All posts by geniusclub

Track IP address in termux with the best tool

Do you need to track IP addresses for your friends or for business purposes? here we are going to see how we can use a Termux tool name “IP Tracer”. This tool makes it simple and easy even a beginner can use it.

Also, we discussed how to install IP-Info on termux in our previous post. Then, if you are a beginner or an advanced termux user we have prepared some interesting articles for you which will help you.

Then, before we continue let us first see what an IP address is because some might know the name IP but don’t know what it is.

What is an IP Address?

An IP address (Internet Protocol ) is a unique numerical label assigned to a device. It provides the location of the device in a network and a route on how to get there. The internet uses an IP address to send IP packets from a source to a destination. It is a building block that lets the internet function.

Also, you have to know that an IP address does not reveal personal information like a name, physical address. Then, as now we know what an IP address s we can now see what the IP Tracker tool is.

also you might like to know about wifi hacking with airgeddon

What is IP Tracer? – Track IP location

IP-Tracer is a Linux tool that is used to track an IP address and identify users, collect online details.

Features

  • Track IP address
  • Track your IP address
  • Update IP-Tracer

Who can install IP Tracker to Track IP address?

IP Tracker was designed and developed for Termux and Linux-based systems. Then, if you are using Termux or one Linux distribution you can use IP Tracker.

Then, before we continue and see how we can get and install IP Tracker make sure you have Termux on your device. And if you have not yet installed termux don’t worry you can read our post about How to hack with your smartphone using termux. And for Linux users, you can read how to start with Kali Linux. best way to follow.

Then, after we have installed what is required, make sure you know some Linux commands. But if you don’t know you can read Basic Linux commands for beginners to advance.

you might like also to know how to hack a Wi-Fi password using a dictionary attack.

How to install IP Tracer?

Now, this is a great time to get and install IP Tracer, as we said we have to install termux. Now we are going to update and upgrade Termux packages. Then, open your terminal and type the command:

apt update && upgrade

After we have updated and upgraded Termux packages we are now going to install git to get IP Tracer from Github. And to install git we use the command:

apt install git -y

Then, we are ready to get IP Tracer from Github if the git was been well installed. Now let us get IP Tracer from Github using the command:

git clone https://github.com/rajkumardusad/IP-Tracer.git

Well done! we can now navigate into the IP Tracer folder to install the tool cloned from Github. We are going to use the Basic Linux commands for beginners.

cd IP-Tracer

Then, we are going to change the permission so that we install properly IP Tracer by using the command:

chmod +x install

Now, after we have done changing the permission of the installation. we are going to install IP Tracer with the command:

sh install or ./install

You might like also Graphical Environment on Termux

Well done! if we have followed all processes we are now ready to use IP trace. Then, let us see how we can use IP tracer.

You might like also to know how to install Nexphisher on termux

How to use IP Tracer to track IP addresses?

Then, as we have IP Tracer installed, we can see that IP Tracer has some features as we have discussed before in this article.

Now, if we want to track our own IP address we use the command:

trace -m

This command will help us to track our own IP addresses. We don’t need to type our own IP address because the tool will do all for us. Then, if we want to track someone IP address we have to use the command:

trace -t target-p

Also, by using this command you have to mention the target IP address. for example tracer -t 12.0.0.1. Then, the tool will provide all information which it will get. Also, if we want to get more information about IP Tracer we can use the command trace.

You might like also to know how to install D-TECT on termux.

Exploit Wi-Fi vulnerabilities with Routersploit on termux and Linux

Welcome user, to this article that is about RouterSploit. In the previous article, we discussed how to hack a Wi-Fi password using a dictionary attack. Then in this article, we are going to discuss how to use Routersploit for vulnerabilities analysis.

Today, routers are a priority target of network attacks that allows the stealing of money and data while bypassing local protection systems. How can you personally check the quality of firmware and adequacy of settings? You can do this by using free utilities, online test services

By using the vulnerable CWMP implementation, an attacker could do practically anything, such as setting and reading the configuration parameters, resetting parameters to their default values, and remotely rebooting the device.

The most common type of attack is to substitute DNS addresses in the router settings for addresses of servers controlled by the attacker. They filter the web requests and redirect those addressed to banking services to fake pages. The fake pages have been created for all popular payment systems, such as PayPal, Visa, MasterCard, QIWI, and others.

Why should you use RouterSploit?

It’s clear that there are always some bad practices that users do when it comes to security. Then, by using RouterSploit you can be the first to discover your Network vulnerability before a hacker discovers it. To discover your device’s vulnerabilities RouterSploit is powerful for that reason why you should use it.

As you know if a hacker arrives to hack your device that means he can have access to your network. Also, he can do any modification and can also get some information he wants.

What is RouterSploit?

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. Also, it consisted of various modules that aid penetration testing operations:

  • exploits – modules that take advantage of identified vulnerabilities
  • creds – modules designed to test credentials against network services
  • scanners – modules that check if a target is vulnerable to any exploit
  • payloads – modules that are responsible for generating payloads for various architectures and injection points
  • generic – modules that perform generic attacks

Who can install this tool?

Before we go to the installation, we have to make sure everyone knows if you have what is required.

Requirements

  • future
  • requests
  • paramiko
  • pysnmp
  • pycrypto

We are going to see how you can install RouterSploit on kali-Linux, Ubuntu 20.04, Ubuntu 18.04, OSx, Docker, and Termux. Now we are going to start with the installation process, we are going to use some basics Linux commands if you are not familiar with Linux you can look at this article Linux for beginners.

Installation process

How to install RouterSploit on kali Linux?

Now, the first step is to install python3 pip, open your Kali Linux terminal then type the command,

apt-get install python3-pip

Then, after that, you can clone RouterSploit from GitHub by using the command. First, you have to choose the destination where you want to store RouterSploit.

git clone https://www.github.com/threat9/routersploit

Now, you have to navigate in the RouterSploit folder with the command.

cd routersploit

Then, we are going to install requirements.txt using python3.

python3 -m pip install -r requirements.txt
then use
python3 rsf.py

Bluetooth Low Energy support:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

How to install RoiterSploit on Ubunu 20.04?

Then, the first step is to install python3 pip, open your Ubuntu terminal then type the command,

sudo apt-get install git python3-pip

Then, get RouterSploit from Github. First, you have to choose the destination where you want to store RouterSploit.

git clone https://www.github.com/threat9/routersploit

Now, you have to navigate in the RouterSploit folder with the command.

cd routersploit

Then, we are going to install requirements.txt using python3.

python3 -m pip install -r requirements.txt
then use
python3 rsf.py

Bluetooth Low Energy support:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

How to install RoiterSploit on Ubuntu 18.04 & 17.04?

Then, the first step is to install python3 pip, open your Ubuntu terminal then type the command,

sudo add-apt-repository universe
sudo apt-get install git python3-pip

Then, after that, you can clone RouterSploit from Github. First, you have to choose the destination where you want to store RouterSploit.

git clone https://www.github.com/threat9/routersploit

Now, you have to navigate in the RouterSploit folder with the command.

cd routersploit

Then, we are going to install requirements.txt using python3.

python3 -m pip install -r requirements.txt
then use
python3 rsf.py

Bluetooth Low Energy support:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Usage of RouterSploit

Then, after installation, you can use the command Routersploit to run this tool.

To list all the RouterSploit options just use the command show all.

Then, a very long list of all the features of Routersploit will appear, each, in turn, allows you to perform all kinds of actions to breach routers. Likewise, other devices capable of connecting to the network such as security cameras can be exploited by this framework. Take a few minutes and you will see how no (especially reputable) manufacturer is immune to vulnerabilities.

Then, if we want to test a particular router, we have to choose the order.

use scvanners/autopwn

Now, we use the command:

show options

As you have seen, it is extremely easy to find a way to breach multiple devices with just RouterSploit. Also, you don’t need a computer or a specialized server for this, remember that, especially Kali Linux distributions, can be used live. So there are more possibilities for a cybercriminal to take control of devices such as Wi-Fi routers.

However, depending on each country, if you try to exploit vulnerabilities and take control of a device that is not originally managed by you, you could face some very serious legal issues. Today we have many options for network devices that we can purchase so that we can set up a small lab in our homes.

Hacking way to earn money online step by step

Welcome readers to this article, which is about to know how you can earn money online. You might be asking yourself how you can earn your first 1 dollar online without investment. Then, let me give you hope because you are in a good place. If you were one day be a victim of an online scam, today you are going to discover the legit way you can earn money.

Earning money online seems to be easy like most people think but it’s really not. There are more than thousands of articles and videos which try to convince people that they can earn money without working. If you read or watched such videos welcome to the team.

I remember when I was trying to know how I can earn my first 1 dollar online, I watched videos that says how you can earn 100 Euros per day. But the bad news is that all those technics were fake and I was upset because of that. Then, one day a friend of mine presented me with an amazing website that I’m going to present to you in this article.

Do you imagine how happy we are when we earn and withdraw our first earning online? without worsting time let me present an amazing website where you can earn your first one dollar.

Picoworkers crowdsourcing site for freelancers and Employers. Earn money online

Then, before we continue let us first define some keywords of our post in order to be at the same angle.

Freelancer & Freelancing

“What is freelancing” Freelancing means to work as an independent company rather than be employed by someone else or performing some online task just at home.

“What is freelancer” Freelancer is self-employed and often referred to as an independent contractor or is a person who works from home independently. Freelancers are hired by other companies or employers on a part-time or short-term basis.

Workers & Employers

“What is a worker” a Worker is a person who does a specified type of work or who works in a specified way. Also, is a person who achieves a specified thing.

Picoworkers

Picoworkers is an American company owned and run by Americans in partnership with administrators from across the world. It is an online marketplace that connects Freelancers around the world with business owners. Businesses that need other people to help them to support their work use Picoworkers. Employers can hire workers for easy and quick jobs.

On behalf of our over a million customers and merchants, we would like to thank the following people for making a responsible disclosure to us:

contributors

parag Bagade

Md.Morsalin

Muhamamd julfikar Hyder

How to earn money with Picoworkers & How it works?

Now, before you start earning money you have first to create an account on Picoworkers. Creating an account is simple and can be done in less than 3 minutes but one thing you have to know is don’t use a VPN when creating an account. Because if you do so the system will reject your demand and think you are a scammer.

Some picoworkers rules.

Use of VPN: Pico Workers has an aggressive policy on the use of VPN and proxy. Users may not use VPN and proxy. This is an initiative on the platform to protect the interests of employers.

It annoys and wastes employer’s time to notice the VPN and proxy on your websites.

Spamming: There are Picoworkers who have the tendency of spamming or sending fake Job Completion Proof without finishing the task. If they catch you with this malpractice, then be ready to get banned.

Multiple accounts: You may not have multiple accounts on the platform. Picoworkers require each Picoworker to have only one account and a unique IP address. Try to avoid logging from any device that another Picoworker had logged in before.

Picoworkers is there to protect the interests of the users from unscrupulous users and this does not make a site a scam. There are many Picowokers reviews out there to get in-depth information on Picoworkers.

How to become a worker on picoworkers to earn money

Then, you need to sign up on Picoworkers, you can use the same account as a Picoworker employer and as Picoworker. Now, to create an account, you can use this link to get your first bonus. Get your first bonus by registering with this link.

Steps:

Sign up on Picoworkers. In this first step, we are going to sign up on Picoworkers. remember don’t use a VPN.

Then, we are going to provide des information needed like, password, Gmail, username. And then, after we have done to fill in the required details then we submit and Picoworkers will send us the verification message to confirm if it’s really your Gmail that you provided.

Then, Once confirmed. You can log in to your account. Picoworkers have a nice interface for workers to complete many tasks within a short time.

This includes a filter option that allows workers to search for jobs by categories, types, paying the amount, and geographical locations.

Because it’s easy to sign up on the platform, there is tight competition for the gigs posted on the site. Many workers make mistakes by hastily doing newly posted jobs rather than searching for jobs that they can perform correctly.

How to work on picoworkers

Now, as we have already an account we are ready to take a task and perform it in order to get paid. Now the first thing to do is to choose any job which can be easy to do. One thing to know is don’t do any task that you won’t be able to submit proof because you won’t get paid if you don’t submit real proof.

Then, after you have selected any task. You will get some instructions on how you can work and what they expect from you. Please before you start the job make sure you read the instructions and understand what you will provide as proof. Because if you won’t get paid if you don’t do the job as expected. Also, if you found that the job you chose is difficult for you to do just leave it and look for another one to find jobs.

After you have read all instructions and you finished doing the job as expected. Now you can submit proof. Remember Pico doesn’t tolerate fake proof, you might be banned if you submit the wrong proof. Then fill in the proof as required and then submit it. After you have submitted the proof the work will be pending waiting for the work owner to approve it.

Then, when the job will be approved and your earning will be credited to your account. And also you can find all your task done in “My tasks”. All tasks done will be listed there.

You might like also Top 6 best OS for penetration testing

When will you be able to withdraw your earning?

Well, if you are curious to know how and when you will withdraw your earnings it’s quite simple with pico when you reached 5$ you will be able to withdraw your earning.

To withdraw your earning you can withdraw via Paypal, Litecoin, Skrill.

Conclusion

Well, hope you enjoyed this piece of information. there are many reviews about pico on google you can check if you want. Also, if any questions or suggestions you are the most welcome, with pico you can earn more money depending on the time you invest in it

TigerShark tool on termux for penetration testing

Hello reader, welcome to this article. We are going to discuss how to install TigerShark in Termux. I’m sure that after you finish reading this article, you are going to decide either to install it or not but I hope you will.

As the title mentioned, you may ask yourself why penetration testing? I know it sounds heavy. But I will explain why. in our previous article, we discussed how to install Nexphisher on termux. Also, we have more than 10 articles on how you can install some special tools on termux.

Now, before we continue with our topic let us first have a look at some keywords. Also, if you are a beginner or new termux user, we have some articles which you can read for a better beginning, we care about you.

Then, it might be your first time or not to hear the word termux. If you don’t know what is it exactly, don’t worry we will discuss it.

What is termux?

Termux is an Android terminal emulator and Linux environment application that works directly with no rooting or setup required. A minimal base system is installed automatically, additional packages are available using the package manager.

The terminal emulator is basically an application that launches the command line program by using system call execve, and redirecting standard input, output and error streams onto the display.

Most terminal applications available on Android OS work with a very limited set of utilities which are usually provided either by the operating system or other rooting tools such as Magisk.

What is penetration testing?

Penetration testing is a type of security testing that is used to test the security of an application. It is conducted to find a security risk that might be present in a system.

When a system is not secure, then it’s easy for an attacker to get into it. Security is normally an accidental error that occurs while developing a system.

Then, as now we know what is termux and penetration testing. let us continue with TigerShark.

What is TigerShark?

TigerShark is a tool that incorporates various different phishing tools, frameworks, domain gathering, and mail spammers to create a fully customizable phishing kit. Also, this kit allows the creation of small to large phishing campaigns.

Additional information about this tool. it was created by s1l3nt78. Also was developed using shell and python languages.

TigerShark installation process

Now, if you don’t have termux you can download it from the play store. Then, open your terminal and update and upgrade termux packages with the command:

apt update && upgrade

Then, in the following step, we have to install git in order to clone TigerShark from Github. You can skip this step if you have git on your termux. Make sure you install git otherwise it won’t work.

apt install git -y

Now, we have to clone TigerShark from Github in order to install it on termux.

git clone https://github.com/s1l3nt78/TigerShark.git

Now, as we have already clone TigerShark from Github we are going to navigate in Nexphisher folded in order to install it.

cd TigerShark
Then, we can now install nexphisher with the command.
bash install.sh or ./install.sh

Then, after all the steps you will have TigerShark on your terminal. you can then use it as you wish.

Warning

This article is only for educational purposes. If you use this tool for other purposes except for education we will not be responsible in such cases.

Nexphisher best termux tool for phishing

Hello, reader welcome to this article named Nexphisher advanced phishing tool. You are about to discover Nexphisher a termux tool that will help you to perform phishing attacks.

You are on a good way to learn about termux hacking tools. we have discussed more than 10 tools of termux. Also, if you are a new termux user don’t worry we have some articles for you. In our previous article, we discussed how to install D-TECT on termux. Also, if you wish you can have a look at other termux tools.

Then, before we continue let first discuss what phishing means because I’m sure some of you don’t know it.

what is a phishing attack?

When you want a victim to install malware or divulge sensitive information, you can use a phishing attack, you pretend to be someone or something else to get a victim to take any action he normally wouldn’t. Since you rely on human curiosity and impulses, phishing attacks can be difficult to stop.

so in a phishing attack, an attacker sends to a victim an email that appears to be from someone he trusts, like his boss or a company he does business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account).

In the email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install the malware on the victim device. If he clicks the link, it may send him to a legitimate-looking website that asks him to log in to access an important file, except the website is actually a trap used to capture his credentials when he tries to log in.

What is Nexphisher?

Nexphisher is an advanced phishing tool that helps the user to create a fake website that looks like the trusted one in order to get the victim’s information.

Also, Nexphisher can work on Linux and also on termux, it requires only some Linux basics in order to install it.

Features

[+] Latest Login Pages!

[+] 5 Port Forwarding Options!

[+] Easy for Beginners!

Nexphisher installation process

Now, before we install make sure you have termux. Also, if you don’t have termux you can download it from play store. Then, open your terminal and update and upgrade termux packages with the command:

apt update && upgrade

Then, in the following step, we have to install git in order to clone Nexphisher from Github. You can skip this step if you have git on your termux.

apt install git -y

After we have done the installation of git, we can now go on the following step that is to clone Nexphisher from Github.

git clone git://github.com/htr-tech/nexphisher.git

Now, as we have already clone Nexphisher from Github we are going to navigate in Nexphisher folded in order to install it.

cd nexphisher
Then, we can now install nexphisher with the command.
bash tmux_setup
bash nexphisher

Warning

This article is only for educational purposes. If you use this tool for other purposes except for education we will not be responsible in such cases.

How to install D-TECT best termux hacking tool

Welcome readers to this article, on how to install D-TECT in termux. I’m sure if you are reading this article it’s because you want to know about this tool. And also I guess maybe you heard about it from your friend or somewhere else. The good news is that you are going to know now about it.

If you are a Termux user, I’m sure you will enjoy this tool and if not just keep reading and I will introduce you to some articles which can help you to start with termux. This tool was designed for penetration testers and security researchers to make their job easier.

Before we discuss the D-TECT tool, I’m sure that some of you don’t know what a penetration tester is. But don’t worry we have an article that can help you to get into the penetration testing field if you wish. Let me also present you our previous article, which was Blackeye best termux complete phishing tool.

What is penetration testing?

Penetration testing is a type of security testing that is used to test the security of an application. It is conducted to find a security risk that might be present in a system.

When a system is not secure, then it’s easy for an attacker to get into it. Security is normally an accidental error that occurs while developing a system.

Penetration testers are ethical hackers. Also known as assurance validators, penetration testers are hired by network system owners and web-based application providers to examine for vulnerabilities that hackers with bad intentions might be able to exploit to collect secure data and intelligence.

What is D-TECT?

D-TECT is an All-In-One Tool for Penetration Testing. This is specially programmed for Penetration Testers and Security Researchers to make their job easier, instead of launching different tools for performing a different task.

D-TECT features

D-TECT provides multiple features and detection features that gather target information and finds different flaws in it.

  • Sub-domain Scanning
  • Port Scanning
  • WordPress Scanning
  • Username Enumeration
  • WordPress Backup Grabbing
  • Sensitive File Detection
  • Same-Site Scripting Scanning
  • Click Jacking Detection
  • Powerful XSS vulnerability scanning
  • SQL Injection vulnerability scanning
  • User-Friendly UI

D-TECT Installation process

Now I assume that you have Termux on your android device. Then let us proceed with the installation, for the first step we are going to update and upgrade termux packages using the command:

apt update && apt upgrade -y

Then, after updating and upgrading, we move to the second step which is to install python. Just do it only if you have not yet installed python otherwise, you can go to the next step.

pkg install python -y
pkg install python2 -y 

Then, we are going to install git, for those who didn’t install it. If you have git installed in your Termux just go on next step.

apt install git -y

Now, we are going to use the command git in order to clone D-TECT from GitHub

git clone https://github.com/HackTeachz/D-TECT

Then, once we have cloned the tool in our Termux, we have then to navigate in the D-TECT folder in order to install it.

cd D-TECT
Then, we use the command for installation
chmod 777* 
pip2 install requests

Warning

we are not responsible for any damage done using this article. This article should only be used for educational purposes and for penetration testing.

Blackeye Best Termux Complete Phishing Tool

Welcome reader, hope you enjoyed our previous article, “IP-Info Termux hacking tool to find any IP address information”. In this article, we are going to discuss the Blackeye Termux tool for phishing attacks.

What I have to tell you is that there are many termux tools for phishing attacks like zphisher, onex, tool-x. Also, if you don’t know about these tools don’t worry you can read about them we have some guides.

Before we continue let us see what a phishing attack is. Because I know some might not know what really phishing is, and I don’t want to let you in ignorance. In this article, you are about to discover the best tool for phishing attacks I’m not saying that it’s the first or the second but I’m sure it’s among the best tools.

What is phishing attack?

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually performed through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine.

Also, we can say that Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.

What is Blackeye?

Blackeye is the most complete phishing tool, with 32 templates + 1 customizable with ngrok and serveo. This tool helps to create a phishing page that will look like the trusted one.

Blackeye is available for both Termux users and Linux users. If you wish to install this tool you have to make sure you have Termux installed or having any Linux distribution like Kali Linux.

Installation process of blackeye

Now I assume that you have all the required tools. Then let us proceed with the installation, for the first step we are going to update and upgrade termux packages using the command:

apt update && apt upgrade -y

Then, we are going to install git, for those who have not yet install it. If you have git installed in your Termux just go on next step.

apt install git -y

Now, we are going to use the command git in order to clone Blackeye from GitHub

git clone https://github.com/Git-Ankitraj/blackeye-im.git

Then, once we have cloned the tool in our Termux, we have then to navigate in the Blackeye folder in order to install it.

cd blackeye-im
Then, we use the command for installation
chmod +x tmxsp.sh 
./tmxsp.sh

Warning and Disclaimer

Usage of BlackEye for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. This article is only used for educational purposes.

IP-Info best Termux hacking tool to find any IP Address information

Welcome again reader to this article, in which we are going to discuss IP-Info. We are going to discuss why to use it and so on. There are several ways to do it but in this article, we are going to discuss the IP-Info. Also, you might like to know about Infect best hacking tool to send an android virus.

Also, if you are a beginner using Termux we prepared some articles which can help you in your Termux user journey. Don’t hesitate to have a look at them.

Now, let us discuss what IP-Info is.

What is IP-Info?

IP-Info is a python script to scan IP addresses and give you results about the target IP address. This script will help you to find victim region, country, date and time, city, ISP, Lat and Lon, zip code, time zone, and AS.

Who can install this tool?

IP-Info tool works in Termux and Kali Linux and it was specially designed for beginners. IP-Info can work in both rooted phones and non-rooted. In this article, we are going to see how you can install it on Termux if you are a new user of Termux consider this article as the beginning of Termux, how to hack with your smartphone using Termux.

IP Info dependencies

Before we install the tool we have first to install its dependencies. Otherwise, an error will occur during the installation.

  • git

IP-Info Installation process

Then, this is the time we have to install IP-Info on our Termux, make sure you have already downloaded and installed Termux from the play store. Also, we are going to update and upgrade our Termux packages using the command:

apt update && apt upgrade -y

Then, we are going to install git, for those who have not yet install it. If you have git installed in your Termux just go on next step.

apt install git -y

Now, we are going to use the command git in order to clone IP-Tool from GitHub.

git clone https://github.com/vpphacker/ipinfo.git

Then, once we have cloned the tool in our Termux, we have then to navigate in the IP info folder in order to install it.

cd ipinfo
Then, we use the command for installation
sh install.sh

Also, for the last step you must install python3 in order to run Ip info, use the command:

pkg install python -y

Then, to run IP-Info run this command:

python3 ipinfo.py

Warning

Also, you have to know that this article is only for educational purposes. If you use this article for other purposes except for education we will not be responsible for your bad acts.

What is a Vpn, and why you need one.

Have you ever connected to a public Wi-Fi network and wondered if someone, somewhere might be able to see your online activity?. No one likes to be watched and tracked even if you have nothing to hide. That’s why you need to step up your privacy game. In this post, we are going to see few more reasons why you need a VPN.

Governments, advertisers, and even hackers may be trying to monitor your browsing history. Without a VPN, your internet service provider (ISP) could be recording your online activity and selling it to the highest bidder.

In our previous article, we discussed how to access the dark web safely, also the importance of using a VPN when accessing the dark web. And also we discussed how to use the Tor browser under a VPN. Now, if you are interested in accessing the dark web you should have a look at it.

What is a VPN?

VPN stands for “virtual private network” – a service that protects your internet connection and privacy online. It creates an encrypted tunnel for your data, protects your online identity by hiding your IP address, and allows you to use public Wi-Fi hotspots safely.

When using a VPN it encrypts your data and redirects it through a secure server. You can browse online and act as you normally would, but outside observers won’t be able to see what you’re doing or track your location.

Try NordVPN – save big and get 3 months FREE

30- day money back guarantee

Get secure and private access on internet

Get NordVPN today. Cancel anytime.

How does a VPN works?

VPNs essentially create a data tunnel between your local network and an exit node in another location, which could be thousands of miles away. Also, it makes it seem as if you’re in another place. This benefit allows online freedom, or the ability to access your favorite apps and websites while on the go.

When your VPN is on, your browsing data is encrypted. Also, are sent to a secure server, and decrypted, before being passed on to their original destination. Even if a hacker can intercept your data along the way, all they’d see would be code.

The good thing is that even your ISP won’t be able to monitor you. Using a VPN is a simple and effective way to maintain your privacy. Out of a VPN, your ISP can know your entire browsing history. A VPN service provider may have servers all over the world. That means your search activity could appear to originate at any one of them.

Also, keep in mind that Search engines also track your search history, but they’ll associate that information with an IP address that’s not yours. A VPN can hide a lot of information that can put your privacy at risk.

However, it’s helpful to know how a VPN works to understand the service better. Here is what is going on behind the scene:

  • When you connect to a VPN service, it authenticates your client with a VPN server.
  • The server then applies an encryption protocol to all the data you send and receive.
  • Then, the VPN service creates an encrypted “tunnel” over the internet. This secures the data traveling between you and your destination.
  • Also, to ensure each data packacket stays secure, a VPN wraps it in an outer packet, which is then encrypted through encapsulation. This is the core element of the VPN tunnel,keeping the data safe during transfer
  • When the data arrives at the server, the outer packet is removed through a decryption process.

Why do yo need a VPN?

As I said no one likes to be watched and tracked even if you think you have nothing to hide. Here are a few more reasons why you need a VPN:

To be safe when using public Wi-Fi regularly

A VPN is your best friend when using Wi-Fi. Hackers have many methods to steal your data on public hotspots, but the good news is that when using a VPN you can stop worrying about that. If you are among people who want to browse in full privacy you should use a VPN to secure your connection.

To mask your IP address and location

If someone captures your IP address he can also access your search history and also your location. Remember your IP address identifies your device over the internet. So, since you use a VPN it’s the IP address provided by the VPN which will be seen over the internet.

It will allow you to maintain your online privacy and search the web anonymously. Also, you will be protected against your search history gathered, viewed, or sold.

Access blocked content

One of the most popular things a VPN is used for is content access. If you are a fan of streaming services and social networks while abroad is important for you to use a VPN. using a VPN, will directly change your IP address and redirects your connection to the internet through a remote server.

Avoid tracking and surveillance

Government agencies track and collect your browsing activity, messages, social posts, and other private data. A VPN protects you from being tracked by encrypting your traffic and hiding your IP address.

What should you look for when choosing a VPN?

Speed, Security and Privacy

Choosing a VPN depends on your need but here I’m going to gives you general points. When you want to choose a VPN you have to ask yourself 3 questions before choosing a provider. How fast is it? will it keep my data safe? and will it respect my privacy? Of course, everyone needs safe connections and his data to stay private.

If a VPN doesn’t respect your privacy no need to use it, because the point of using a VPN is to protect your privacy, so it’s crucial that your VPN provider respects your privacy. Also, make sure that they never track or log your online activities.

Also, make sure to know if they do set data limits. Because depending on your internet usage, bandwidth may be a large deciding factor for you to make sure their services match your needs by checking to see if you’ll get full unmetered bandwidth without limits.

There are many points to consider when you’re choosing a VPN the job is for you to make sure you’re getting the right for your needs.

Why you should use a VPN at home?

You may ask yourself why you need a VPN at home and yet you are using your own Wi-Fi. But know that you do need one because it increases your protection and privacy online. Here are some ways you can use a VPN at your home:

  • Protect yourself against cybercrime

When using a VPN, you make it much harder for attackers to access your private information. Even if they target your device with routers hack or MITM attacks, they won’t be able to decrypt your data.

  • Bypass geographical restrictions

A good VPN provider will maintain servers across the globe. that means you can funnel your data through an IP address in another country, bypassing any local browsing restrictions.

  • Maintain personal privacy

Everyone has a right to privacy, both in the real world and online. But there’s no shortage of people and corporations who would like to get a look at your browsing activity. In fact, many ISPs are legally allowed to sell your data to corporations, advertisers, research bodies, and government agencies.

For all of the reasons we’ve mentioned here, we strongly recommend using a VPN, both at home and elsewhere.

In this article I feel happy to present you NordVPN one of good VPN i have never used. With NordVPN No need to buy VPN subscriptions separately for your phone and PC.

NordVPN secures up to 6 devices and is compatible with Windows, macOS, Linux, Android, iOS, and even your Wi-Fi router.

Black Mafia PUBG best Termux Tool for Phishing

Now, if you are fun of the PUBG game and don’t have an account on that platform. This article is about how you can create a phishing page. That page will look like the official web page of PUBG and help you to get someone’s username and password.

Then, before we continue this article, know that we are going to use Termux. Then, if you are a new user of Termux consider reading How to hack with your smartphone using Termux.

Also, if you are a beginner using Termux we prepared some articles which can help you in your Termux user journey.

Then, I hope these articles, will help any beginner to use Termux.

What is PUBG (PlayerUnknown’s Battlegrounds)?

PlayerUnknown’s Battlegrounds (PUBG) is an online multiplayer battle royale game developed and published by PUBG Corporation, a subsidiary of South Korean video game company Bluehole. Also, Battlegrounds is a player versus player shooter game in which up to one hundred players fight in a battle royale, a type of large-scale last man standing deathmatch where players fight to remain the last alive.

PlayerUnknown’s Battlegrounds Mobile game is published by Tencent Games and is available for Android and iOS (i.e., iPhone). 

The game started phased roll-out on 19 March 2018 and went on to become one of the most downloaded and played games on both Android and iOS. In September 2020 PUBG Mobile was banned in India, many believe because of tensions between China and India.

How much does PUBG Mobile cost? 

The game itself is free to download and free to play. There is a rewards system within the game that will let you earn coins for your participation and completing various challenges – like login every day, travel a particular distance, or survive a particular length of time.

These coins can then be used to buy items in the game – like clothing. Otherwise, you have to collect the clothing in the game and you start in your underwear. 

You can buy in-game currency to purchase a wide range of skins and accessories.

What is Black Mafia Phishing Tool?

Black Mafia is a Termux tool that helps to create a PUBG phishing page that looks like the official one. And then, once you create that phishing page and when any user puts their username and password on that phishing page you will get the Credential in your Termux terminal and you will be able to use his account.

Also, this is a very simple phishing tool that uses Ngrok for port forwarding. A good thing about this tool is that It will give you a masked link that will already look like the original PUBG link.

Black Mafia Phishing tool is created by lovehacker404  and you can check out his tool on github @Lovehacker404/Phishing.

How to install Mafia Tool works?

Then, before we start the installation process you need to have Termux installed on your smartphone. The following step is to update and upgrade termux packages.

apt update && apt upgrade -y

After, once you have finished updating and upgrading Termux packages you then continue with the next step. Also, know that before we install the Mafia tool there are some dependencies that we must install first in order for Mafia to work properly.

Black Mafia Tool dependencies

Mafia dependecies are php, wget, git. Now I have to mention that if these dependencies are missing you will get errors during installation. Also, know that if you have already installed them no need to do it again.

apt install php -y && apt install wget -y
apt install git -y

Then, termux will install all dependencies and now once it is done we are ready to install Black Mafia Tool. Now this following step we are going to clone the Black Mafia tool from GitHub in order to install it.

git clone https://github.com/lovehacker404/Phishing

Now we are going to change the directory to the Black Mafia directory using the command cd. Also, when we get into the Black Mafia directory we can now install it with the command bash.

cd Phishing
bash BlackMafia.sh

Now we have seen how to install BlackMafia, then let us see some use of it.

Usage of Black Mafia for attacking targets without prior mutual consent is illegal. Also, It’s the end user’s responsibility to obey all applicable local, state, and federal laws. we assume no liability and are not responsible for any misuse or damage caused by this article.

Black Mafia Usage. PUBG phishing tool

Then, after we have done the installation we will be prompt on the screen below. from here you can select any option you want, then in this article, we start with option 1.

The next step is to choose the port forwarding option. Just you need to choose and make sure your hotspot is on it’s a must.

once you select option 2 and press enter, it will check if Ngrok is installed in your termux if not it will proceed with the installation of it. Also, know that sometimes you may get an error during link generation but if you restart termux it will solve the issue.

Then, it will generate a link, that link is the link that you will send to your victim and wait. know that for the victim to click the link you have to use some social engineering in order to convince him to follow your link.

“Eg: hey, friend do you know that PUBG game did some updates and add some new features, it’s super amazing here is the updated link”. Also, if you want your phishing link to look trusted one must read this post: Termux command to hide a phishing link under trusted URL.

Now the last step is for you to wait if you have done your work properly you will get a good result if not. retry again.

Warning

Remember this article is only for education purposes we assume no liability and we won’t responsible for any misuse or damage caused by this article.

You may like also how to install onex best termux hacking tool