Category Archives: Termux

How to spam your friend using Beast_bomber

Welcome to this article that is about Beast_bomber a spam termux tool. Well if you are here reading this article it’s because you heard about spamming. And I’m sure this is your chance to know about it.

In our last article, we discussed how to use shark for social media hacking on termux, you may have a look if interested. Before we continue with our today article. What I have seen is that most termux users especially beginners make mistakes when starting with termux.

They ignore some crucial steps when starting with termux and that brings them to fail in their learning process. But for that, as I know their problem I prepared some good termux starting posts to help them.

Well, as you can see I chose some beginning posts to help you, but if you still need more you can continue your research.

What are spam and spamming?

a. spam

Anyone who’s spent more than a handful of seconds on the internet has encountered spam. It’s seemingly an inseparable part of the internet experience, something we accept as normal

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

kinds of spam

  • Email spam
  • SEO spam
  • Social networking spam
  • Mobile spam
  • Messaging spam

Also, for those who would like to know more about spam here is a post to read more about spam What is Spam: The Essential Guide to Detecting and Preventing Spam.

b. Spamming

Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.

What is the Beast_bomber?

Then, before we continue let us first discuss what is exactly the Beast_bomber. The Beast_bomber is a termux tool that helps the attacker to send anonymous spam SMS, call, email, WhatsApp, Telegram, Discord and DoS attacker. Using Beast_bomber the attacker has more attack possibilities like:

  • SMS spamming(works better with proxy)
  • Email spamming
  • WhatsApp spamming
  • Discord spamming
  • Telegram spamming
  • And also, DoS attack

How to install Beast_bomber?

Now, for Email spamming to try this attack you must have support for “less secure apps” set to “turn on” on your Gmail. Here is the link to do so: https://www.google.com/settings/security/lesssecureapps. Then the program will configure everything else on its own.

If the automatic setup fails, you can set it up manually. Along with BoMbEr comes a requirements.txt file. This file contains external dependencies. To install them, you need to type the command: pip install -r requirements.txt

Before trying the manual configuration we have to clone the Beast_bomber from GitHub by using the command:

git clone https://github.com/ebankoff/Beast_Bomber.git

The next step is to navigate into the Beast_bomber folder using the command: cd Beast_Bomber

Then, we can perform the manual configuration by using the command:

pip install -r requirements.txt

Now, we are ready to start the Beast_Bomber tool by using the command:

python start.py

Notice: when installing this tool sometimes you can get an error saying that “ModuleNotFoundError”

To solve this kind of error you have only to install the missing module by using your termux terminal using the command:

pip install the name of the required library (example: pip install _ctypes)

Shark termux tool to hack social media accounts

Welcome readers to this article that is about the shark, a termux tool to hack social media accounts. if you are here I guess you are looking for the best tool for you to use to hack social media accounts. Let me give you hope that you are in the right place for any termux tool you can look for. Also in our previous articles, we discuss some termux tools like Zphisher, Fikrado, Adminhack and more

The problem is that most termux users seem to ignore some important information before digging deeper into hacking with termux. Articles that talk about termux package management, the difference between termux to Linux, Graphical management on termux. All these articles should be read by any termux user who wants to know more about termux. But the sad news is that they ignore them.

Also, imagine someone wants to use a phishing tool and yet he or she doesn’t even know what a phishing attack is. What I suggest is to start termux from the beginning before starting performing attacks. Also, you have to know the best hacking tools on termux. Anywhere without wasting time let me introduce you Shark tool.

What is Shark?

A shark is a termux tool that helps the user to generate a Phishing link in an advanced way. And also the good thing with this tool is that no one can detect the generated phishing link except some browsers.

So if you want to use this tool first you have to know what a phishing attack is. A phishing attack is an attack that the attacker performs by creating a fake page that looks like the official one in order to get victim information.

The attacker will use a social engineering attack to influence the victim to click on the phishing link. And you have to know that a phishing attack is a kind of social engineering attack.

Who can install Shark?

Well, to be able to get and install Shark you need to have termux installed on your device. Also for Linux users, they can also install it without a problem. the storage space is also required without forgetting the internet in order to get the tool as it’s on Github.

Also, when installing a shark, it will request your Ngrok token which means you have to get one. But it’s not a must to have it because you can use other servers.

Installation process on Linux

To install Shark on Linux the first thing to do is to update and upgrade your Linux then you can continue the installation. Only with this one command Shark will start the cloning and installation of some needed features.

sudo wget -qO- https://github.com/Bhaviktutorials/shark/raw/master/setup | sudo bash

Then, when the process starts, it will install all Shark features. Then, it will start the installation of Shark. and after that, it will ask you to insert your Ngrok token to continue. And after you finish inserting it and press Enter it will continue automatically.

But if you don’t have a Ngrok token you can just press enter to continue the next step. After all the process of installation, you will be ready to use Shark.

Shark disclaimer

The next thing to do is to press y so that we go on the next screen.

From here we can select any platform we want by using numbers as you can see on the screenshot. In this example, I will select Facebook.

As the screenshot shows we selected 1 that is Facebook then we have to select which phishing page we want to generate.

On this part let me add something. The shark has 3 servers that you can use to generate the phishing link. Ngrok, Cloudflare and localhost, we can choose the one we want to use.

Shark serves

Now as it is shown in the screenshot we have then to select the server we want we can try with Cloudflare because it is the new server added by the project owner.

Then, from here we have to provide the port number or use a default one.

Well done! then we click on N if we don’t want to modify the generated phishing link and now we have the phishing link that we can send to the victim and wait for the output.

Installation process on Termux

Now let us discuss how you can get and install Shark on termux. As you might know, we always start by updating and upgrading termux repositories before we continue. pkg update && upgrade.

after that, we are all ready to start the cloning process. The process to install shark on termux is the same as on Linux. But only on termux, we have to install wget using the command pkg install wget.

Notice: If you are using termux from the playstore you won’t be able to update and upgrade termux. I recommend you to uninstall it and get termux from f-droid

Then you can use the command:

wget -qO- https://github.com/Bhaviktutorials/shark/raw/master/setup | bash

All the processes are the same as on Linux just follow the step and everything will be done. The first step the installation of lib will start then after that the following step will follow.

Conclusion and disclaimer

This article is only for educational purposes we won’t be responsible for any misuse of this tool. Use it for your own risk. Hope this will help you to test your social media account security. You can rate this post to know which one is the best for you. Thanks

Rating: 1 out of 5.

Zphisher new version on termux

Hello, everybody welcome to this article which is about new Zphisher features. The last time we discussed Zphisher automated phishing tool for termux. Then some of you were complaining that they don’t get the generated phishing link. But in this article, we are going to discuss new Zphisher features and the solution for that issue.

Before we continue for those who are not aware of Zphisher I’m going to give a quick review of it.

Zphisher itself is an automated phishing tool with 30+ templates. With this tool, you can hack social media accounts by only generating a phishing link and sending it to the victim and waiting for the result.

Then, without wasting our time let us start discussing today’s topic so that we can know what is new.

What’s new in Zphisher?

We are going to discuss old and new features because the Zphisher developer had reviewed them. Then, if we can try to see the old features of Zphisher we can see that it had the latest and updated login pages. Zphisher used to update the login pages. And also mask the phishing link into a trusted URL.

Also, the Zphisher developer tried to make it simple so that even beginners can use it without a problem. It also supports Docker, for more information about Docker you can check on the Docker website

  • Latest and updated login pages.
  • Mask URL Support
  • Beginners friendly
  • Docker support
  • Multiple tunneling options (Localhost, Ngrok )

Now, as we have discussed old features let us discuss new features I’m just going to explain the last feature which is the updated one.

New Features

  • Latest and updated login pages.
  • Mask URL support
  • Beginners friendly
  • Docker support (checkout docker-legacy branch)
  • Multiple tunneling options
    • Localhost
    • Ngrok (With or without hotspot)
    • Cloudflared (Alternative of Ngrok)

The new Zphisher feature is Multiple tunnelling. In the previous version of Zphisher, only two tunnels were there and it was required to activate the phone hotspot before running the server. But in this new version, they also add Cloudflare. So now it’s easy to generate a phishing link with Zphisher and send it to the victim.

When you install Zphisher it will automatically install PHP, Cloudflare and others dependencies to avoid errors during the installation or the use of the tool. And also you can select a port forwarding service without problem.

Also, you will now be able to generate a phishing link without turning on your hotspot and no need to have an account on the Ngrok platform. But it’s better to have a Ngrok account, the reason why I suggest you create one.

Disclaimer from Zphisher developer

Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.

This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in a wrong way.

This tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someone’s social media. However, you may try out this at your own risk.

You might also like Zphisher automated phishing tool for termux

Conclusion

Now we have reached the end of our post I hope you guys already know what is new in Zphsher. Also, in the following article, we are going to discuss how to use the new Zphisher to make sure you come back to not miss it. Thanks.

FIKRADO.PY THE FACEBOOK HACKING TOOL

Welcome to this article that is about fikrado.py the termux Facebook hacking tool. I’m sure if you are reading this article, it is because you are looking for some solutions. But let me tell you that the solution is here this tool will help you do the task.

Also, in our previous article, we discussed the Pyphisher termux tool to hack social media accounts. This tool looks similar but is not the same you may have a look at it so that you understand that.

Without wasting time let me introduce you to the Fikrado.py tool that we are going to discuss in this article.

What is Fikrado.py?

Fikrado.py is a Facebook hacking Tool script that is fast and user friendly. This tool was created for hacking multiple Facebook accounts using the Facebook API.

Also, you can use this tool on any python 2.7 installed device like Linux, windows, termux.

Who can install this tool?

The answer to this question is that any termux or Linux user can install Fikrado.py without a problem. Also, you must note that no rooting is required.

We are going to see how we can get and install Fikrado.py on termux and Linux.

How to get and install Fikrado on termux?

Well, now we can then discuss the installation on termux. But before we start the installation make sure you have git, python2, lolcat installed on your termux to avoid some errors during installation.

Also, for those who don’t have them let us discuss a bit how to get them. The first thing we are going to do is to update and upgrade termux repositories. Then we can install git using the command:

pkg install git -y

After the installation of the git, we can then continue by installing python2 using the command:

pkg install python2 -y
pkg install python -y

Then, we can install local using python-pip command:

pip install lolcat

Now, as we have all its dependencies we can then get Fikrado from Github by using the command:

git clone https://github.com/fikrado/fikrado.py

Great, if everything has gone well the Fikrado folder will now be on our termux. Then to know if that folder is on our termux we can check by navigating into it by using the command:

cd fikrado.py

Then, we will now be into the fikrado.py folder and we can now run the script for the installation using the command:

python2 fikrado.py

Note: During installation if you get an error saying that no module name requests.

Then, open fikrado.py with a text editor like nano and modify line 5, remove requests. Then save and run the script again.

And then you get the first screen of fikrado.py that is:

How to get and install Fikrado on Linux?

The installation of Fikrado on Linux is the same as on termux but the difference is the first line.

curl https://bootstrap.pypa.io/pip/2.7/get-pip.py --output get-pip.py
sudo python2 get-pip.py
git clone https://github.com/fikrado/fikrado.py
cd fikrado.py
python2 fikrado.py

We have reached the end of our article if any questions or suggestions don’t hesitate to comment down so that we try to give you an answer. Thanks for your time.

Pyphisher termux tool to hack social media account

Hello friends, welcome to this article that is about Pyphisher a termux tool to hack social media account. We are going to discuss this amazing tool that I discover somewhere during my research. You may be in need of testing your social media account password strength or having another reason why to use Pyphisher. You are going to like this tool but it depends on your need.

Well, nowadays social media accounts have become the target of some bad guys or script-kiddies on the internet. They try to hack social media accounts for different reasons like for money, impressing others or other reasons. Before discussing Pyphisher we are going to discuss how they do to hack social media account.

Also, know that Pyphisher works like Zphisher, Anonphisher, Mrphish and other social media hacking tools.

How do hackers do hack social media account?

Even if Facebook is more secure there are some techniques black hackers use to hack Facebook account. We can mention phishing, keylogging, Trojans/backdoors, Sniffing, Social Engineering, and Sessions Hijacking …

These techniques are not the only ones to use. But it depends on the attackers, some can develop their own scripts to perform their attacks and others can use other developers’ scripts. We are going to discuss phishing techniques as Pyphisher is a phishing tool.

phishing

Phishing is one of the easiest ways to trick users into giving out their login credentials. All an attacker does is set up a webpage similar in design to the victim homepage. Then he attach a server-side script to track the username and password entered and store it in a log.

After the attacker finished setting up the server-side then he can send the link by using some attractive words to the victim. The attacker can combine both phishing and social engineering attacks to trick the victim.

The attacker will be waiting for the victim to log in to that fake page and get the information entered and “boom” the account will be hacked. Although some social media started detecting and blocking phishing links. But there is some other way to send a phishing link without getting blocked.

What is Pyphisher?

Pyphisher is the ultimate phishing tool in python. that includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail and many others. With this tool, you can be able to generate a phishing link that can help you get your victim information.

Also, by using this tool you don’t need to root your smartphone because it works on both rooted and unrooted devices. But before using it there are some requirements.

Pyphisher requirements

Well, as you might know, most termux tools required some dependencies before being installed or used. We are going to see what are Pyphisher dependencies and how to get them so that we avoid getting errors during installation.

  • Python(3)
  • PHP
  • Curl
  • Unzip
  • Wget
  • 90MB storage (All files from git clone)
  • 60MB storage (Direct run script without git clone)

Well, you may find that you have some of these dependencies installed on your termux. But if you don’t have them, don’t worry we will discuss how to get them.

Installation of dependencies

Now we can start installing some dependencies before going on to the next step but if you have these dependencies you can go to the next step that is about the installation. But before doing any dependencies installation start by updating and upgrading the termux repository.

Installation of python 3

The installation of python on termux is simple to do, just by using the command:

pkg install python

Installation of php

Then we can proceed to install PHP after we have done with python.

pkg install PHP

Installation of curl and wget

We can install curl and get by using the command:

pkg install curl wget -y

Also, we can’t forget to install git because to get Pyphisher from Github we will use the git command, only use the command:

pkg install git 

Now, as we have seen how we can install all dependencies we can now continue with the installation.

installation process of Pyphisher

By using the command git we are going to get Pyphisher from Github and start the installation.

git clone https://github.com/KasRoudra/PyPhisher

Then, after we have got the Pyphisher folder into our termux we can now navigate into Pyphisher folder using the command: cd PyPhisher. And then to run the Pyphisher script we use the command:

python3 pyphisher.py

When you run the script the installation of Ngrok and Cloudflare will start.

And then after the installation will be finished we will now be ready to use Pyphisher.

Disclaimer

This tool is article is for educational purposes. Here it demonstrates how phishing works. If anybody wants to gain unauthorized access to someone’s social media, he/she may try out this at his/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author is not responsible for any misuse of PyPhisher!

7 Best Termux shells for advanced and beginners users

Welcome users and happy new year, this article is about the 7 best termux shells you should know. If you are a termux user you must know this because it will help you when using termux. Well, before continuing you may also have a look at Termux package management everything you need to know. Most people make mistakes when starting with termux by ignoring some important steps that they should know.

Most beginners think they can be good hackers by only installing and using termux hacking tools. But let me tell you that you can’t become a good hacker doing that, but you can read this post to help you. How to become an Ethical Hacker also get into the penetration testing field. I’m sure by reading those articles you will get something before taking any decision also you can read Why you should avoid using Termux for hacking.

Well, now we can continue with our today article.

What is a shell? or Unix shells?

A shell is a command language interpreter that executes commands from standard input devices (like a keyboard) or a file. Shells are not parts of the system kernel, but use the system kernel to execute programs, create files, etc.

A Unix shell is both a command interpreter and a programming language. As a command interpreter, the shell provides the user interface to the rich set of gnu utilities. The
programming language features allow these utilities to be combined.

Files containing commands can be created, and become commands themselves. These new commands have the same status as system commands in directories such as /bin, allowing users or groups to establish custom environments to automate their common tasks.

The shell’s job is to translate the user’s command lines into operating system instructions. For example, consider this command line:

sort -n phonelist > phonelist.sorted

In termux when you want to change the login default shell you can use the command:

Use chsh from termux-tools to change your login shell. Currently, Termux supports bash, fish, tcsh, zsh and a few other shells.

List of the 7 Termux shells

1. Bash

Bash is the shell, or command language interpreter, for the gnu operating system. The
name is an acronym for the ‘Bourne-Again SHell’, a pun on Stephen Bourne, the author
of the direct ancestor of the current Unix shell sh, which appeared in the Seventh Edition
Bell Labs Research version of Unix.

Also, is a sh-compatible shell that incorporates useful features from the Korn shell (KSH) and the C shell (csh).

It is intended to conform to the IEEE POSIX P1003.2/ISO 9945.2 Shell and Tools standard. It offers functional improvements over sh for both programming and interactive use. In addition, most sh scripts can be run by Bash without modification.

Bash is the default shell after installing termux.
The BASH shell init files are ~/.bashrc$PREFIX/etc/bash.bashrc and more. Also, if you want to know more about termux bash you can use the command `man bash` and `info bash` you will get more information.

Homepage: https://www.gnu.org/software/bash/

2. Beanshell

BeanShell is a small, free, embeddable Java source interpreter with object scripting language features, written in Java. It executes standard Java statements and expressions but also extends Java into the scripting domain with common scripting language conventions and syntax. BeanShell is a natural scripting language for Java.

To install beanshell it’s easy, you can just use the command:

 pkg install beanshell

Here are a few examples of BeanShell commands:

  • source(), run() − Read a bsh script into this interpreter, or run it in a new interpreter
  • frame() − Display a GUI component in a Frame or JFrame.
  • load(), save() − Load or save serializable objects to a file.
  • cd(), cat(), dir(), pwd(), etc. − Unix−like shell commands
  • exec() − Run a native application
  • javap() − Print the methods and fields of an object, similar to the output of the Java javap command.
  • setAccessibility() − Turn on unrestricted access to private and protected components.

Also, you can check the complete list of BeanShell Commands for more information.

Homepage: https://beanshell.github.io/

3. Fish shells

fish is a smart and user-friendly command line shell for Linux, macOS, and the rest of the family.

  • Extensive UISyntax highlightingAutosuggestionstab completion and selection lists that can be navigated and filtered.
  • No configuration needed: fish is designed to be ready to use immediately, without requiring extensive configuration.
  • Easy scripting: New functions can be added on the fly. The syntax is easy to learn and use.


Also, for more information yo can visit fishshell documentation or its homepage: http://fishshell.com/. Then, to install fish you can use the command:

pkg install fish

4. IPython shell

IPython is a powerful and also an advanced interactive shell for Python language. it also provides a rich toolkit to help you make the most of using Python interactively.

One of Python’s most useful features is its interactive interpreter. It allows for very fast testing of ideas without the overhead of creating test files as is typical in most programming languages. However, the interpreter supplied with the standard Python distribution is somewhat limited for extended interactive use.

The goal of IPython is to create a comprehensive environment for interactive and exploratory computing.

Then, to install IPython on termux you must have python installed on your termux then you can use the command:

pip install ipython

For more information you can also visit IPython homepage: https://ipython.org/

5. TCSH shell

TCSH is a C shell with file name completion and command line editing. The TCSH shell init files are ~/.tcshrc$PREFIX/etc/csh.cshrc and more. Also you can use the command `man tcsh` and `info tcsh` for more information.

And also for more information you can visit tchs home page:http://www.tcsh.org/

Then, to install TCSH shell on termux you can use the command:

pkg install tcsh

6. Xonsh

Xonsh is a Python-powered, cross-platform, Unix-gazing shell language and command prompt. The language is a superset of Python 3.6+ with additional shell primitives that you are used to from Bash and IPython. Also, it works on all major systems including Linux, OSX, and Windows. Xonsh is meant for the daily use of experts and novices.

Also for more information about xon you can visit its homepage: http://xon.sh/ and also for the installation you can just use the command:

pkg install tcsh

7. ZCH

Zsh is a shell designed for interactive use, although it is also a powerful scripting language. Many of the useful features of bash, ksh, and tcsh were incorporated into zsh.
The zsh shell init files are ~/.zshrc and $PREFIX/etc/zshrc and more. Also you can use the command man zsh and info zsh for more information.

And also you can visit its home page:  https://www.zsh.org/ and also for the installation you can use the command:

pkg install zch

Conclusion

These are the 7 best shells for termux, hope you will do more research about them because they are useful for both beginners and advanced users, I wish you goodluck. Also, if you may have a question don’t hesitate to comment down so that we help you with an answer.

Also, yo can check termux wiki for some additional information about termux shells.

igHack best termux Instagram hacking tool

Welcome everyone to this article that is about Ighack best Instagram hacking tool. We are going to discuss this tool because it’s powerful and easy to use. In our previous article, we discussed how to get Instagram user information without even having an account.

And also if you are curious to know the tool which can help you to get Instagram followers. We prepared it for you, Get Instagram followers using BadRobo termux hacking tool. I know you might be looking for a termux tool to hack an Instagram account but let me chock you this post is not for that.

This article is an introduction to igHack a termux tool to do that task. You are the one to choose how you want to use the tool.

What is igHack termux instagram hackig tool?

Ighack is a bash based script that is officially made to test the password strength of Instagram account from termux with brute-force attack and. It helps the user to perform brute force on his own account to test how strong is his password.

ighack works on both rooted Android devices and Non-rooted Android devices. The tool was made by N17R0 using bash and was tested on termux.

REQUIREMENTS :

Before we discover how to get and install igHack we have first to discuss its requirements so that we avoid errors when installing. What we need for installation:

igHack Features

  • Instagram stable api !
  • Updated maintainence !
  • tor usage !
  • And also it is easy to use for Beginners !

Get and install igHack on termux

Now we can start the installation process if only we have all requirements. But for PHP don’t worry we are going to see how to get it, also termux must be installed.

Then, before we continue we have first to update and upgrade our termux repository by using the command:

pkg update && upgrade

The following step is to install PHP by using the command:

pkg install php
installation of PHP

After that we are going to install python and python3 using the command:

pkg install python -y
pkg install python2 -y
installation of python

Then, we are going to install lolcat bu using the pip command:

pip install lolcat

And also we are going to install git so that we can be able to get igHack from GitHub by using the command:

pkg install git
installation of git

Then, here we are going to get igHack folder from Github by using the git command:

git clone https://github.com/noob-hackers/ighack

The process of cloning ighack will start and when it will finish, we can now navigate into the folder we got from Github by using the command:

cd ighack

And the last step is to execute the script by using the command:

bash setup
bash ighack.sh

Well done, after all these steps if everything works well we are going to get this screenshot

Usage

AUTO-ATTACK :

  • From this option you can start attack aon default pass list of tool.

MANUAL ATTACK :

  • Also, from this option you can select manual pass list and try to attack.

ABOUT :

  • From this option you can know more about author.

UPDATE :

  • From this option you can also update ighack tool if updates are available for that.

EXIT :

  • And then then from this option you can exit the tool

Easy hack termux tool to exploit android device

Hello, friend welcome to this article that is about Easy hack, a termux tool for exploiting Android devices. We are going to discuss this tool’s functionalities and installation. Termux gives us the possibility of installing both penetration testing tools and hacking on Android devices. By using termux we are going to get in touch with Easy hack.

Also, in our previous article, we discussed the Mrphish best termux tool to hack social media accounts. I suggest you have a look at it if you are interested in social media hacking.

Now, without wasting time let me introduce termux to new users. We prepared some articles for you so that you don’t get lost at all.

Well, let us then continue and discover the Easy hack tool.

What is Easy hack?

Easyhack is a penetration testing tool for network scanning and information gathering. Also, it can be used to exploit android phones and windows pcs. This tool is a set of some famous penetration testing tools like

  1. metasploit-framework
  2. sqlmap
  3. nmap
  4. metagoofil
  5. RED HAWK
  6. recon-ng and much more powerful testing tools

Easyhack can be installed on termux or on Linux operating system. But before we start the installation process let us first discuss some of the requirements.

Requirements

For the installation of Easy hack, the user must have termux installed on android or have a Linux distribution running on his PC. And then after that, as we are going to see how to install it on termux some of the dependencies must be also installed on termux. Also without forgetting internet and space storage.

  • git

What can we do with Easyhack?

If you are curious as me you must ask yourself this question, but the good news is that I’m here to answer this question that I asked myself before started using Easyhack. Here are some of its usage:

  • Payload Generator
  • Merasploit-Framework installation
  • Beef-Framework installation
  • Network scanning using nmap
  • WEB-HACKS
  • PASSWORD CRACK

Installation process of Easy hack

Then, as now we know what are Easyhack usage we can now discuss how to get and install it on termux. Before we start the installation we have first to update and upgrade termux repositories using the command:

pkg update & upgrade

And then the following step is to install git so that we can be able to get Easyhack from Github. We can also use the command:

pkg install git

Then, after we have done installing git we can now get Easyhack from Github by using the command:

git clone https://github.com/sabri-zaki/EasY_HaCk

And now as we have already an Easyhack folder on our termux we can then install it without a problem. But first, we are going to navigate into that folder by using the command cd Easy_Hack.

Then, once into the Easy_hack folder, we can now start the installation using the command:

chmod +x install.sh
EasY-HaCk

Now, we are going to get this screen like this:

Then, here we are ready to start using this tool, or if you didn’t get the same output as me you can retry the process. And also if you get an error and still persist don’t hesitate to comment down that error so that we can help.

Mrphish best termux tool to hack social media account

Welcome reader to this article that is about Mrphish social media hacking tool for termux. I’m sure by the end of this post you are going to like this tool. If I decided to write about this tool it’s because I know how powerful it is.

Well, in our previous article we discussed how to install fluxion in Kali Linux. That post is for Linux users and also those who are curious to hack wifi. I also suggest you have a look at it if you are interested in wifi hacking otherwise continue reading.

Also, for termux users who would like to test how wifi hacking works I prepared this post for you. Exploit Wi-Fi vulnerabilities with Routersploit on termux and Linux and also we have more articles about termux that will interest you.

Then, without wasting time let us then discuss the Mrphish tool that we are going to discover today. What I recommend you is to make sure you read the entire article slowly so that you understand why you should start using Mrphish.

What is Mrphish?

Mrphish is a bash based script that is made especially for phishing social media accounts with port forwarding and OTP bypassing control. The tool itself helps the user to generate a fake link. And that link will be sent to the victim in order to get some crucial information.

What you have to know Mrphish is not the only tool for social media hacking. There are more tools online which will do the same work as this tool but each tool has its strength and weakness. You are free to use any tool you want like, zphisher, anonphisher, shellphish and so on.

Why I like this tool is because it works on both rooted Android devices and Non-rooted Android devices.

Requirements

I’m sure that anyone who would like to get and install this is curious to know what can be some requirements. But don’t panic Mrphish requirements are not much and you will find some of them are already been installed in your termux. What you need is only:

  • Internet
  • php
  • git
  • python
  • lolcat
  • storage 600 MB
  • ngrok Token

What is ngrok Token?

Ngrok is a useful utility to create secure tunnels to locally hosted applications using a reverse proxy. It is a utility to expose any locally hosted application over the web.

for more information about ngrok visit ngrok documentation.

Then, before we can see how to get Mrphish and to install it make sure you have already installed termux. And also you meet the requirements for PHP and git we will discuss how to get them.

How to get and install Mrphish?

As usually we are going first to update and upgrade termux repositories using the command: pkg update & upgrade.

Now we can start by installing PHP as a Mrphish dependency otherwise we will get an error during installation. And to install PHP we open the termux terminal then we use the command

pkg install PHP

Then, after installing PHP we can then install git so that we can be able to clone Mrphish from Github.

pkg install git

Next we are going to install python3 and python inorder to be able to execute the script using the command:

pkg install python -y
pkg install python2 -y

Then, after we have done installing python we are going now to install lolcat using pip.

pip install lolcat 

Now after we have done the installation of all dependencies we are able to get the Mrphish from Github using the command:

git clone https://github.com/noob-hackers/mrphish.git

Then, as we have got mrphish we can then navigate into it folder using the command cd mrphish. And then we are going to execute and run mrphish using the command:

bash setup
bash mrphish

During installation it will be asking if you want to continue just use ‘y’ that means yes in order to continue. And if everything goes well you have mrphish installed and ready to be use.

Then after installation it will ask to enter your ngrok token like this:

After that you will now see the menu of the tool and ready for you.

Then, when you select a or 2 it will now show you the features menu.

Well done we have reached the end of these article if any question don’t hesitate to ask so that we can try to help you with an answer.