All posts by geniusclub

How to spam your friend using Beast_bomber

Welcome to this article that is about Beast_bomber a spam termux tool. Well if you are here reading this article it’s because you heard about spamming. And I’m sure this is your chance to know about it.

In our last article, we discussed how to use shark for social media hacking on termux, you may have a look if interested. Before we continue with our today article. What I have seen is that most termux users especially beginners make mistakes when starting with termux.

They ignore some crucial steps when starting with termux and that brings them to fail in their learning process. But for that, as I know their problem I prepared some good termux starting posts to help them.

Well, as you can see I chose some beginning posts to help you, but if you still need more you can continue your research.

What are spam and spamming?

a. spam

Anyone who’s spent more than a handful of seconds on the internet has encountered spam. It’s seemingly an inseparable part of the internet experience, something we accept as normal

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

kinds of spam

  • Email spam
  • SEO spam
  • Social networking spam
  • Mobile spam
  • Messaging spam

Also, for those who would like to know more about spam here is a post to read more about spam What is Spam: The Essential Guide to Detecting and Preventing Spam.

b. Spamming

Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.

What is the Beast_bomber?

Then, before we continue let us first discuss what is exactly the Beast_bomber. The Beast_bomber is a termux tool that helps the attacker to send anonymous spam SMS, call, email, WhatsApp, Telegram, Discord and DoS attacker. Using Beast_bomber the attacker has more attack possibilities like:

  • SMS spamming(works better with proxy)
  • Email spamming
  • WhatsApp spamming
  • Discord spamming
  • Telegram spamming
  • And also, DoS attack

How to install Beast_bomber?

Now, for Email spamming to try this attack you must have support for “less secure apps” set to “turn on” on your Gmail. Here is the link to do so: Then the program will configure everything else on its own.

If the automatic setup fails, you can set it up manually. Along with BoMbEr comes a requirements.txt file. This file contains external dependencies. To install them, you need to type the command: pip install -r requirements.txt

Before trying the manual configuration we have to clone the Beast_bomber from GitHub by using the command:

git clone

The next step is to navigate into the Beast_bomber folder using the command: cd Beast_Bomber

Then, we can perform the manual configuration by using the command:

pip install -r requirements.txt

Now, we are ready to start the Beast_Bomber tool by using the command:


Notice: when installing this tool sometimes you can get an error saying that “ModuleNotFoundError”

To solve this kind of error you have only to install the missing module by using your termux terminal using the command:

pip install the name of the required library (example: pip install _ctypes)

Shark termux tool to hack social media accounts

Welcome readers to this article that is about the shark, a termux tool to hack social media accounts. if you are here I guess you are looking for the best tool for you to use to hack social media accounts. Let me give you hope that you are in the right place for any termux tool you can look for. Also in our previous articles, we discuss some termux tools like Zphisher, Fikrado, Adminhack and more

The problem is that most termux users seem to ignore some important information before digging deeper into hacking with termux. Articles that talk about termux package management, the difference between termux to Linux, Graphical management on termux. All these articles should be read by any termux user who wants to know more about termux. But the sad news is that they ignore them.

Also, imagine someone wants to use a phishing tool and yet he or she doesn’t even know what a phishing attack is. What I suggest is to start termux from the beginning before starting performing attacks. Also, you have to know the best hacking tools on termux. Anywhere without wasting time let me introduce you Shark tool.

What is Shark?

A shark is a termux tool that helps the user to generate a Phishing link in an advanced way. And also the good thing with this tool is that no one can detect the generated phishing link except some browsers.

So if you want to use this tool first you have to know what a phishing attack is. A phishing attack is an attack that the attacker performs by creating a fake page that looks like the official one in order to get victim information.

The attacker will use a social engineering attack to influence the victim to click on the phishing link. And you have to know that a phishing attack is a kind of social engineering attack.

Who can install Shark?

Well, to be able to get and install Shark you need to have termux installed on your device. Also for Linux users, they can also install it without a problem. the storage space is also required without forgetting the internet in order to get the tool as it’s on Github.

Also, when installing a shark, it will request your Ngrok token which means you have to get one. But it’s not a must to have it because you can use other servers.

Installation process on Linux

To install Shark on Linux the first thing to do is to update and upgrade your Linux then you can continue the installation. Only with this one command Shark will start the cloning and installation of some needed features.

sudo wget -qO- | sudo bash

Then, when the process starts, it will install all Shark features. Then, it will start the installation of Shark. and after that, it will ask you to insert your Ngrok token to continue. And after you finish inserting it and press Enter it will continue automatically.

But if you don’t have a Ngrok token you can just press enter to continue the next step. After all the process of installation, you will be ready to use Shark.

Shark disclaimer

The next thing to do is to press y so that we go on the next screen.

From here we can select any platform we want by using numbers as you can see on the screenshot. In this example, I will select Facebook.

As the screenshot shows we selected 1 that is Facebook then we have to select which phishing page we want to generate.

On this part let me add something. The shark has 3 servers that you can use to generate the phishing link. Ngrok, Cloudflare and localhost, we can choose the one we want to use.

Shark serves

Now as it is shown in the screenshot we have then to select the server we want we can try with Cloudflare because it is the new server added by the project owner.

Then, from here we have to provide the port number or use a default one.

Well done! then we click on N if we don’t want to modify the generated phishing link and now we have the phishing link that we can send to the victim and wait for the output.

Installation process on Termux

Now let us discuss how you can get and install Shark on termux. As you might know, we always start by updating and upgrading termux repositories before we continue. pkg update && upgrade.

after that, we are all ready to start the cloning process. The process to install shark on termux is the same as on Linux. But only on termux, we have to install wget using the command pkg install wget.

Notice: If you are using termux from the playstore you won’t be able to update and upgrade termux. I recommend you to uninstall it and get termux from f-droid

Then you can use the command:

wget -qO- | bash

All the processes are the same as on Linux just follow the step and everything will be done. The first step the installation of lib will start then after that the following step will follow.

Conclusion and disclaimer

This article is only for educational purposes we won’t be responsible for any misuse of this tool. Use it for your own risk. Hope this will help you to test your social media account security. You can rate this post to know which one is the best for you. Thanks

Rating: 1 out of 5.

How to earn money with the phone in 2022

Welcome to this article that I’m going to share with you my secret on how to earn money online. I know most of you are familiar with such titles. Because there are many articles over the internet about earning. But the difference between those articles and this is that most of those articles are scams. and because of that people believe that they can’t earn money using their smartphones.

The good news is that today I’m going to present you the legit way to earn money with your smartphones. I have to say this if you are among those who believe they can get rich in one day. Know that this article is not for you. Because there is no way to get rich in a single day, this article is only for those who really want to earn money.

Why do I share this earning technique with you?

Well, if I share this technique with you is because I was also in need of earning online money. And I did a lot of research about online earnings. But the techniques I was getting were about investing before to start and yet I didn’t have money for it. Thank God I got the first platform for small gigs and even today I am still earning money from there if you are interested you can also check the hacking way to earn money online step by step.

After I got that platform I continued doing my research to see if I can get the best platform. And guess what I got an android app that can help me to earn money without even more effort. seriously with the app, we are going to discuss today you are going to be earning money while sleeping.

What? earning money without effort is it possible? Or is this article also a scam?

Let me tell you that even I asked myself those questions for the first day when I saw that app. But I got answers when I started using the app myself. It seems to be a scam but it is not. But one thing I can’t guarantee you is that I don’t really know how much you can earn per day because it depends on you.

How to earn money online using your smartphones?

Without wasting time let me introduce you to this amazing app named Honeygain. We are going to discuss Honeygain maybe some of you heard about it or not but I’m sure you will be surprised.

What is Honeygain?

Honeygain is an app that allows companies to use your connection. Businesses can use your internet through Honeygain’s proxy network for various uses. So, for every 10 MB of data you share, you’ll earn 1 credit. To get paid, you need to save 20,000 credits, which equates to $20. So, Honeygain pays you $1 per 10 GB of data used. The company also pays six credits per hour that content delivery is active.

Here you can read more about What Is Honeygain? Is It Legit? How Does It Work?

Why you should start earning money with Honeygain?

Here I’m going to discuss some reasons why you should start using Honeygain.

  • Easy way to earn passive income

If you are looking for an easy way to earn passive income Honeygain is a good choice. You can start earning with Honeygain, and use the money to pay for a streaming platform subscription, unlock exclusive content on free-to-play video games, or simply treat yourself with a little online shopping spree.

  • Earn without compromising security

Honeygain ensures that your internet traffic is only used by trusted partners, and the app never asks for or gains access to the storage of your device.

  • Estimate your earnings

Your earnings directly depend on the amount of traffic you share with Honeygain’s network. The more you share, the more you earn!

5 steps to start earning money with Honeygain

Let us discuss then the steps to follow to start earning with Honeygain.

  1. Set it up

The first step is to get Honeygain, for that we have to know that Honeygain can be installed on any Windows, Linux, macOS, or Android device with a stable Internet connection. We are going to download the app depending on our device. And also 3 devices recommended. Now we can go to the next step. Here I assume that you have already downloaded and installed Honeygain and we are ready to go.

  • Run Honeygain

After finishing the Honeygain installation, we can then run it to start earning. Once active, Honeygain securely shares your Internet connection, never gaining access to your personal data. The bees will be gathering your data so that you earn money.

  • Get paid

When you reach $20 in earnings, you can request a payout. They work through Tipalti, a California based payment company, but you can get your payout through PayPal. Also with Jumptask joining with a Metamask wallet.

instant payment proof

What we have to do is to create a Metamask account. Then we connect Jumptask to our Metamask wallet using the secret key and then it will be receiving the earnings automatically.

To connect it we have first to create a wallet on Metamask then we will be able to get the secret key that will help us to connect.

Metamask wallet

As you can see I have already created an account. and once I open the Jumptask it requests the connection to the Metamask wallet. Then if everything passes well it will connect.

And then from there, you will be able to see your earnings if you have placed your first withdrawal.

Honeygain referral program

When you sign up for Honeygain, you get a $5 bonus to your account that you can withdraw once you hit $20 in points. They estimate that it takes 48 days to reach $20.

When you refer people to Honeygain, you get 10% of what they earn.


Well, we have reached the end of our today post I hope this will be helpful for you, remember the choice is yours either to earn money or not. But my wish is that you start earning today as I do. And if you have got a question or any suggestion or any other helpful information about earning let us know in the comment section down. Thanks

Zphisher new version on termux

Hello, everybody welcome to this article which is about new Zphisher features. The last time we discussed Zphisher automated phishing tool for termux. Then some of you were complaining that they don’t get the generated phishing link. But in this article, we are going to discuss new Zphisher features and the solution for that issue.

Before we continue for those who are not aware of Zphisher I’m going to give a quick review of it.

Zphisher itself is an automated phishing tool with 30+ templates. With this tool, you can hack social media accounts by only generating a phishing link and sending it to the victim and waiting for the result.

Then, without wasting our time let us start discussing today’s topic so that we can know what is new.

What’s new in Zphisher?

We are going to discuss old and new features because the Zphisher developer had reviewed them. Then, if we can try to see the old features of Zphisher we can see that it had the latest and updated login pages. Zphisher used to update the login pages. And also mask the phishing link into a trusted URL.

Also, the Zphisher developer tried to make it simple so that even beginners can use it without a problem. It also supports Docker, for more information about Docker you can check on the Docker website

  • Latest and updated login pages.
  • Mask URL Support
  • Beginners friendly
  • Docker support
  • Multiple tunneling options (Localhost, Ngrok )

Now, as we have discussed old features let us discuss new features I’m just going to explain the last feature which is the updated one.

New Features

  • Latest and updated login pages.
  • Mask URL support
  • Beginners friendly
  • Docker support (checkout docker-legacy branch)
  • Multiple tunneling options
    • Localhost
    • Ngrok (With or without hotspot)
    • Cloudflared (Alternative of Ngrok)

The new Zphisher feature is Multiple tunnelling. In the previous version of Zphisher, only two tunnels were there and it was required to activate the phone hotspot before running the server. But in this new version, they also add Cloudflare. So now it’s easy to generate a phishing link with Zphisher and send it to the victim.

When you install Zphisher it will automatically install PHP, Cloudflare and others dependencies to avoid errors during the installation or the use of the tool. And also you can select a port forwarding service without problem.

Also, you will now be able to generate a phishing link without turning on your hotspot and no need to have an account on the Ngrok platform. But it’s better to have a Ngrok account, the reason why I suggest you create one.

Disclaimer from Zphisher developer

Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.

This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in a wrong way.

This tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someone’s social media. However, you may try out this at your own risk.

You might also like Zphisher automated phishing tool for termux


Now we have reached the end of our post I hope you guys already know what is new in Zphsher. Also, in the following article, we are going to discuss how to use the new Zphisher to make sure you come back to not miss it. Thanks.

How to Earn money by reusing youtube video

Hello, friend today we are going to discuss how to earn money on youtube without making videos. Well, you may ask the question how possible to earn money without videos (hahaha). Let me tell you that the techniques we are going to learn are simple and are for everybody.

Before you continue reading this article let me ask you this question. Why are you sleeping while others are earning money online?. When we start doing research about online earnings the first thing that comes to our mind is getting free money. But let me tell you that there is no free money online before getting 1$ online you have to work for it.

The good news is that I’m going to share with you my hacking techniques to earn your first money.

You might also like to know the Hacking way to earn money online step by step

The reason why this article is a hacking technique is that you are going to earn your first money without hard work. The purpose of this article is to earn your first money using youtube and get rich without making videos like others. But I don’t guarantee that you get rich but I’m sure you can if you take it seriously.

Then, before we continue I assume that everyone has a youtube channel or if not start by creating one. After you have created it or you own it already you can then proceed reading.

Note: The technique we are going to use is legal don’t worry.

Ways to make money in the YouTube Partner Program

The table below will show you how you can make money on YouTube:

Advertising revenue: Get ad revenue from the display, overlay, and video ads.Channel membershipsYour members make recurring monthly payments in exchange for special perks that you offer.Merch shelfYour fans can browse and buy official branded merchandise that’s showcased on your watch pages.Super Chat & Super StickersYour fans pay to get their messages highlighted in chat streams.YouTube Premium Revenue: Get part of a YouTube Premium subscriber’s subscription fee when they watch your content.

Youtube can’t tell you what you can create, but you are the one to do your choice on what you will create as a creator. Once you are in the YouTube Partner Program, you can earn money through YouTube. When in the YouTube Partner Program, you will be held to a higher standard.

Youtube review your channel before being accepted in the Youtube Partnership Program. And also they constantly review your channels to make sure you are meeting all their policies and guidelines.

How to earn money on YouTube without making videos

To earn money on youtube, you have to first meet the youtube requirements then apply for monetization and then be accepted to the YouTube Partner Program.  

As you might know, youtube doesn’t allow you to republish someone’s video otherwise you will fence the copyright strike. But the videos we are going to use don’t have copyright.

  • Step 1: Planing

Before we start we have first to plan which types of videos are we going to upload on our channel. Example videos for pets, animals, football and so on… After we have decided which kind of videos we want we can then pass to the next step.

  • Step 2: Searching

In this process, we are going to search videos that don’t have copyright I mean the videos that are free to reuse. Then, to get those videos we are going to open youtube using our browser then on the search bar we are going to type the types of videos chosen on step 1. In this article, we are going to use pets as an example

Then, from here we are going to filter all videos about pets, just go on filter then right click then go on creative commons licence from the features panel. Once we have selected that option it will bring tons of videos that we are free to republish. After that, you can download that video using any youtube video download.

I suggest you to use this youtube video downloader. How to download videos with – Videos downloader

Genius step

  • Step 3: Editing the video

Now, as we have downloaded the video we want we can now republish it but I suggest editing the video so that it looks professional. We can take 2 or 3 minutes editing that video and make it look nice then we can republish.

  • Step 4: Publishing the video

This is the last step where we are going to publish our video on our youtube channel and wait for the visitors to come for it. But you are not obliged to close your hand but use them for sharing on social media and or everywhere you can.


Well, done friends this is the end of this article, God bless you and wish you good luck. If you have any questions or suggestions about the next article feel free to comment down and we will try to help. thanks for your time.


Welcome to this article that is about the termux Facebook hacking tool. I’m sure if you are reading this article, it is because you are looking for some solutions. But let me tell you that the solution is here this tool will help you do the task.

Also, in our previous article, we discussed the Pyphisher termux tool to hack social media accounts. This tool looks similar but is not the same you may have a look at it so that you understand that.

Without wasting time let me introduce you to the tool that we are going to discuss in this article.

What is is a Facebook hacking Tool script that is fast and user friendly. This tool was created for hacking multiple Facebook accounts using the Facebook API.

Also, you can use this tool on any python 2.7 installed device like Linux, windows, termux.

Who can install this tool?

The answer to this question is that any termux or Linux user can install without a problem. Also, you must note that no rooting is required.

We are going to see how we can get and install on termux and Linux.

How to get and install Fikrado on termux?

Well, now we can then discuss the installation on termux. But before we start the installation make sure you have git, python2, lolcat installed on your termux to avoid some errors during installation.

Also, for those who don’t have them let us discuss a bit how to get them. The first thing we are going to do is to update and upgrade termux repositories. Then we can install git using the command:

pkg install git -y

After the installation of the git, we can then continue by installing python2 using the command:

pkg install python2 -y
pkg install python -y

Then, we can install local using python-pip command:

pip install lolcat

Now, as we have all its dependencies we can then get Fikrado from Github by using the command:

git clone

Great, if everything has gone well the Fikrado folder will now be on our termux. Then to know if that folder is on our termux we can check by navigating into it by using the command:


Then, we will now be into the folder and we can now run the script for the installation using the command:


Note: During installation if you get an error saying that no module name requests.

Then, open with a text editor like nano and modify line 5, remove requests. Then save and run the script again.

And then you get the first screen of that is:

How to get and install Fikrado on Linux?

The installation of Fikrado on Linux is the same as on termux but the difference is the first line.

curl --output
sudo python2
git clone

We have reached the end of our article if any questions or suggestions don’t hesitate to comment down so that we try to give you an answer. Thanks for your time.

Pyphisher termux tool to hack social media account

Hello friends, welcome to this article that is about Pyphisher a termux tool to hack social media account. We are going to discuss this amazing tool that I discover somewhere during my research. You may be in need of testing your social media account password strength or having another reason why to use Pyphisher. You are going to like this tool but it depends on your need.

Well, nowadays social media accounts have become the target of some bad guys or script-kiddies on the internet. They try to hack social media accounts for different reasons like for money, impressing others or other reasons. Before discussing Pyphisher we are going to discuss how they do to hack social media account.

Also, know that Pyphisher works like Zphisher, Anonphisher, Mrphish and other social media hacking tools.

How do hackers do hack social media account?

Even if Facebook is more secure there are some techniques black hackers use to hack Facebook account. We can mention phishing, keylogging, Trojans/backdoors, Sniffing, Social Engineering, and Sessions Hijacking …

These techniques are not the only ones to use. But it depends on the attackers, some can develop their own scripts to perform their attacks and others can use other developers’ scripts. We are going to discuss phishing techniques as Pyphisher is a phishing tool.


Phishing is one of the easiest ways to trick users into giving out their login credentials. All an attacker does is set up a webpage similar in design to the victim homepage. Then he attach a server-side script to track the username and password entered and store it in a log.

After the attacker finished setting up the server-side then he can send the link by using some attractive words to the victim. The attacker can combine both phishing and social engineering attacks to trick the victim.

The attacker will be waiting for the victim to log in to that fake page and get the information entered and “boom” the account will be hacked. Although some social media started detecting and blocking phishing links. But there is some other way to send a phishing link without getting blocked.

What is Pyphisher?

Pyphisher is the ultimate phishing tool in python. that includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail and many others. With this tool, you can be able to generate a phishing link that can help you get your victim information.

Also, by using this tool you don’t need to root your smartphone because it works on both rooted and unrooted devices. But before using it there are some requirements.

Pyphisher requirements

Well, as you might know, most termux tools required some dependencies before being installed or used. We are going to see what are Pyphisher dependencies and how to get them so that we avoid getting errors during installation.

  • Python(3)
  • PHP
  • Curl
  • Unzip
  • Wget
  • 90MB storage (All files from git clone)
  • 60MB storage (Direct run script without git clone)

Well, you may find that you have some of these dependencies installed on your termux. But if you don’t have them, don’t worry we will discuss how to get them.

Installation of dependencies

Now we can start installing some dependencies before going on to the next step but if you have these dependencies you can go to the next step that is about the installation. But before doing any dependencies installation start by updating and upgrading the termux repository.

Installation of python 3

The installation of python on termux is simple to do, just by using the command:

pkg install python

Installation of php

Then we can proceed to install PHP after we have done with python.

pkg install PHP

Installation of curl and wget

We can install curl and get by using the command:

pkg install curl wget -y

Also, we can’t forget to install git because to get Pyphisher from Github we will use the git command, only use the command:

pkg install git 

Now, as we have seen how we can install all dependencies we can now continue with the installation.

installation process of Pyphisher

By using the command git we are going to get Pyphisher from Github and start the installation.

git clone

Then, after we have got the Pyphisher folder into our termux we can now navigate into Pyphisher folder using the command: cd PyPhisher. And then to run the Pyphisher script we use the command:


When you run the script the installation of Ngrok and Cloudflare will start.

And then after the installation will be finished we will now be ready to use Pyphisher.


This tool is article is for educational purposes. Here it demonstrates how phishing works. If anybody wants to gain unauthorized access to someone’s social media, he/she may try out this at his/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author is not responsible for any misuse of PyPhisher!

7 Best Termux shells for advanced and beginners users

Welcome users and happy new year, this article is about the 7 best termux shells you should know. If you are a termux user you must know this because it will help you when using termux. Well, before continuing you may also have a look at Termux package management everything you need to know. Most people make mistakes when starting with termux by ignoring some important steps that they should know.

Most beginners think they can be good hackers by only installing and using termux hacking tools. But let me tell you that you can’t become a good hacker doing that, but you can read this post to help you. How to become an Ethical Hacker also get into the penetration testing field. I’m sure by reading those articles you will get something before taking any decision also you can read Why you should avoid using Termux for hacking.

Well, now we can continue with our today article.

What is a shell? or Unix shells?

A shell is a command language interpreter that executes commands from standard input devices (like a keyboard) or a file. Shells are not parts of the system kernel, but use the system kernel to execute programs, create files, etc.

A Unix shell is both a command interpreter and a programming language. As a command interpreter, the shell provides the user interface to the rich set of gnu utilities. The
programming language features allow these utilities to be combined.

Files containing commands can be created, and become commands themselves. These new commands have the same status as system commands in directories such as /bin, allowing users or groups to establish custom environments to automate their common tasks.

The shell’s job is to translate the user’s command lines into operating system instructions. For example, consider this command line:

sort -n phonelist > phonelist.sorted

In termux when you want to change the login default shell you can use the command:

Use chsh from termux-tools to change your login shell. Currently, Termux supports bash, fish, tcsh, zsh and a few other shells.

List of the 7 Termux shells

1. Bash

Bash is the shell, or command language interpreter, for the gnu operating system. The
name is an acronym for the ‘Bourne-Again SHell’, a pun on Stephen Bourne, the author
of the direct ancestor of the current Unix shell sh, which appeared in the Seventh Edition
Bell Labs Research version of Unix.

Also, is a sh-compatible shell that incorporates useful features from the Korn shell (KSH) and the C shell (csh).

It is intended to conform to the IEEE POSIX P1003.2/ISO 9945.2 Shell and Tools standard. It offers functional improvements over sh for both programming and interactive use. In addition, most sh scripts can be run by Bash without modification.

Bash is the default shell after installing termux.
The BASH shell init files are ~/.bashrc$PREFIX/etc/bash.bashrc and more. Also, if you want to know more about termux bash you can use the command `man bash` and `info bash` you will get more information.


2. Beanshell

BeanShell is a small, free, embeddable Java source interpreter with object scripting language features, written in Java. It executes standard Java statements and expressions but also extends Java into the scripting domain with common scripting language conventions and syntax. BeanShell is a natural scripting language for Java.

To install beanshell it’s easy, you can just use the command:

 pkg install beanshell

Here are a few examples of BeanShell commands:

  • source(), run() − Read a bsh script into this interpreter, or run it in a new interpreter
  • frame() − Display a GUI component in a Frame or JFrame.
  • load(), save() − Load or save serializable objects to a file.
  • cd(), cat(), dir(), pwd(), etc. − Unix−like shell commands
  • exec() − Run a native application
  • javap() − Print the methods and fields of an object, similar to the output of the Java javap command.
  • setAccessibility() − Turn on unrestricted access to private and protected components.

Also, you can check the complete list of BeanShell Commands for more information.


3. Fish shells

fish is a smart and user-friendly command line shell for Linux, macOS, and the rest of the family.

  • Extensive UISyntax highlightingAutosuggestionstab completion and selection lists that can be navigated and filtered.
  • No configuration needed: fish is designed to be ready to use immediately, without requiring extensive configuration.
  • Easy scripting: New functions can be added on the fly. The syntax is easy to learn and use.

Also, for more information yo can visit fishshell documentation or its homepage: Then, to install fish you can use the command:

pkg install fish

4. IPython shell

IPython is a powerful and also an advanced interactive shell for Python language. it also provides a rich toolkit to help you make the most of using Python interactively.

One of Python’s most useful features is its interactive interpreter. It allows for very fast testing of ideas without the overhead of creating test files as is typical in most programming languages. However, the interpreter supplied with the standard Python distribution is somewhat limited for extended interactive use.

The goal of IPython is to create a comprehensive environment for interactive and exploratory computing.

Then, to install IPython on termux you must have python installed on your termux then you can use the command:

pip install ipython

For more information you can also visit IPython homepage:

5. TCSH shell

TCSH is a C shell with file name completion and command line editing. The TCSH shell init files are ~/.tcshrc$PREFIX/etc/csh.cshrc and more. Also you can use the command `man tcsh` and `info tcsh` for more information.

And also for more information you can visit tchs home page:

Then, to install TCSH shell on termux you can use the command:

pkg install tcsh

6. Xonsh

Xonsh is a Python-powered, cross-platform, Unix-gazing shell language and command prompt. The language is a superset of Python 3.6+ with additional shell primitives that you are used to from Bash and IPython. Also, it works on all major systems including Linux, OSX, and Windows. Xonsh is meant for the daily use of experts and novices.

Also for more information about xon you can visit its homepage: and also for the installation you can just use the command:

pkg install tcsh

7. ZCH

Zsh is a shell designed for interactive use, although it is also a powerful scripting language. Many of the useful features of bash, ksh, and tcsh were incorporated into zsh.
The zsh shell init files are ~/.zshrc and $PREFIX/etc/zshrc and more. Also you can use the command man zsh and info zsh for more information.

And also you can visit its home page: and also for the installation you can use the command:

pkg install zch


These are the 7 best shells for termux, hope you will do more research about them because they are useful for both beginners and advanced users, I wish you goodluck. Also, if you may have a question don’t hesitate to comment down so that we help you with an answer.

Also, yo can check termux wiki for some additional information about termux shells.

igHack best termux Instagram hacking tool

Welcome everyone to this article that is about Ighack best Instagram hacking tool. We are going to discuss this tool because it’s powerful and easy to use. In our previous article, we discussed how to get Instagram user information without even having an account.

And also if you are curious to know the tool which can help you to get Instagram followers. We prepared it for you, Get Instagram followers using BadRobo termux hacking tool. I know you might be looking for a termux tool to hack an Instagram account but let me chock you this post is not for that.

This article is an introduction to igHack a termux tool to do that task. You are the one to choose how you want to use the tool.

What is igHack termux instagram hackig tool?

Ighack is a bash based script that is officially made to test the password strength of Instagram account from termux with brute-force attack and. It helps the user to perform brute force on his own account to test how strong is his password.

ighack works on both rooted Android devices and Non-rooted Android devices. The tool was made by N17R0 using bash and was tested on termux.


Before we discover how to get and install igHack we have first to discuss its requirements so that we avoid errors when installing. What we need for installation:

igHack Features

  • Instagram stable api !
  • Updated maintainence !
  • tor usage !
  • And also it is easy to use for Beginners !

Get and install igHack on termux

Now we can start the installation process if only we have all requirements. But for PHP don’t worry we are going to see how to get it, also termux must be installed.

Then, before we continue we have first to update and upgrade our termux repository by using the command:

pkg update && upgrade

The following step is to install PHP by using the command:

pkg install php
installation of PHP

After that we are going to install python and python3 using the command:

pkg install python -y
pkg install python2 -y
installation of python

Then, we are going to install lolcat bu using the pip command:

pip install lolcat

And also we are going to install git so that we can be able to get igHack from GitHub by using the command:

pkg install git
installation of git

Then, here we are going to get igHack folder from Github by using the git command:

git clone

The process of cloning ighack will start and when it will finish, we can now navigate into the folder we got from Github by using the command:

cd ighack

And the last step is to execute the script by using the command:

bash setup

Well done, after all these steps if everything works well we are going to get this screenshot



  • From this option you can start attack aon default pass list of tool.


  • Also, from this option you can select manual pass list and try to attack.


  • From this option you can know more about author.


  • From this option you can also update ighack tool if updates are available for that.


  • And then then from this option you can exit the tool