Having metasploit tools in the termux application is a must for those who want to exploit from android. One example is tapping whatsapp using playload from metasploit.
Metasploit size takes up quite a bit of storage space, because its size is above 300mb. Even so, a lot of features are obtained after installing it. One very popular feature is being able to controlling android device remotely.
Installing metasploit can be done from android using termux application or from computer using kali Linux, Ubuntu and other OS.
Because there are many requests from android users, now I will share the tutorial using termux android.
4 Ways to Install Metasploit on Termux Android

In general, the metasploit framework can be installed to termux by simply entering the command pkg install unstable-repo metasploit. Then wait for the installation process to complete.
During the download process, make sure the internet connection is stable and uninterrupted. Because if the connection is lost, the install process will fail and you must clear the data in order to install it again.
Because this installation method is very risky, I have listed 4 other safer ways.
1. MetasploitTechzindia
MetasploitTechzindia is a github repository. That means we will clone the file from there. But here the command used is curl (directly to a file not a folder) not git clone.
OK, just enter the following command:
$ pkg install curl $ curl -LO https://raw.githubusercontent.com/Techzindia/Metasploit_For_Termux/master/metasploitTechzindia.sh $ sh metasploitTechzindia.sh $ cd metasploit-framework $ ./msfconsole
Notes:
Remove the $ logo when writing commands.
sh metasploitTechzindia.sh is the metasploit download process, so wait until the process is complete (10-20 minutes)
./msfconsole is the command to run the already installed metasploit.
2. Verluchie
This is also a repository from github. It’s just that Verluchie uses git clone which means we will install the folder from the metasploit tool.
The name is also a folder, so the main files are inside. Here is how to install and find files in the verluchie folder.
$ apt update && apt upgrade -y $ pkg install git $ git clone https://github.com/verluchie/termux-metasploit $ cd termux-metasploit $ chmod 777 install.sh $ sh install.sh
The result of the clone from metasploit verluchie is a folder with the name termux-metasploit. After opening with command CD then have to be given permission with chmod 777.
Then sh install.sh is the actual install process. Wait until the process is complete.
3. Hax4us
Like other sources, Hax4us metasploit is a file from the github repository. And for installation, just enter all the commands below:
$ apt update && upgrade $ pkg install python $ pkg install python2 $ pkg install git $ pkg install wget $ pkg install ruby $ pkg install curl $ git clone https://github.com/Hax4us/Metasploit_termux$cd metasploit-termux $ ./metasploit.sh $ cd $HOME/metasploit-framework $ ./msfconsole
4. rapid7
Metasploit Rapid7 does not need to be downloaded via termux. But it can be via Android directly such as downloading music files, images, etc.
So if there is a failure, you can resume again. In contrast to the download process via termux, if it fails once, it is immediately corrupted.
Okay, first download the rapid7 metasploit file here
Next move the metasploit file outside any folder on the internal storage. Then enter the following command in the termux application.
$ termux-setup-storage $ pkg install unzip $ cd /sdcard $ unzip metasploit-framework-5.0.0.zip $ cd metasploit-framework-5.0.0.zip $ ./msfconsole
Information:
Unzip is the process of extracting rapid7 files in the form of .zip
Of the 4 options for installing metasploit above, the easiest is the general option (pkg install metasploit). But because you have to download files directly from termux, it’s very risky if the process stops. So it’s safer than a github clone.
After installing metasploit, what next?
Just enter the command that matches the hack you want to do. For example, when creating a backdoor or playload, we simply write the command use multi/handler, etc.
Now for the tutorial on metasploit, I have written it completely on this omcyber blog. Have a good study.