{"id":11399,"date":"2022-01-01T15:00:05","date_gmt":"2022-01-01T15:00:05","guid":{"rendered":"https:\/\/www.securedyou.com\/?p=11399"},"modified":"2022-01-01T18:32:29","modified_gmt":"2022-01-01T18:32:29","slug":"termux-commands-list-pdf-download","status":"publish","type":"post","link":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/","title":{"rendered":"24 Useful Termux Commands List 2022 – PDF Download"},"content":{"rendered":"

\"Termux<\/p>\n

As ethical hackers, we mostly prefer PocketCHIP or a Raspberry Pi that too with a screen rather than a mobile device or tablet when it comes to ultra-mobile computing. All the solutions provided an environment that is purely Linux which is as open source as the hardware allows and make no assumptions on how we expect to work. This article holds the important Termux commands list that you can also save as a PDF if you wish to.<\/strong><\/p>\n

Most of the time all we have with us is our mobile phone. While there are some great android applications out there in the market, many feel such as overkill for very simple tasks, especially having in mind how much can be done in a simple terminal on a Linux desktop. We feel like this and this is the reason why the Termux project came into being.<\/p>\n

About Termux and command-line interface<\/b><\/h2>\n

Termux is a terminal emulator and Linux environment application for android. With this, you do not need to root your device.<\/p>\n

It automatically installs a minimal base system plus more packages are there using package manager just like you do with Debian, Fedora and many others.<\/p>\n

Once it has been installed on your phone, you have a minimal Linux system running as an app on your android device. You can use most of the usual terminal apps which you are familiar with or you can become familiar as now you have them installed on your phone device. Above all, it provides software Ctrl, Alt, Esc and arrow keys, so important keystroke shortcuts are quite easy to type even on the virtual keyboard. Prefer using a Bluetooth keyboard with yourself to use it as easy as a terminal on a desktop or laptop.<\/p>\n

It runs Bash by default:<\/p>\n

$ echo $0\r\n\/data\/data\/com.termux\/files\/usr\/bin\/bash\r\n<\/code><\/pre>\n

Most commands shall work as expected whether they are built-in bash commands or usual Linux commands and utils. Others include Zsh and tcsh.<\/p>\n

For this, you can either use Google Playstore or open-source application repository F-Droid<\/a>.<\/p>\n

Moreover, you can also download the source compile it all by yourself.<\/p>\n

Why Termux is ideal for hacking<\/strong><\/h2>\n

\"Termux<\/p>\n

Installing Commands<\/strong><\/h3>\n

If you are used to this even HomeBrew on Mac or Chocolatey on Windows then you know how to install more commands for this. Apt from Debian Linux is its backend package but it uses pkg <\/em>command as a simplified frontend interface. The result approximates the consistent simplicity of the DNF experience of Fedora plus we would love to see pkg as an abstraction layer on some more platforms (imagine using the same package management on commands such as RHEL, Slackware and Debian).<\/p>\n

We installed a simple text editor as our first package:<\/p>\n

$ pkg search jed\r\n[...]\r\njed\/stable 5.7-5 aarch66\r\nLightweight text editor\r\n$ pkg install jed\r\n<\/code><\/pre>\n

Jed running was as same as running it on RHEL desktop. Both of these run in the terminal and also use the same keyboard shortcuts.<\/p>\n

Remote Control<\/strong><\/h3>\n

A text editor is one thing, but it reveals its true potential the very first time we SSH into a system. Through this we can log into a simple system on any network we have access to, if you carry with yourself a portable console then you can use it either as a host or as a terminal for any amount of computing power that is available.<\/p>\n

Now all this does not end with SSH to be clear, there exists a Termux package for KubectI, therefore, by using the \u201cuse-context\u201d option in this then you can maintain the Kubernetes cluster from anywhere.<\/p>\n

A very helpful community<\/strong><\/h3>\n

The best thing about this which we personally like is that removes a significant barrier that contributes to a mobile project, the current platforms of open source mobile are Android or Android-based which require a special toolchain and good knowledge of Java.<\/p>\n

By nature, it shields a potential new contributor from much of that as you could write packages or this without even knowing anything regarding android. You can also create a package definition for this as long you know how to write a script shell as you are writing one for Termux subsystems.<\/p>\n

Put Terminal in pocket<\/strong><\/h3>\n

This is a good way to learn about the Linux terminal and yes it is quite easy to install as well. Just put it on your phone or tablet and then check out some terminal basics as well as a bash cheat sheet and then transform the way you love using your mobile phone.<\/p>\n

Termux Commands List For 2022 (WiFi Password Hacking, Facebook Cloning)<\/strong><\/h2>\n

\"Termux<\/p>\n

Clear Screen (Clears all the clutter)<\/strong><\/h3>\n

For this, you need to run the clear command:<\/p>\n

Clear\r\n<\/code><\/pre>\n

Show your current directory<\/strong><\/h3>\n

This one tells regarding the directory which is working for the moment:<\/p>\n

pwd\r\n<\/code><\/pre>\n

Changing Directory<\/strong><\/h3>\n

The cd command is used for this, just type in cd and name of the directory, we are moving in \/hacks directory<\/p>\n

cd \/hacks\r\n<\/code><\/pre>\n

Move back directory<\/strong><\/h3>\n

You can back one directory if you want by using cd, if you want to back 2 you can use cd..\/..\/ command:<\/p>\n

cd ..\r\n\r\ncd ..\/..\/\r\n<\/code><\/pre>\n

Create a new file of any type<\/strong><\/h3>\n

Use touch command to create a file:<\/p>\n

Touch \r\n<\/code><\/pre>\n

Creating new directory<\/strong><\/h3>\n

MKdir stands for creating a new one, for this:<\/p>\n

mkdir \r\n<\/code><\/pre>\n

Deleting a directory or any file<\/strong><\/h3>\n

Type in Rmdir <delete directory-name> and hit enter. To delete a directory and its contents recursively rm \u2013rf:<\/p>\n

rmdir \r\nrm \u2013rf \r\n<\/code><\/pre>\n

Delete a single file<\/strong><\/h3>\n

For this use the following command and press enter<\/p>\n

rm\r\n<\/code><\/pre>\n

RELATED READ:<\/strong> Basic and Starter Bash Commands for Ubuntu.<\/a><\/p>\n

Renaming any file and moving it<\/strong><\/h3>\n

Mv is a Linux command-line utility used for this purpose. For this use:<\/p>\n

mv  \r\n\r\nmv \u2013r \r\n<\/code><\/pre>\n

File and directory copy<\/strong><\/h3>\n

For this use cp \u2013r copy directories and their contents:<\/p>\n

cp  \r\n\r\ncp \u2013r  \r\n<\/code><\/pre>\n

Nano and Vim in Termux<\/strong><\/h3>\n

The most useful editor out of all the command line editors it has is vi and nano. If already you have a file then run the vi <filename>, enter edit mode by pressing \u201ci\u201d after editing the file hit the escape button and type in \u201c:wq\u201d write and quiet.<\/p>\n

For nano type in nano <filename>, edit and save it by using \u201cCtrl+x\u201d, type y for y, press enter.<\/p>\n

vi \r\nnano \r\n<\/code><\/pre>\n

Read the content of any file<\/strong><\/h3>\n

For this, you need to use the following command:<\/p>\n

eat \r\n<\/code><\/pre>\n

All running background processes using top or htop<\/strong><\/h3>\n

Use the top command for this<\/p>\n

Top\r\n\r\nHtop\r\n<\/code><\/pre>\n

Changing file\/directory or group permissions<\/strong><\/h3>\n

This can be done easily. To execute permission to run the command \u201cChmod +x <file-name>\u201d if you wish to change the owner, run \u201c(chown yournewuser:yournewgroup <filename>:<\/p>\n

chmod (permission-mode) \r\n\r\nchown (newuser:newgroup) \r\n<\/code><\/pre>\n

Clone source code from Github – FB Clone Hack<\/strong><\/h3>\n

\"Termux<\/p>\n

For this use command<\/p>\n

git clone \r\n<\/code><\/pre>\n

Download anything using wget or curl<\/strong><\/h3>\n

To get file via terminal then there are many tools but mostly we use these tools<\/p>\n

wget \r\n\r\ncurl  -o \r\n<\/code><\/pre>\n

ALSO READ:<\/strong> Powerful Metasploit Commands to Hack.<\/a><\/p>\n

History all previous run command<\/strong><\/h3>\n

To check all the bash or history run:<\/p>\n

history\r\n<\/code><\/pre>\n

See what Installed Packages you have<\/b><\/h3>\n

The following is used to display a list of installed packages<\/span><\/h3>\n
dpkg \u2013list\r\n<\/code><\/pre>\n

Install new WiFi password hack<\/strong><\/h3>\n

\"Wifi<\/p>\n

Now if you want to install python3 then run <pkg install python3>, you shall see a promote type y for yes and it shall be installed. You can also use to install tools such as Kali NetHunter<\/a>, Wifite<\/a> and RouterSploit.<\/a><\/p>\n

pkg install \r\n<\/code><\/pre>\n

Guide:<\/strong> Hack WiFi Passwords on Termux with the PMKID Vulnerability.<\/a><\/p>\n

Remove installed hacks<\/strong><\/h3>\n

For this use following command<\/p>\n

apt update && apt upgrade \u2013y\r\n<\/code><\/pre>\n

Update package mirrors<\/strong><\/h3>\n

If you add the new repository in source.list file, before installing a new package just run the following:<\/p>\n

apt update\r\n<\/code><\/pre>\n

This is an Android terminal emulator and Linux environment android application that works both with and without root. The terminal base is automatically installed plus more packages are available by using the APT package manager.<\/p>\n

ALSO READ:<\/strong> Top Kali Linux Hacker Commands PDF List.<\/a><\/p>\n

Conclusion: Which Termux hack commands are you using?<\/strong><\/h2>\n

These were all the best Termux commands list in PDF that you can download for hacking. The most popular ones are linked to password cracking<\/a> and WiFi hacking which is great if you are using this emulator. It is a full-blown Linux in the palm of your hand. Do let me know which one of these terminal commands have you ever used or if you have any better alternatives! Cheers.<\/p>\n","protected":false},"excerpt":{"rendered":"

As ethical hackers, we mostly prefer PocketCHIP or a Raspberry Pi that too with a screen rather than a mobile device or tablet when it comes to ultra-mobile computing. All the solutions provided an environment that is purely Linux which is as open source as the hardware allows and make no assumptions on how we […]<\/p>\n","protected":false},"author":1,"featured_media":11400,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[44,587,42],"tags":[3428,3064,3062,3063],"yoast_head":"\n24 Useful Termux Commands List 2022 - PDF Download - SecuredYou<\/title>\n<meta name=\"description\" content=\"Here is the Termux commands list 2022 that you can download as PDF. This includes various hack commands for WiFi password cracking and Facebook cloning.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"24 Useful Termux Commands List 2022 - PDF Download - SecuredYou\" \/>\n<meta property=\"og:description\" content=\"Here is the Termux commands list 2022 that you can download as PDF. This includes various hack commands for WiFi password cracking and Facebook cloning.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\" \/>\n<meta property=\"og:site_name\" content=\"SecuredYou\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/securedyou\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-01T15:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-01T18:32:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2021\/05\/Termux-Commands-List-PDF-Download.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"721\" \/>\n\t<meta property=\"og:image:height\" content=\"275\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shaheer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@secured_you\" \/>\n<meta name=\"twitter:site\" content=\"@secured_you\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaheer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\"},\"author\":{\"name\":\"Shaheer\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8\"},\"headline\":\"24 Useful Termux Commands List 2022 – PDF Download\",\"datePublished\":\"2022-01-01T15:00:05+00:00\",\"dateModified\":\"2022-01-01T18:32:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\"},\"wordCount\":1358,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.securedyou.com\/#organization\"},\"keywords\":[\"Termux Commands List 2022\",\"Termux commands list download\",\"Termux Commands List PDF\",\"Termux hack commands list\"],\"articleSection\":[\"Android\",\"Hacking\",\"How to\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\",\"url\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\",\"name\":\"24 Useful Termux Commands List 2022 - PDF Download - SecuredYou\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedyou.com\/#website\"},\"datePublished\":\"2022-01-01T15:00:05+00:00\",\"dateModified\":\"2022-01-01T18:32:29+00:00\",\"description\":\"Here is the Termux commands list 2022 that you can download as PDF. This includes various hack commands for WiFi password cracking and Facebook cloning.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securedyou.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"24 Useful Termux Commands List 2022 – PDF Download\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securedyou.com\/#website\",\"url\":\"https:\/\/www.securedyou.com\/\",\"name\":\"SecuredYou\",\"description\":\"Cyber Security Tips - Guides - How-tos\",\"publisher\":{\"@id\":\"https:\/\/www.securedyou.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securedyou.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securedyou.com\/#organization\",\"name\":\"SecuredYou\",\"url\":\"https:\/\/www.securedyou.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png\",\"contentUrl\":\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png\",\"width\":430,\"height\":82,\"caption\":\"SecuredYou\"},\"image\":{\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/securedyou\/\",\"https:\/\/twitter.com\/secured_you\",\"https:\/\/www.instagram.com\/securedyou\/\",\"https:\/\/www.linkedin.com\/company\/secured-you\/\",\"https:\/\/www.pinterest.com\/securedyou\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8\",\"name\":\"Shaheer\",\"description\":\"Shaheer is the founder of SecuredYou. He is a cybersecurity freak and loves anything related to Computers and Technology. Apart from being a tech geek, he loves listening to music and going to the gym.\",\"sameAs\":[\"https:\/\/www.securedyou.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"24 Useful Termux Commands List 2022 - PDF Download - SecuredYou","description":"Here is the Termux commands list 2022 that you can download as PDF. This includes various hack commands for WiFi password cracking and Facebook cloning.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/","og_locale":"en_US","og_type":"article","og_title":"24 Useful Termux Commands List 2022 - PDF Download - SecuredYou","og_description":"Here is the Termux commands list 2022 that you can download as PDF. This includes various hack commands for WiFi password cracking and Facebook cloning.","og_url":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/","og_site_name":"SecuredYou","article_publisher":"https:\/\/www.facebook.com\/securedyou\/","article_published_time":"2022-01-01T15:00:05+00:00","article_modified_time":"2022-01-01T18:32:29+00:00","og_image":[{"width":721,"height":275,"url":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2021\/05\/Termux-Commands-List-PDF-Download.jpg","type":"image\/jpeg"}],"author":"Shaheer","twitter_card":"summary_large_image","twitter_creator":"@secured_you","twitter_site":"@secured_you","twitter_misc":{"Written by":"Shaheer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#article","isPartOf":{"@id":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/"},"author":{"name":"Shaheer","@id":"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8"},"headline":"24 Useful Termux Commands List 2022 – PDF Download","datePublished":"2022-01-01T15:00:05+00:00","dateModified":"2022-01-01T18:32:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/"},"wordCount":1358,"commentCount":0,"publisher":{"@id":"https:\/\/www.securedyou.com\/#organization"},"keywords":["Termux Commands List 2022","Termux commands list download","Termux Commands List PDF","Termux hack commands list"],"articleSection":["Android","Hacking","How to"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/","url":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/","name":"24 Useful Termux Commands List 2022 - PDF Download - SecuredYou","isPartOf":{"@id":"https:\/\/www.securedyou.com\/#website"},"datePublished":"2022-01-01T15:00:05+00:00","dateModified":"2022-01-01T18:32:29+00:00","description":"Here is the Termux commands list 2022 that you can download as PDF. This includes various hack commands for WiFi password cracking and Facebook cloning.","breadcrumb":{"@id":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securedyou.com\/termux-commands-list-pdf-download\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securedyou.com\/"},{"@type":"ListItem","position":2,"name":"24 Useful Termux Commands List 2022 – PDF Download"}]},{"@type":"WebSite","@id":"https:\/\/www.securedyou.com\/#website","url":"https:\/\/www.securedyou.com\/","name":"SecuredYou","description":"Cyber Security Tips - Guides - How-tos","publisher":{"@id":"https:\/\/www.securedyou.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securedyou.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securedyou.com\/#organization","name":"SecuredYou","url":"https:\/\/www.securedyou.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png","contentUrl":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png","width":430,"height":82,"caption":"SecuredYou"},"image":{"@id":"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/securedyou\/","https:\/\/twitter.com\/secured_you","https:\/\/www.instagram.com\/securedyou\/","https:\/\/www.linkedin.com\/company\/secured-you\/","https:\/\/www.pinterest.com\/securedyou\/"]},{"@type":"Person","@id":"https:\/\/www.securedyou.com\/#\/schema\/person\/6300c81b17db0c018436aa93d15126c8","name":"Shaheer","description":"Shaheer is the founder of SecuredYou. He is a cybersecurity freak and loves anything related to Computers and Technology. Apart from being a tech geek, he loves listening to music and going to the gym.","sameAs":["https:\/\/www.securedyou.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts\/11399"}],"collection":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/comments?post=11399"}],"version-history":[{"count":0,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts\/11399\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/media\/11400"}],"wp:attachment":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/media?parent=11399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/categories?post=11399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/tags?post=11399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}