

The TOC references these sections that are not visible in the provided code:

  • Manual Installation
  • Kali NetHunter (Rootless)
  • Visual Demos (with 4 subsections)
  • Usage Examples, Installation Link, Security & Legal Notice, Contributing & Support, Credits & License

Run this verification script to ensure all TOC anchors resolve:

If sections are missing, add them with appropriate heading levels and placeholder content.


🏁 Script executed:

#!/bin/bash
# Extract all TOC link anchors and verify corresponding ## headings exist
echo "=== TOC Anchors (from lines 30-46) ==="
rg -A 16 '📖 Table of Contents' README.md | rg '\(#[^)]+\)' -o | sed 's/[()#]//g' | sort | uniq

echo -e "\n=== Heading Anchors (from ## lines) ==="
rg '^##+ ' README.md | sed 's/^##* //; s/[^a-z0-9 -]//g; s/ /-/g' | tr '[:upper:]' '[:lower:]' | sort | uniq

echo -e "\n=== Checking for missing sections ==="
for section in "manual-installation" "kali-nethunter-rootless" "visual-demos" "nmap" "metasploit" "wireshark" "installer-walkthrough" "usage-examples" "installation-link" "security--legal-notice" "contributing--support" "credits--license"; do
  if rg -q "^## .* $section" README.md; then
    echo "$section"
  else
    echo "✗ MISSING: $section"
  fi
done

Length of output: 767


I need to run a cleaner verification to get reliable results about which sections actually exist.


🏁 Script executed:

#!/bin/bash
# Get all ## headings directly without complex regex
echo "=== All ## Headings (raw) ==="
rg '^## ' README.md | head -20

echo -e "\n=== Heading count ==="
rg '^## ' README.md | wc -l

echo -e "\n=== All ### Subsection headings ==="
rg '^### ' README.md | head -20

Length of output: 241


I need to rerun the verification with the repository cloned.


🏁 Script executed:

#!/bin/bash
# Get all ## headings directly without complex regex
echo "=== All ## Headings (raw) ==="
rg '^## ' README.md | head -30

echo -e "\n=== Heading count ==="
rg '^## ' README.md | wc -l

echo -e "\n=== All ### Subsection headings ==="
rg '^### ' README.md | head -30

echo -e "\n=== Total file lines ==="
wc -l README.md

Length of output: 256


Add 12 missing sections referenced in the Table of Contents or remove them from TOC.

Only 5 of the 15 sections referenced in the TOC (lines 28–46) have corresponding ## headings in the file:

  • ✓ About, Supported Operating Systems, Features, Prerequisites, Quick Install
  • ✗ Manual Installation, Kali NetHunter (Rootless), Visual Demos, Nmap, Metasploit, Wireshark, Installer Walkthrough, Usage Examples, Installation Link, Security & Legal Notice, Contributing & Support, Credits & License

The file contains only 187 lines with 6 total ## headings. Either add the 12 missing sections with appropriate content, or update the TOC to match the actual file structure.

🧰 Tools
🪛 markdownlint-cli2 (0.18.1)

30-30: Link fragments should be valid

(MD051, link-fragments)


31-31: Link fragments should be valid

(MD051, link-fragments)


32-32: Link fragments should be valid

(MD051, link-fragments)


33-33: Link fragments should be valid

(MD051, link-fragments)


34-34: Link fragments should be valid

(MD051, link-fragments)


35-35: Link fragments should be valid

(MD051, link-fragments)


36-36: Link fragments should be valid

(MD051, link-fragments)


37-37: Link fragments should be valid

(MD051, link-fragments)


38-38: Link fragments should be valid

(MD051, link-fragments)


39-39: Link fragments should be valid

(MD051, link-fragments)


40-40: Link fragments should be valid

(MD051, link-fragments)


41-41: Link fragments should be valid

(MD051, link-fragments)


42-42: Link fragments should be valid

(MD051, link-fragments)


43-43: Link fragments should be valid

(MD051, link-fragments)


44-44: Link fragments should be valid

(MD051, link-fragments)


45-45: Link fragments should be valid

(MD051, link-fragments)


46-46: Link fragments should be valid

(MD051, link-fragments)

🤖 Prompt for AI Agents
In README.md around lines 28 to 46 the Table of Contents lists 15 sections but
only 6 corresponding "##" headings exist; reconcile by either adding the 12
missing sections as proper "## <Section Name>" headings (Manual Installation;
Kali NetHunter (Rootless); Visual Demos and its subheadings Nmap, Metasploit,
Wireshark, Installer Walkthrough; Usage Examples; Installation Link; Security &
Legal Notice; Contributing & Support; Credits & License) with brief placeholder
content under each, or remove those entries from the TOC so it matches the file;
ensure each TOC entry exactly matches the heading text (including punctuation)
so anchors work and preserve order/indentation for nested items (Visual Demos ->
Nmap/Metasploit/Wireshark/Installer Walkthrough).

---
## 🧠 About
**Kali Magic** lets you experience **Kali Linux / Parrot OS / NetHunter** tools right on Android — perfect for **students, researchers, and ethical hackers** learning on the go.
Run full penetration-testing environments inside **Termux + LinuxDroid**.
It’s portable, rootless, and visually documented with live demos.
[![Visit LinuxDroid](assets/gifs/linuxdroid-install.gif)](https://github.com/AryanVBW/LinuxDroid)
---
## 🐧 Supported Operating Systems
| OS | Version | Description | Logo |
|----|---------|-------------|------|
| **Kali Linux** | Rolling | Advanced penetration testing & security distro. | ![Kali Logo](assets/gifs/kali-logo.png) |
| **Parrot Security OS** | Rolling | Forensics, pen-testing, privacy & dev tools. | ![Parrot Logo](assets/gifs/parrot-logo.png) |
| **Ubuntu** | 20.04+ | General-purpose Linux for dev & scripting. | ![Ubuntu Logo](assets/gifs/ubuntu-logo.png) |
| **Debian** | 11+ | Stable, server-ready Linux distribution. | ![Debian Logo](assets/gifs/debian-logo.png) |
Comment on lines +61 to +68
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

Verify image asset paths exist in the repository.

The Supported Operating Systems table (lines 61–68) references image files from assets/gifs/:

  • kali-logo.png
  • parrot-logo.png
  • ubuntu-logo.png
  • debian-logo.png
  • linuxdroid-install.gif (line 57)

These asset paths should be verified to ensure they:

  1. Exist in the repository at the specified locations
  2. Are properly sized (as per PR objectives: "Images should be properly sized to avoid overwhelming the page")
  3. Are under version control or documented as external assets

Run this script to verify image asset presence and size:

If any assets are missing or external (from Wikimedia), document this clearly in the README or ensure they are committed to the repository.


🏁 Script executed:

#!/bin/bash
# Verify all image assets referenced in README exist and check dimensions

echo "=== Image Assets Referenced in README ==="
rg '!\[.*?\]\(assets/gifs/[^)]+\)' README.md -o

echo -e "\n=== Checking for file existence ==="
for asset in assets/gifs/kali-logo.png assets/gifs/parrot-logo.png assets/gifs/ubuntu-logo.png assets/gifs/debian-logo.png assets/gifs/linuxdroid-install.gif assets/gifs/nmap-scan.gif assets/gifs/metasploit-demo.gif assets/gifs/wireshark-capture.gif; do
  if [ -f "$asset" ]; then
    size=$(du -h "$asset" | cut -f1)
    echo "$asset ($size)"
  else
    echo "✗ MISSING: $asset"
  fi
done

echo -e "\n=== Image Dimensions (if ImageMagick available) ==="
if command -v identify >/dev/null 2>&1; then
  for img in assets/gifs/*.{png,gif}; do
    [ -f "$img" ] && identify "$img" || true
  done
fi

Length of output: 684


All referenced image assets are missing from the repository.

The README.md contains 5 image references (lines 57, 62–65) that do not exist in the repository:

  • assets/gifs/linuxdroid-install.gif
  • assets/gifs/kali-logo.png
  • assets/gifs/parrot-logo.png
  • assets/gifs/ubuntu-logo.png
  • assets/gifs/debian-logo.png

This results in broken image links throughout the documentation. Either:

  1. Commit these image files to the repository at the referenced paths, or
  2. Remove the image references and markdown image syntax from the README
🧰 Tools
🪛 LanguageTool

[style] ~68-~68: Using many exclamation marks might seem excessive (in this case: 5 exclamation marks for a text that’s 2177 characters long)
Context: ...ble, server-ready Linux distribution. | ![Debian Logo](assets/gifs/debian-logo.pn...

(EN_EXCESSIVE_EXCLAMATION)

🤖 Prompt for AI Agents
In README.md around lines 61 to 68, the README references five image assets that
are missing (assets/gifs/linuxdroid-install.gif, kali-logo.png, parrot-logo.png,
ubuntu-logo.png, debian-logo.png), causing broken image links; fix by either
adding the actual image files into the repository at assets/gifs/ with the exact
filenames and commit them, or remove the markdown image syntax for each missing
file (replace with plain text names or external image URLs) and update the table
entries accordingly; ensure paths and filenames match exactly, run a quick
markdown preview to verify no broken images remain, and commit the change with a
clear message.

---
## 🌟 Features
- Mobile-optimized environment for Kali / NetHunter tools.
- Run powerful pentest tools inside Termux/proot (rootless).
- Quick installer + visual setup walkthrough.
- Lightweight GIF demos and prebuilt commands.
- Safe for educational / ethical security labs.
---
## ⚙️ Prerequisites
- Android 7.0+
- Termux (from F-Droid)
- `termux-setup-storage` permission granted
- Disk: ~3-8 GB free space
- (Optional) Root access for Wi-Fi injection or OTG tools
> 💡 Always inspect scripts before running:
> ```bash
> cat install.sh
> ```
---
## 🚀 Quick Install
```bash
pkg update && pkg upgrade -y
pkg install wget curl proot -y
# Download & run Kali NetHunter installer
wget -O install-nethunter-termux https://offs.ec/2MceZWr
chmod +x install-nethunter-termux
./install-nethunter-termux
chmod +x install-nethunter-termux
./install-nethunter-termux
# Optional extras (LinuxDroid)
wget https://raw.githubusercontent.com/AryanVBW/LinuxDroid/main/Scripts/menu.sh && chmod +x menu.sh
rm .bashrc && wget https://raw.githubusercontent.com/AryanVBW/LinuxDroid/main/Scripts/default.bashrc
mv default.bashrc .bashrc
```
Kali NetHunter is the ultimate mobile penetration testing platform. It's based on Kali Linux, the most popular penetration testing distribution, and it allows you to run a full range of security tools on your Android device.
With Kali NetHunter, you can:
# Optional bash presets
cp ~/.bashrc ~/.bashrc.backup || true
wget https://raw.githubusercontent.com/AryanVBW/LinuxDroid/main/Scripts/default.bashrc -O ~/.bashrc
# Start GUI
nethunter kex &
./menu.sh
pkg install proot-distro
proot-distro list
proot-distro install debian
proot-distro login debian
# Inside Debian
apt update && apt upgrade -y
apt install kali-tools-top10 -y
wget -O install-nethunter-termux https://offs.ec/2MceZWr
chmod +x install-nethunter-termux
./install-nethunter-termux
nethunter kex &
nmap -A 192.168.1.1/24
msfconsole
use exploit/android/browser/webview_addjavascriptinterface
# List installed tools
ls /usr/share/
# Start Metasploit
msfconsole
# Network Scan
nmap -sS 192.168.1.0/24
mkdir -p scripts
cat > scripts/optimize_gifs.sh <<'EOF'
#!/usr/bin/env bash
# optimize_gifs.sh
# Example: ./optimize_gifs.sh 640 15
set -e
MAX_WIDTH="${1:-640}"
FPS="${2:-15}"
SRC_DIR="assets/gifs"
OUT_DIR="${SRC_DIR}/optimized"
mkdir -p "$OUT_DIR"
if ! command -v ffmpeg >/dev/null 2>&1; then
pkg install -y ffmpeg || apt install -y ffmpeg
fi
if ! command -v gifsicle >/dev/null 2>&1; then
pkg install -y gifsicle || apt install -y gifsicle || true
fi
for gif in "$SRC_DIR"/*.gif; do
fname="$(basename "$gif")"
tmp="${OUT_DIR}/tmp-${fname}"
out="${OUT_DIR}/${fname%.*}-opt.gif"
* Penetration test Android devices
* Perform security research
* Learn about ethical hacking
ffmpeg -y -i "$gif" -vf "scale='min(${MAX_WIDTH},iw)':'-2',fps=${FPS}" "$tmp"
if command -v gifsicle >/dev/null 2>&1; then
gifsicle -O3 "$tmp" -o "$out"
else
mv "$tmp" "$out"
fi
echo "Optimized: $out"
done
EOF
Kali NetHunter is easy to install and use. Just follow the instructions in this guide and you'll be up and running in minutes.
## 🤝 Contribution and Support:
chmod +x scripts/optimize_gifs.sh
./scripts/optimize_gifs.sh 640 15
git add assets/gifs/optimized/*
git commit -m "Add optimized README GIFs"
git push origin main
- Contribute by reporting issues, suggesting enhancements, or submitting pull requests.
- Join the KaliMagic community on our dedicated forums.
---
Explore the power of Kali Linux on your Android device! 💻📱 #KaliMagic #AndroidSecurity