Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

How to create an executable file in command prompt (CMD) like a geek

In this article we are going to discuss how to create an executable file in command prompt, that is, how to create a program (script) that runs in CMD. To be able to do this, you will need to have some knowledge of command prompting, so you should know a few commands in this area.

If you don’t know, no problem; you can use the HELP command to help you with the CMD functions. Then, it will be up to you to continue your research to learn more. Let’s go 😉 !

Before we go any further, I hope you know what the command prompt is. For those who don’t know the command prompt, is the Windows command line interpreter (not a game console or anything like that). It’s used to execute commands. The console is a piece of software, or rather a way of using the operating system by means of commands called console codes. This term is very familiar to users of Linux systems.

Well, by default the text is white and there is no transparency but you can customise it. That’s right! This means that you can do everything under the command prompt and even more than you would do with the GUI. But that’s not what we’re going to talk about today, I’ll tell you about that in another article. Let’s move on to what we are interested in here.

As software, here we will use the Windows Notepad, but you can use a text editor that you want like sublime text or vscode. So the first thing to do is to launch your Notepad, then save it in a place you want (and with a name of your choice) but with the extension .cmd.

Look at the location you have chosen, you will see a nice executable file, you can even try by running it

.But in most cases, you will get a message like this:

If you find such a message, it is simply because your script has no command yet. So to correct it you just have to type commands in the file and save it. I use the HELP command that I mentioned above. If all goes well, when you run the little script it will start and close suddenly unless you used a different command than mine.

Well, CMD scripts are read by the computer as text files (line by line), that is to say, that the computer reads line by line your script. It tries to execute the tasks it understands and then continues if there is no more task to complete it closes the script.

If you want your script to stay open, use a command that either asks for information input or launches another program and then the script will be closed automatically only after closing the program it launched. Try with the DISKPART command to launch Diskpart, a partition manager (storage media in general) provided by Windows. Here are the captures of my two screens.

Then, if you execute this script it will show the message “You are watching the course code of my script” because the command echo help to display the message. And the command diskpart helps to run the small program “diskpart”

This is just a small script but you can add commands and even a complete program with the same principle. Thanks for reading this article, especially feel free to put any problems or recommendations in the comments. 👍👋

How to recover an installation ISO image from a USB stick (bootable).

It happens sometimes that someone loses his operating system installation file, simply because he formatted it when reinstalling the partition that contained the said image, or maybe he had a loss of data due to some event but he still has his installation key (that he had booted).

So, here we will see how to create an installation ISO file from a key that has been booted. For those who don’t know what an ISO file is, I will publish the article “How to reinstall your PC properly like an expert”.


For everything we’re going to talk about to be possible, you need to download PowerISO, because that’s the software we’ll be using here. But, I want to warn you that this software is not free, there is a trial version but it doesn’t manage images bigger than 700 MB, for the ISO images of an OS installation are much bigger than that. So it would be convenient to buy the software on its official site: Download PowerISO.If you already have it, run it.

The PowerISO home screen

This is the home screen of the software in the figure above. Don’t worry if you have downloaded it in a language that doesn’t suit you because it is multilingual. To change the display language, click on the menu Options > Language > Choose the language of your choice.

I’m not going to explain how the whole program works, we’ll just see how to recover an ISO file. Let’s go! First of all, you need a bootable USB stick, that is, one that the computer can boot from. Because we need all the system installation files.

Of course, if you are sure that you have all these files either on your disk in a folder (maybe you have copied them when you found out that you lost the image), you can use them without any problem.

To start, click on the Add button and then go to the directory where these files are located and select everything, without exception.

Before moving on, you need to be sure that all the files are there. To be sure, if it is a USB stick, it will have a special icon depending on the system it contains. Here is the icon of my key because I booted Windows 7 on it. For Windows, here are the files and folders that should generally be there:

As you can see, the key has the setup.exe file icon
After adding all the files (and folders) to your key, you need to save by pressing Save. You can do this in the location of your choice, and as a file type, choose Standard ISO.

Wait until the end of the registration process, it takes time because the file is large, for me it is more than 2 GB but recent versions of Windows go even beyond 4 GB. Once the process is finished, you will find the ISO file you saved. I don’t know if you’ve noticed but at the bottom of the window, it says non-bootable image. This means that you still can’t install (reinstall) a computer with the file you created.

How to make this file bootable and ready for installation?

Bootable ISO images have a special little file that contains the boot information, so this is what you need to add to make your image bootable. Let’s see how this is done. To have a boot information file there are two possibilities: either you get a floppy disk that contains this information, which is a bit complicated; and, the second possibility is to copy this file from another bootable image, and this is what we are going to do.

You may also like to know about How to create an executable file in command prompt (CMD) like a geek

Open with PowerISO another bootable file, which you have, provided that it is of the same OS, they can be different versions like Windows 8 and Windows 10 or 7; then click on Actions > Boot > Save Boot Information…; select a location and give a name then save. You will have a file with the extension “.bif”, this is the Boot information file.

I advise you to keep this file in a safe place, it will be of great help in case of another loss.
Go to the other image, the one we have created, and click on Actions > Boot > Add Boot Information…; a dialogue box will open, select the .bif file you have saved; after that, save your image again because it is already bootable, check, it has changed at the bottom of the window.

And there you have it:

That’s all! Thanks for reading this article, if you encounter any problems put them in the comments.

How to spam your friend using Beast_bomber

Welcome to this article that is about Beast_bomber a spam termux tool. Well if you are here reading this article it’s because you heard about spamming. And I’m sure this is your chance to know about it.

In our last article, we discussed how to use shark for social media hacking on termux, you may have a look if interested. Before we continue with our today article. What I have seen is that most termux users especially beginners make mistakes when starting with termux.

They ignore some crucial steps when starting with termux and that brings them to fail in their learning process. But for that, as I know their problem I prepared some good termux starting posts to help them.

Well, as you can see I chose some beginning posts to help you, but if you still need more you can continue your research.

What are spam and spamming?

a. spam

Anyone who’s spent more than a handful of seconds on the internet has encountered spam. It’s seemingly an inseparable part of the internet experience, something we accept as normal

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

kinds of spam

  • Email spam
  • SEO spam
  • Social networking spam
  • Mobile spam
  • Messaging spam

Also, for those who would like to know more about spam here is a post to read more about spam What is Spam: The Essential Guide to Detecting and Preventing Spam.

b. Spamming

Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.

What is the Beast_bomber?

Then, before we continue let us first discuss what is exactly the Beast_bomber. The Beast_bomber is a termux tool that helps the attacker to send anonymous spam SMS, call, email, WhatsApp, Telegram, Discord and DoS attacker. Using Beast_bomber the attacker has more attack possibilities like:

  • SMS spamming(works better with proxy)
  • Email spamming
  • WhatsApp spamming
  • Discord spamming
  • Telegram spamming
  • And also, DoS attack

How to install Beast_bomber?

Now, for Email spamming to try this attack you must have support for “less secure apps” set to “turn on” on your Gmail. Here is the link to do so: https://www.google.com/settings/security/lesssecureapps. Then the program will configure everything else on its own.

If the automatic setup fails, you can set it up manually. Along with BoMbEr comes a requirements.txt file. This file contains external dependencies. To install them, you need to type the command: pip install -r requirements.txt

Before trying the manual configuration we have to clone the Beast_bomber from GitHub by using the command:

git clone https://github.com/ebankoff/Beast_Bomber.git

The next step is to navigate into the Beast_bomber folder using the command: cd Beast_Bomber

Then, we can perform the manual configuration by using the command:

pip install -r requirements.txt

Now, we are ready to start the Beast_Bomber tool by using the command:

python start.py

Notice: when installing this tool sometimes you can get an error saying that “ModuleNotFoundError”

To solve this kind of error you have only to install the missing module by using your termux terminal using the command:

pip install the name of the required library (example: pip install _ctypes)

Shark termux tool to hack social media accounts

Welcome readers to this article that is about the shark, a termux tool to hack social media accounts. if you are here I guess you are looking for the best tool for you to use to hack social media accounts. Let me give you hope that you are in the right place for any termux tool you can look for. Also in our previous articles, we discuss some termux tools like Zphisher, Fikrado, Adminhack and more

The problem is that most termux users seem to ignore some important information before digging deeper into hacking with termux. Articles that talk about termux package management, the difference between termux to Linux, Graphical management on termux. All these articles should be read by any termux user who wants to know more about termux. But the sad news is that they ignore them.

Also, imagine someone wants to use a phishing tool and yet he or she doesn’t even know what a phishing attack is. What I suggest is to start termux from the beginning before starting performing attacks. Also, you have to know the best hacking tools on termux. Anywhere without wasting time let me introduce you Shark tool.

What is Shark?

A shark is a termux tool that helps the user to generate a Phishing link in an advanced way. And also the good thing with this tool is that no one can detect the generated phishing link except some browsers.

So if you want to use this tool first you have to know what a phishing attack is. A phishing attack is an attack that the attacker performs by creating a fake page that looks like the official one in order to get victim information.

The attacker will use a social engineering attack to influence the victim to click on the phishing link. And you have to know that a phishing attack is a kind of social engineering attack.

Who can install Shark?

Well, to be able to get and install Shark you need to have termux installed on your device. Also for Linux users, they can also install it without a problem. the storage space is also required without forgetting the internet in order to get the tool as it’s on Github.

Also, when installing a shark, it will request your Ngrok token which means you have to get one. But it’s not a must to have it because you can use other servers.

Installation process on Linux

To install Shark on Linux the first thing to do is to update and upgrade your Linux then you can continue the installation. Only with this one command Shark will start the cloning and installation of some needed features.

sudo wget -qO- https://github.com/Bhaviktutorials/shark/raw/master/setup | sudo bash

Then, when the process starts, it will install all Shark features. Then, it will start the installation of Shark. and after that, it will ask you to insert your Ngrok token to continue. And after you finish inserting it and press Enter it will continue automatically.

But if you don’t have a Ngrok token you can just press enter to continue the next step. After all the process of installation, you will be ready to use Shark.

Shark disclaimer

The next thing to do is to press y so that we go on the next screen.

From here we can select any platform we want by using numbers as you can see on the screenshot. In this example, I will select Facebook.

As the screenshot shows we selected 1 that is Facebook then we have to select which phishing page we want to generate.

On this part let me add something. The shark has 3 servers that you can use to generate the phishing link. Ngrok, Cloudflare and localhost, we can choose the one we want to use.

Shark serves

Now as it is shown in the screenshot we have then to select the server we want we can try with Cloudflare because it is the new server added by the project owner.

Then, from here we have to provide the port number or use a default one.

Well done! then we click on N if we don’t want to modify the generated phishing link and now we have the phishing link that we can send to the victim and wait for the output.

Installation process on Termux

Now let us discuss how you can get and install Shark on termux. As you might know, we always start by updating and upgrading termux repositories before we continue. pkg update && upgrade.

after that, we are all ready to start the cloning process. The process to install shark on termux is the same as on Linux. But only on termux, we have to install wget using the command pkg install wget.

Notice: If you are using termux from the playstore you won’t be able to update and upgrade termux. I recommend you to uninstall it and get termux from f-droid

Then you can use the command:

wget -qO- https://github.com/Bhaviktutorials/shark/raw/master/setup | bash

All the processes are the same as on Linux just follow the step and everything will be done. The first step the installation of lib will start then after that the following step will follow.

Conclusion and disclaimer

This article is only for educational purposes we won’t be responsible for any misuse of this tool. Use it for your own risk. Hope this will help you to test your social media account security. You can rate this post to know which one is the best for you. Thanks

Rating: 1 out of 5.

How to earn money with the phone in 2022

Welcome to this article that I’m going to share with you my secret on how to earn money online. I know most of you are familiar with such titles. Because there are many articles over the internet about earning. But the difference between those articles and this is that most of those articles are scams. and because of that people believe that they can’t earn money using their smartphones.

The good news is that today I’m going to present you the legit way to earn money with your smartphones. I have to say this if you are among those who believe they can get rich in one day. Know that this article is not for you. Because there is no way to get rich in a single day, this article is only for those who really want to earn money.

Why do I share this earning technique with you?

Well, if I share this technique with you is because I was also in need of earning online money. And I did a lot of research about online earnings. But the techniques I was getting were about investing before to start and yet I didn’t have money for it. Thank God I got the first platform for small gigs and even today I am still earning money from there if you are interested you can also check the hacking way to earn money online step by step.

After I got that platform I continued doing my research to see if I can get the best platform. And guess what I got an android app that can help me to earn money without even more effort. seriously with the app, we are going to discuss today you are going to be earning money while sleeping.

What? earning money without effort is it possible? Or is this article also a scam?

Let me tell you that even I asked myself those questions for the first day when I saw that app. But I got answers when I started using the app myself. It seems to be a scam but it is not. But one thing I can’t guarantee you is that I don’t really know how much you can earn per day because it depends on you.

How to earn money online using your smartphones?

Without wasting time let me introduce you to this amazing app named Honeygain. We are going to discuss Honeygain maybe some of you heard about it or not but I’m sure you will be surprised.

What is Honeygain?

Honeygain is an app that allows companies to use your connection. Businesses can use your internet through Honeygain’s proxy network for various uses. So, for every 10 MB of data you share, you’ll earn 1 credit. To get paid, you need to save 20,000 credits, which equates to $20. So, Honeygain pays you $1 per 10 GB of data used. The company also pays six credits per hour that content delivery is active.

Here you can read more about What Is Honeygain? Is It Legit? How Does It Work?

Why you should start earning money with Honeygain?

Here I’m going to discuss some reasons why you should start using Honeygain.

  • Easy way to earn passive income

If you are looking for an easy way to earn passive income Honeygain is a good choice. You can start earning with Honeygain, and use the money to pay for a streaming platform subscription, unlock exclusive content on free-to-play video games, or simply treat yourself with a little online shopping spree.

  • Earn without compromising security

Honeygain ensures that your internet traffic is only used by trusted partners, and the app never asks for or gains access to the storage of your device.

  • Estimate your earnings

Your earnings directly depend on the amount of traffic you share with Honeygain’s network. The more you share, the more you earn!

5 steps to start earning money with Honeygain

Let us discuss then the steps to follow to start earning with Honeygain.

  1. Set it up

The first step is to get Honeygain, for that we have to know that Honeygain can be installed on any Windows, Linux, macOS, or Android device with a stable Internet connection. We are going to download the app depending on our device. And also 3 devices recommended. Now we can go to the next step. Here I assume that you have already downloaded and installed Honeygain and we are ready to go.

  • Run Honeygain

After finishing the Honeygain installation, we can then run it to start earning. Once active, Honeygain securely shares your Internet connection, never gaining access to your personal data. The bees will be gathering your data so that you earn money.

  • Get paid

When you reach $20 in earnings, you can request a payout. They work through Tipalti, a California based payment company, but you can get your payout through PayPal. Also with Jumptask joining with a Metamask wallet.

instant payment proof

What we have to do is to create a Metamask account. Then we connect Jumptask to our Metamask wallet using the secret key and then it will be receiving the earnings automatically.

To connect it we have first to create a wallet on Metamask then we will be able to get the secret key that will help us to connect.

Metamask wallet

As you can see I have already created an account. and once I open the Jumptask it requests the connection to the Metamask wallet. Then if everything passes well it will connect.

And then from there, you will be able to see your earnings if you have placed your first withdrawal.

Honeygain referral program

When you sign up for Honeygain, you get a $5 bonus to your account that you can withdraw once you hit $20 in points. They estimate that it takes 48 days to reach $20.

When you refer people to Honeygain, you get 10% of what they earn.

Conclusion

Well, we have reached the end of our today post I hope this will be helpful for you, remember the choice is yours either to earn money or not. But my wish is that you start earning today as I do. And if you have got a question or any suggestion or any other helpful information about earning let us know in the comment section down. Thanks

Zphisher new version on termux

Hello, everybody welcome to this article which is about new Zphisher features. The last time we discussed Zphisher automated phishing tool for termux. Then some of you were complaining that they don’t get the generated phishing link. But in this article, we are going to discuss new Zphisher features and the solution for that issue.

Before we continue for those who are not aware of Zphisher I’m going to give a quick review of it.

Zphisher itself is an automated phishing tool with 30+ templates. With this tool, you can hack social media accounts by only generating a phishing link and sending it to the victim and waiting for the result.

Then, without wasting our time let us start discussing today’s topic so that we can know what is new.

What’s new in Zphisher?

We are going to discuss old and new features because the Zphisher developer had reviewed them. Then, if we can try to see the old features of Zphisher we can see that it had the latest and updated login pages. Zphisher used to update the login pages. And also mask the phishing link into a trusted URL.

Also, the Zphisher developer tried to make it simple so that even beginners can use it without a problem. It also supports Docker, for more information about Docker you can check on the Docker website

  • Latest and updated login pages.
  • Mask URL Support
  • Beginners friendly
  • Docker support
  • Multiple tunneling options (Localhost, Ngrok )

Now, as we have discussed old features let us discuss new features I’m just going to explain the last feature which is the updated one.

New Features

  • Latest and updated login pages.
  • Mask URL support
  • Beginners friendly
  • Docker support (checkout docker-legacy branch)
  • Multiple tunneling options
    • Localhost
    • Ngrok (With or without hotspot)
    • Cloudflared (Alternative of Ngrok)

The new Zphisher feature is Multiple tunnelling. In the previous version of Zphisher, only two tunnels were there and it was required to activate the phone hotspot before running the server. But in this new version, they also add Cloudflare. So now it’s easy to generate a phishing link with Zphisher and send it to the victim.

When you install Zphisher it will automatically install PHP, Cloudflare and others dependencies to avoid errors during the installation or the use of the tool. And also you can select a port forwarding service without problem.

Also, you will now be able to generate a phishing link without turning on your hotspot and no need to have an account on the Ngrok platform. But it’s better to have a Ngrok account, the reason why I suggest you create one.

Disclaimer from Zphisher developer

Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.

This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in a wrong way.

This tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someone’s social media. However, you may try out this at your own risk.

You might also like Zphisher automated phishing tool for termux

Conclusion

Now we have reached the end of our post I hope you guys already know what is new in Zphsher. Also, in the following article, we are going to discuss how to use the new Zphisher to make sure you come back to not miss it. Thanks.

How to Earn money by reusing youtube video

Hello, friend today we are going to discuss how to earn money on youtube without making videos. Well, you may ask the question how possible to earn money without videos (hahaha). Let me tell you that the techniques we are going to learn are simple and are for everybody.

Before you continue reading this article let me ask you this question. Why are you sleeping while others are earning money online?. When we start doing research about online earnings the first thing that comes to our mind is getting free money. But let me tell you that there is no free money online before getting 1$ online you have to work for it.

The good news is that I’m going to share with you my hacking techniques to earn your first money.

You might also like to know the Hacking way to earn money online step by step

The reason why this article is a hacking technique is that you are going to earn your first money without hard work. The purpose of this article is to earn your first money using youtube and get rich without making videos like others. But I don’t guarantee that you get rich but I’m sure you can if you take it seriously.

Then, before we continue I assume that everyone has a youtube channel or if not start by creating one. After you have created it or you own it already you can then proceed reading.

Note: The technique we are going to use is legal don’t worry.

Ways to make money in the YouTube Partner Program

The table below will show you how you can make money on YouTube:

Advertising revenue: Get ad revenue from the display, overlay, and video ads.Channel membershipsYour members make recurring monthly payments in exchange for special perks that you offer.Merch shelfYour fans can browse and buy official branded merchandise that’s showcased on your watch pages.Super Chat & Super StickersYour fans pay to get their messages highlighted in chat streams.YouTube Premium Revenue: Get part of a YouTube Premium subscriber’s subscription fee when they watch your content.

Youtube can’t tell you what you can create, but you are the one to do your choice on what you will create as a creator. Once you are in the YouTube Partner Program, you can earn money through YouTube. When in the YouTube Partner Program, you will be held to a higher standard.

Youtube review your channel before being accepted in the Youtube Partnership Program. And also they constantly review your channels to make sure you are meeting all their policies and guidelines.

How to earn money on YouTube without making videos

To earn money on youtube, you have to first meet the youtube requirements then apply for monetization and then be accepted to the YouTube Partner Program.  

As you might know, youtube doesn’t allow you to republish someone’s video otherwise you will fence the copyright strike. But the videos we are going to use don’t have copyright.

  • Step 1: Planing

Before we start we have first to plan which types of videos are we going to upload on our channel. Example videos for pets, animals, football and so on… After we have decided which kind of videos we want we can then pass to the next step.

  • Step 2: Searching

In this process, we are going to search videos that don’t have copyright I mean the videos that are free to reuse. Then, to get those videos we are going to open youtube using our browser then on the search bar we are going to type the types of videos chosen on step 1. In this article, we are going to use pets as an example

Then, from here we are going to filter all videos about pets, just go on filter then right click then go on creative commons licence from the features panel. Once we have selected that option it will bring tons of videos that we are free to republish. After that, you can download that video using any youtube video download.

I suggest you to use this youtube video downloader. How to download videos with savefrom.net – Videos downloader

Genius step

  • Step 3: Editing the video

Now, as we have downloaded the video we want we can now republish it but I suggest editing the video so that it looks professional. We can take 2 or 3 minutes editing that video and make it look nice then we can republish.

  • Step 4: Publishing the video

This is the last step where we are going to publish our video on our youtube channel and wait for the visitors to come for it. But you are not obliged to close your hand but use them for sharing on social media and or everywhere you can.

Conclusion

Well, done friends this is the end of this article, God bless you and wish you good luck. If you have any questions or suggestions about the next article feel free to comment down and we will try to help. thanks for your time.

FIKRADO.PY THE FACEBOOK HACKING TOOL

Welcome to this article that is about fikrado.py the termux Facebook hacking tool. I’m sure if you are reading this article, it is because you are looking for some solutions. But let me tell you that the solution is here this tool will help you do the task.

Also, in our previous article, we discussed the Pyphisher termux tool to hack social media accounts. This tool looks similar but is not the same you may have a look at it so that you understand that.

Without wasting time let me introduce you to the Fikrado.py tool that we are going to discuss in this article.

What is Fikrado.py?

Fikrado.py is a Facebook hacking Tool script that is fast and user friendly. This tool was created for hacking multiple Facebook accounts using the Facebook API.

Also, you can use this tool on any python 2.7 installed device like Linux, windows, termux.

Who can install this tool?

The answer to this question is that any termux or Linux user can install Fikrado.py without a problem. Also, you must note that no rooting is required.

We are going to see how we can get and install Fikrado.py on termux and Linux.

How to get and install Fikrado on termux?

Well, now we can then discuss the installation on termux. But before we start the installation make sure you have git, python2, lolcat installed on your termux to avoid some errors during installation.

Also, for those who don’t have them let us discuss a bit how to get them. The first thing we are going to do is to update and upgrade termux repositories. Then we can install git using the command:

pkg install git -y

After the installation of the git, we can then continue by installing python2 using the command:

pkg install python2 -y
pkg install python -y

Then, we can install local using python-pip command:

pip install lolcat

Now, as we have all its dependencies we can then get Fikrado from Github by using the command:

git clone https://github.com/fikrado/fikrado.py

Great, if everything has gone well the Fikrado folder will now be on our termux. Then to know if that folder is on our termux we can check by navigating into it by using the command:

cd fikrado.py

Then, we will now be into the fikrado.py folder and we can now run the script for the installation using the command:

python2 fikrado.py

Note: During installation if you get an error saying that no module name requests.

Then, open fikrado.py with a text editor like nano and modify line 5, remove requests. Then save and run the script again.

And then you get the first screen of fikrado.py that is:

How to get and install Fikrado on Linux?

The installation of Fikrado on Linux is the same as on termux but the difference is the first line.

curl https://bootstrap.pypa.io/pip/2.7/get-pip.py --output get-pip.py
sudo python2 get-pip.py
git clone https://github.com/fikrado/fikrado.py
cd fikrado.py
python2 fikrado.py

We have reached the end of our article if any questions or suggestions don’t hesitate to comment down so that we try to give you an answer. Thanks for your time.

Pyphisher termux tool to hack social media account

Hello friends, welcome to this article that is about Pyphisher a termux tool to hack social media account. We are going to discuss this amazing tool that I discover somewhere during my research. You may be in need of testing your social media account password strength or having another reason why to use Pyphisher. You are going to like this tool but it depends on your need.

Well, nowadays social media accounts have become the target of some bad guys or script-kiddies on the internet. They try to hack social media accounts for different reasons like for money, impressing others or other reasons. Before discussing Pyphisher we are going to discuss how they do to hack social media account.

Also, know that Pyphisher works like Zphisher, Anonphisher, Mrphish and other social media hacking tools.

How do hackers do hack social media account?

Even if Facebook is more secure there are some techniques black hackers use to hack Facebook account. We can mention phishing, keylogging, Trojans/backdoors, Sniffing, Social Engineering, and Sessions Hijacking …

These techniques are not the only ones to use. But it depends on the attackers, some can develop their own scripts to perform their attacks and others can use other developers’ scripts. We are going to discuss phishing techniques as Pyphisher is a phishing tool.

phishing

Phishing is one of the easiest ways to trick users into giving out their login credentials. All an attacker does is set up a webpage similar in design to the victim homepage. Then he attach a server-side script to track the username and password entered and store it in a log.

After the attacker finished setting up the server-side then he can send the link by using some attractive words to the victim. The attacker can combine both phishing and social engineering attacks to trick the victim.

The attacker will be waiting for the victim to log in to that fake page and get the information entered and “boom” the account will be hacked. Although some social media started detecting and blocking phishing links. But there is some other way to send a phishing link without getting blocked.

What is Pyphisher?

Pyphisher is the ultimate phishing tool in python. that includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail and many others. With this tool, you can be able to generate a phishing link that can help you get your victim information.

Also, by using this tool you don’t need to root your smartphone because it works on both rooted and unrooted devices. But before using it there are some requirements.

Pyphisher requirements

Well, as you might know, most termux tools required some dependencies before being installed or used. We are going to see what are Pyphisher dependencies and how to get them so that we avoid getting errors during installation.

  • Python(3)
  • PHP
  • Curl
  • Unzip
  • Wget
  • 90MB storage (All files from git clone)
  • 60MB storage (Direct run script without git clone)

Well, you may find that you have some of these dependencies installed on your termux. But if you don’t have them, don’t worry we will discuss how to get them.

Installation of dependencies

Now we can start installing some dependencies before going on to the next step but if you have these dependencies you can go to the next step that is about the installation. But before doing any dependencies installation start by updating and upgrading the termux repository.

Installation of python 3

The installation of python on termux is simple to do, just by using the command:

pkg install python

Installation of php

Then we can proceed to install PHP after we have done with python.

pkg install PHP

Installation of curl and wget

We can install curl and get by using the command:

pkg install curl wget -y

Also, we can’t forget to install git because to get Pyphisher from Github we will use the git command, only use the command:

pkg install git 

Now, as we have seen how we can install all dependencies we can now continue with the installation.

installation process of Pyphisher

By using the command git we are going to get Pyphisher from Github and start the installation.

git clone https://github.com/KasRoudra/PyPhisher

Then, after we have got the Pyphisher folder into our termux we can now navigate into Pyphisher folder using the command: cd PyPhisher. And then to run the Pyphisher script we use the command:

python3 pyphisher.py

When you run the script the installation of Ngrok and Cloudflare will start.

And then after the installation will be finished we will now be ready to use Pyphisher.

Disclaimer

This tool is article is for educational purposes. Here it demonstrates how phishing works. If anybody wants to gain unauthorized access to someone’s social media, he/she may try out this at his/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author is not responsible for any misuse of PyPhisher!

Exit mobile version