Category Archives: Termux

CamPhish – Grab Cam Shots From a Target’s Phone Front Camera

Hello everyone. Welcome to this post that is about CamPhish a Termux tool to grab cam shots from a target’s phone front camera.

Termux is the best app for fun for curious Android users, but if you are an advanced user, you can do many things with it. To know more about Termux, register on our newsletter to get the news of our best techniques that we share every week:

What is CamPhish?

CamPhish is a termux tool that uses a technique to take cam shots of a target’s phone front camera or PC webcam.

How CamPhish works?

CamPhish hosts a fake website on an in-built PHP server and uses ngrok and serveo to generate a link that will be forwarded to the target, and it can be used all over the internet.

The website asks for camera permission and wait the targeted device to allow the request. Then, if the target allows it, automatically the tool grabs screenshots of the target’s device.


Here is a list of some of the features that Camphish offers. It contains two automatic webpage templates for the engaged target on the webpage to get more pictures of the cam.

  • Festival Wishing
  • Live on YouTube TV
  • Online Meeting [Beta]

Who can install this tool?

This tool was tested On some different Linux distributions, any Linux user can use this tool.

In this post, we are going to see how to get and install CamPhish into Termux. Although the process can be the same when installing into Linux distribution.

Installation requirements

When you want to install any tool in Termux, you have to first install some tools to avoid errors during the installation process. This tool requires PHP for the web server, SSH, or serveo link.

Before installing any tool in Termux, we have to first update and upgrade our Termux repository with the command:

pkg update && upgrade

After that, we can then continue the installation of the requirements. As the tool requires the installation of PHP, openssh and wget. We are going to start by installing them by using the command:

pkg -y install php openssh wget

And then, the following step is to install git so that we can be able to get CamPhish from GitHub. We can also use the command:

pkg install git

Now, after we have done installing all the requirements, we can then get CamPhish from GitHub using the command:

git clone

Once the cloning process is done, we can then move into the CamPhish folder using the command:

cd CamPhish

Then, the last process is to run CamPhish script using the command:


Well, done. We can now start using CamPhish without any problem. If you got the error during the installation, you can restart the process and if the error persists, you can leave us a comment to help you. Thanks

haxordBd facebook cloning command on termux

Hello everyone, welcome again to this article about installing the HaxordBd tool for termux to clone Facebook. If you are a termux user or you want to start with termux for hacking. I have to tell you that you are in a good way and you won’t be disappointed.

Termux is the best app for fun for curious android users, but you can do many things and exploits by using it. We always discuss Termux hacking tools like:

What is Facebook account cloning?

The cloning of Facebook accounts is a simple scam that is simple to be misled by. In these accounts, the scammer impersonates you, using your profile picture and other publicly available data to fool your friends into giving up their information.

It sounds like a harmless technique, but a cloned account can cause real damage. Your friends might be tricked into sending them money, collecting passwords, or tricking them into other scams.

If you want to know about what is Facebook cloning I suggest you read this article about facebook-account-cloning

What is HaxordBd?

HaxordBd is a termux tool developed by the htr-tech – Tahmid Rayat in order to help termux users to clone Facebook accounts. This is a fun tool and an amazing one hope you guys will love it.

Features :

  • [+] No Login Required!
  • [+] All Bangladeshi Operators are Available!
  • [+] 7,8,9,10,11 DIGITS are Available !
  • [+] Easy for Beginners!


We all know that before installing any tool into termux we have first to install its dependencies, but you may find that you have already installed some.

  • Git
  • Python
  • Python2

Installation of dependencies

The installation of dependencies is quick and simple on termux just by using pkg you can install any dependencies. But before we start dependencies installation we have first to update and upgrade the termux repositories by using the command.

pkg update && upgrade

After that, we can then install git, why git? because Git will help us to clone HaxordBd from Github to our termux. By using the command

pkg install git

Then, after the git installation is finished we can now install python and python because the tool itself was developed using python language.

pkg install python && python2

HaxordBd installation

The following process is to install now HaxordBd on our termux and start using it. The process is simple just by using the command git clone, we will be able to get the tool into our termux.3

git clone

Then, once the cloning process will finish we will now be able to run the tool. But first, we have to navigate into the Haxord folder by using the command:

cd haxorbd

Now once into the folder, we can then run the tool by using the command:


It will request the password and user name, you have to use

  • USERNAME : haxor
  • PASSWORD : htrtech

Tips: The Cracked ID’s are saved in ‘hacked’ directory


We and the developer of this tool are not responsible for the Misuse of This Tool !! use it at your own risk.

How to spam your friend using Beast_bomber

Welcome to this article that is about Beast_bomber a spam termux tool. Well if you are here reading this article it’s because you heard about spamming. And I’m sure this is your chance to know about it.

In our last article, we discussed how to use shark for social media hacking on termux, you may have a look if interested. Before we continue with our today article. What I have seen is that most termux users especially beginners make mistakes when starting with termux.

They ignore some crucial steps when starting with termux and that brings them to fail in their learning process. But for that, as I know their problem I prepared some good termux starting posts to help them.

Well, as you can see I chose some beginning posts to help you, but if you still need more you can continue your research.

What are spam and spamming?

a. spam

Anyone who’s spent more than a handful of seconds on the internet has encountered spam. It’s seemingly an inseparable part of the internet experience, something we accept as normal

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media.

kinds of spam

  • Email spam
  • SEO spam
  • Social networking spam
  • Mobile spam
  • Messaging spam

Also, for those who would like to know more about spam here is a post to read more about spam What is Spam: The Essential Guide to Detecting and Preventing Spam.

b. Spamming

Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.

What is the Beast_bomber?

Then, before we continue let us first discuss what is exactly the Beast_bomber. The Beast_bomber is a termux tool that helps the attacker to send anonymous spam SMS, call, email, WhatsApp, Telegram, Discord and DoS attacker. Using Beast_bomber the attacker has more attack possibilities like:

  • SMS spamming(works better with proxy)
  • Email spamming
  • WhatsApp spamming
  • Discord spamming
  • Telegram spamming
  • And also, DoS attack

How to install Beast_bomber?

Now, for Email spamming to try this attack you must have support for “less secure apps” set to “turn on” on your Gmail. Here is the link to do so: Then the program will configure everything else on its own.

If the automatic setup fails, you can set it up manually. Along with BoMbEr comes a requirements.txt file. This file contains external dependencies. To install them, you need to type the command: pip install -r requirements.txt

Before trying the manual configuration we have to clone the Beast_bomber from GitHub by using the command:

git clone

The next step is to navigate into the Beast_bomber folder using the command: cd Beast_Bomber

Then, we can perform the manual configuration by using the command:

pip install -r requirements.txt

Now, we are ready to start the Beast_Bomber tool by using the command:


Notice: when installing this tool sometimes you can get an error saying that “ModuleNotFoundError”

To solve this kind of error you have only to install the missing module by using your termux terminal using the command:

pip install the name of the required library (example: pip install _ctypes)

Shark termux tool to hack social media accounts

Welcome readers to this article that is about the Shark, a termux tool to hack social media accounts. If you are here, I guess you are looking for the best tool for you to use to hack social media accounts. Let me give you hope that you are in the right place for any termux tool you can look for. Also in our previous articles, we discussed some termux tools like Zphisher, Fikrado, Adminhack, and more.

The problem is that most termux users seem to ignore some important information before digging deeper into hacking with termux. Articles that talk about termux package management, the difference between termux to Linux, and Graphical management on termux. All these articles should be read by any termux user who wants to know more about termux. But the sad news is that they ignore them.

Also, imagine someone wanting to use a phishing tool, yet he or she doesn’t even know what a phishing attack is. What I suggest is to start termux from the beginning before starting to use it for hacking. Also, you have to know the best hacking tools on Termux. Without wasting time, let me introduce you to the shark tool.

What is Shark?

Shark is a termux tool that helps the user generate a phishing link in an advanced way. And also, the good thing about this tool is that no one can detect the generated phishing link except some browsers.

So if you want to use this tool first you have to know what a phishing attack is. A phishing attack is an attack that the attacker performs by creating a fake page that looks like the official one in order to get victim information.

The attacker will use a social engineering attack to influence the victim to click on the phishing link. And you have to know that a phishing attack is a social engineering attack.

Who can install Shark?

Well, to be able to get and install Shark, you need to have Termux installed on your device. Linux users can also install it without a problem. The storage space is also required, without forgetting the internet, in order to get the tool as it’s on GitHub.

Also, when installing a shark, it will request your Ngrok token, which means you have to get one. But it’s not a must to have it because you can use other servers.

Installation process on Linux

To install Shark on Linux the first thing to do is to update and upgrade your Linux then you can continue the installation. Only with this one command Shark will start the cloning and installation of some needed features.

sudo wget -qO- | sudo bash

Then, when the process starts, it will install all shark features. Then, it will start the installation of the Shark. And after that, it will ask you to insert your Ngrok token to continue. And after you finish inserting it and press Enter, it will continue automatically.

But if you don’t have a Ngrok token, you can just press enter to continue the next step. After all the process of installation, you will be ready to use shark.

Shark disclaimer

The next thing to do is to press y so that we go to the next screen.

From here we can select any platform we want by using numbers as shown in the screenshot. In this example, I will select Facebook.

As the screenshot shows we selected 1 which is Facebook then we have to decide which phishing page we want to generate.

On this part, let me add something. The shark has 3 servers that you can use to generate the phishing link. Ngrok, Cloudflare, and localhost, we can choose the one we want to use.

Shark serves

Now as it is shown in the screenshot we have then to select the server we want we can try with Cloudflare because it is the new server added by the project owner.

Then, from here we have to provide the port number or use a default one. But if you are an advanced user you can can select Y to change the default link generated by cloudflare and continue.

Well done! then we click on N if we don’t want to modify the generated phishing link and now we have the phishing link that we can send to the victim and wait for the output.

Installation process on Termux

Now let us discuss how you can get and install Shark on termux. As you might know, we always start by updating and upgrading termux repositories before we continue. pkg update && upgrade.

after that, we are all ready to start the cloning process. The process to install shark on termux is the same as on Linux. But only on termux, we have to install wget using the command pkg install wget.

Notice: If you are using termux from the playstore you won’t be able to update and upgrade termux. I recommend you to uninstall it and get termux from f-droid

Then you can use the command:

wget -qO- | bash

All the processes are the same as on Linux just follow the step and everything will be done. In the first step, the installation of lib will start then after that the following step will follow.

Conclusion and disclaimer

This article is only for educational purposes we won’t be responsible for any misuse of this tool. Use it at your own risk. Hope this will help you to test your social media account security. You can rate this post to know which one is the best for you. Thanks

Rating: 1 out of 5.

Zphisher new version on termux

Hello, everybody welcome to this article which is about new Zphisher features. The last time we discussed Zphisher automated phishing tool for termux. Then some of you were complaining that they don’t get the generated phishing link. But in this article, we are going to discuss new Zphisher features and the solution for that issue.

Before we continue for those who are not aware of Zphisher I’m going to give a quick review of it.

Zphisher itself is an automated phishing tool with 30+ templates. With this tool, you can hack social media accounts by only generating a phishing link and sending it to the victim and waiting for the result.

Then, without wasting our time let us start discussing today’s topic so that we can know what is new.

What’s new in Zphisher?

We are going to discuss old and new features because the Zphisher developer had reviewed them. Then, if we can try to see the old features of Zphisher we can see that it had the latest and updated login pages. Zphisher used to update the login pages. And also mask the phishing link into a trusted URL.

Also, the Zphisher developer tried to make it simple so that even beginners can use it without a problem. It also supports Docker, for more information about Docker you can check on the Docker website

  • Latest and updated login pages.
  • Mask URL Support
  • Beginners friendly
  • Docker support
  • Multiple tunneling options (Localhost, Ngrok )

Now, as we have discussed old features let us discuss new features I’m just going to explain the last feature which is the updated one.

New Features

  • Latest and updated login pages.
  • Mask URL support
  • Beginners friendly
  • Docker support (checkout docker-legacy branch)
  • Multiple tunneling options
    • Localhost
    • Ngrok (With or without hotspot)
    • Cloudflared (Alternative of Ngrok)

The new Zphisher feature is Multiple tunnelling. In the previous version of Zphisher, only two tunnels were there and it was required to activate the phone hotspot before running the server. But in this new version, they also add Cloudflare. So now it’s easy to generate a phishing link with Zphisher and send it to the victim.

When you install Zphisher it will automatically install PHP, Cloudflare and others dependencies to avoid errors during the installation or the use of the tool. And also you can select a port forwarding service without problem.

Also, you will now be able to generate a phishing link without turning on your hotspot and no need to have an account on the Ngrok platform. But it’s better to have a Ngrok account, the reason why I suggest you create one.

Disclaimer from Zphisher developer

Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.

This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in a wrong way.

This tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someone’s social media. However, you may try out this at your own risk.

You might also like Zphisher automated phishing tool for termux


Now we have reached the end of our post I hope you guys already know what is new in Zphsher. Also, in the following article, we are going to discuss how to use the new Zphisher to make sure you come back to not miss it. Thanks.


Welcome to this article that is about the termux Facebook hacking tool. I’m sure if you are reading this article, it is because you are looking for some solutions. But let me tell you that the solution is here this tool will help you do the task.

Also, in our previous article, we discussed the Pyphisher termux tool to hack social media accounts. This tool looks similar but is not the same you may have a look at it so that you understand that.

Without wasting time let me introduce you to the tool that we are going to discuss in this article.

What is is a Facebook hacking Tool script that is fast and user friendly. This tool was created for hacking multiple Facebook accounts using the Facebook API.

Also, you can use this tool on any python 2.7 installed device like Linux, windows, termux.

Who can install this tool?

The answer to this question is that any termux or Linux user can install without a problem. Also, you must note that no rooting is required.

We are going to see how we can get and install on termux and Linux.

How to get and install Fikrado on termux?

Well, now we can then discuss the installation on termux. But before we start the installation make sure you have git, python2, lolcat installed on your termux to avoid some errors during installation.

Also, for those who don’t have them let us discuss a bit how to get them. The first thing we are going to do is to update and upgrade termux repositories. Then we can install git using the command:

pkg install git -y

After the installation of the git, we can then continue by installing python2 using the command:

pkg install python2 -y
pkg install python -y

Then, we can install local using python-pip command:

pip install lolcat

Now, as we have all its dependencies we can then get Fikrado from Github by using the command:

git clone

Great, if everything has gone well the Fikrado folder will now be on our termux. Then to know if that folder is on our termux we can check by navigating into it by using the command:


Then, we will now be into the folder and we can now run the script for the installation using the command:


Note: During installation if you get an error saying that no module name requests.

Then, open with a text editor like nano and modify line 5, remove requests. Then save and run the script again.

And then you get the first screen of that is:

How to get and install Fikrado on Linux?

The installation of Fikrado on Linux is the same as on termux but the difference is the first line.

curl --output
sudo python2
git clone

We have reached the end of our article if any questions or suggestions don’t hesitate to comment down so that we try to give you an answer. Thanks for your time.

Pyphisher termux tool to hack social media account

Hello friends, welcome to this article that is about Pyphisher a termux tool to hack social media account. We are going to discuss this amazing tool that I discover somewhere during my research. You may be in need of testing your social media account password strength or having another reason why to use Pyphisher. You are going to like this tool but it depends on your need.

Well, nowadays social media accounts have become the target of some bad guys or script-kiddies on the internet. They try to hack social media accounts for different reasons like for money, impressing others or other reasons. Before discussing Pyphisher we are going to discuss how they do to hack social media account.

Also, know that Pyphisher works like Zphisher, Anonphisher, Mrphish and other social media hacking tools.

How do hackers do hack social media account?

Even if Facebook is more secure there are some techniques black hackers use to hack Facebook account. We can mention phishing, keylogging, Trojans/backdoors, Sniffing, Social Engineering, and Sessions Hijacking …

These techniques are not the only ones to use. But it depends on the attackers, some can develop their own scripts to perform their attacks and others can use other developers’ scripts. We are going to discuss phishing techniques as Pyphisher is a phishing tool.


Phishing is one of the easiest ways to trick users into giving out their login credentials. All an attacker does is set up a webpage similar in design to the victim homepage. Then he attach a server-side script to track the username and password entered and store it in a log.

After the attacker finished setting up the server-side then he can send the link by using some attractive words to the victim. The attacker can combine both phishing and social engineering attacks to trick the victim.

The attacker will be waiting for the victim to log in to that fake page and get the information entered and “boom” the account will be hacked. Although some social media started detecting and blocking phishing links. But there is some other way to send a phishing link without getting blocked.

What is Pyphisher?

Pyphisher is the ultimate phishing tool in python. that includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail and many others. With this tool, you can be able to generate a phishing link that can help you get your victim information.

Also, by using this tool you don’t need to root your smartphone because it works on both rooted and unrooted devices. But before using it there are some requirements.

Pyphisher requirements

Well, as you might know, most termux tools required some dependencies before being installed or used. We are going to see what are Pyphisher dependencies and how to get them so that we avoid getting errors during installation.

  • Python(3)
  • PHP
  • Curl
  • Unzip
  • Wget
  • 90MB storage (All files from git clone)
  • 60MB storage (Direct run script without git clone)

Well, you may find that you have some of these dependencies installed on your termux. But if you don’t have them, don’t worry we will discuss how to get them.

Installation of dependencies

Now we can start installing some dependencies before going on to the next step but if you have these dependencies you can go to the next step that is about the installation. But before doing any dependencies installation start by updating and upgrading the termux repository.

Installation of python 3

The installation of python on termux is simple to do, just by using the command:

pkg install python

Installation of php

Then, we can proceed to install PHP after we have done with python.

pkg install PHP

Installation of curl and wget

We can install curl and get by using the command:

pkg install curl wget -y

Also, we can’t forget to install git because to get Pyphisher from Github we will use the git command, only use the command if you don’t have git installed:

pkg install git 

Now, as we have seen how we can install all dependencies we can now continue with the installation.

installation process of Pyphisher

By using the command git we are going to get Pyphisher from Github and start the installation.

git clone

Then, after we have got the Pyphisher folder into our termux we can now navigate into Pyphisher folder using the command: cd PyPhisher. And then to run the Pyphisher script we use the command:


When you run the script the installation of Ngrok and Cloudflare will start.

And then after the installation will be finished we will now be ready to use Pyphisher.


This article is for educational purposes. Here it demonstrates how phishing works. If anybody wants to gain unauthorized access to someone’s social media, he/she may try out this at his/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author is not responsible for any misuse of PyPhisher!

7 Best Termux shells for advanced and beginners users

Welcome users and happy new year, this article is about the 7 best termux shells you should know. If you are a termux user you must know this because it will help you when using termux. Well, before continuing you may also have a look at Termux package management everything you need to know. Most people make mistakes when starting with termux by ignoring some important steps that they should know.

Most beginners think they can be good hackers by only installing and using termux hacking tools. But let me tell you that you can’t become a good hacker doing that, but you can read this post to help you. How to become an Ethical Hacker also get into the penetration testing field. I’m sure by reading those articles you will get something before taking any decision also you can read Why you should avoid using Termux for hacking.

Well, now we can continue with our today article.

What is a shell? or Unix shells?

A shell is a command language interpreter that executes commands from standard input devices (like a keyboard) or a file. Shells are not parts of the system kernel, but use the system kernel to execute programs, create files, etc.

A Unix shell is both a command interpreter and a programming language. As a command interpreter, the shell provides the user interface to the rich set of gnu utilities. The
programming language features allow these utilities to be combined.

Files containing commands can be created, and become commands themselves. These new commands have the same status as system commands in directories such as /bin, allowing users or groups to establish custom environments to automate their common tasks.

The shell’s job is to translate the user’s command lines into operating system instructions. For example, consider this command line:

sort -n phonelist > phonelist.sorted

In termux when you want to change the login default shell you can use the command:

Use chsh from termux-tools to change your login shell. Currently, Termux supports bash, fish, tcsh, zsh and a few other shells.

List of the 7 Termux shells

1. Bash

Bash is the shell, or command language interpreter, for the gnu operating system. The
name is an acronym for the ‘Bourne-Again SHell’, a pun on Stephen Bourne, the author
of the direct ancestor of the current Unix shell sh, which appeared in the Seventh Edition
Bell Labs Research version of Unix.

Also, is a sh-compatible shell that incorporates useful features from the Korn shell (KSH) and the C shell (csh).

It is intended to conform to the IEEE POSIX P1003.2/ISO 9945.2 Shell and Tools standard. It offers functional improvements over sh for both programming and interactive use. In addition, most sh scripts can be run by Bash without modification.

Bash is the default shell after installing termux.
The BASH shell init files are ~/.bashrc$PREFIX/etc/bash.bashrc and more. Also, if you want to know more about termux bash you can use the command `man bash` and `info bash` you will get more information.


2. Beanshell

BeanShell is a small, free, embeddable Java source interpreter with object scripting language features, written in Java. It executes standard Java statements and expressions but also extends Java into the scripting domain with common scripting language conventions and syntax. BeanShell is a natural scripting language for Java.

To install beanshell it’s easy, you can just use the command:

 pkg install beanshell

Here are a few examples of BeanShell commands:

  • source(), run() − Read a bsh script into this interpreter, or run it in a new interpreter
  • frame() − Display a GUI component in a Frame or JFrame.
  • load(), save() − Load or save serializable objects to a file.
  • cd(), cat(), dir(), pwd(), etc. − Unix−like shell commands
  • exec() − Run a native application
  • javap() − Print the methods and fields of an object, similar to the output of the Java javap command.
  • setAccessibility() − Turn on unrestricted access to private and protected components.

Also, you can check the complete list of BeanShell Commands for more information.


3. Fish shells

fish is a smart and user-friendly command line shell for Linux, macOS, and the rest of the family.

  • Extensive UISyntax highlightingAutosuggestionstab completion and selection lists that can be navigated and filtered.
  • No configuration needed: fish is designed to be ready to use immediately, without requiring extensive configuration.
  • Easy scripting: New functions can be added on the fly. The syntax is easy to learn and use.

Also, for more information yo can visit fishshell documentation or its homepage: Then, to install fish you can use the command:

pkg install fish

4. IPython shell

IPython is a powerful and also an advanced interactive shell for Python language. it also provides a rich toolkit to help you make the most of using Python interactively.

One of Python’s most useful features is its interactive interpreter. It allows for very fast testing of ideas without the overhead of creating test files as is typical in most programming languages. However, the interpreter supplied with the standard Python distribution is somewhat limited for extended interactive use.

The goal of IPython is to create a comprehensive environment for interactive and exploratory computing.

Then, to install IPython on termux you must have python installed on your termux then you can use the command:

pip install ipython

For more information you can also visit IPython homepage:

5. TCSH shell

TCSH is a C shell with file name completion and command line editing. The TCSH shell init files are ~/.tcshrc$PREFIX/etc/csh.cshrc and more. Also you can use the command `man tcsh` and `info tcsh` for more information.

And also for more information you can visit tchs home page:

Then, to install TCSH shell on termux you can use the command:

pkg install tcsh

6. Xonsh

Xonsh is a Python-powered, cross-platform, Unix-gazing shell language and command prompt. The language is a superset of Python 3.6+ with additional shell primitives that you are used to from Bash and IPython. Also, it works on all major systems including Linux, OSX, and Windows. Xonsh is meant for the daily use of experts and novices.

Also for more information about xon you can visit its homepage: and also for the installation you can just use the command:

pkg install tcsh

7. ZCH

Zsh is a shell designed for interactive use, although it is also a powerful scripting language. Many of the useful features of bash, ksh, and tcsh were incorporated into zsh.
The zsh shell init files are ~/.zshrc and $PREFIX/etc/zshrc and more. Also you can use the command man zsh and info zsh for more information.

And also you can visit its home page: and also for the installation you can use the command:

pkg install zch


These are the 7 best shells for termux, hope you will do more research about them because they are useful for both beginners and advanced users, I wish you goodluck. Also, if you may have a question don’t hesitate to comment down so that we help you with an answer.

Also, yo can check termux wiki for some additional information about termux shells.

igHack best termux Instagram hacking tool

Welcome everyone to this article that is about IgHack best Instagram termux hacking tool. We will discuss this tool because it’s powerful and easy to use. In our previous article, we discussed how to get Instagram user information without even having an account.

And also if you are curious to know the tool which can help you to get Instagram followers. We prepared it for you, Get Instagram followers using BadRobo termux hacking tool. I know you might be looking for a termux tool to hack an Instagram account but let me chock you this post is not for that.

This article is an introduction to igHack a termux tool to do that task. You are the one to choose how you want to use the tool.

What is igHack termux instagram hackig tool?

Ighack is a bash-based script that is officially made to test the password strength of an Instagram account from termux with a brute-force attack and. It helps the user perform brute force on his own account to test his password’s strength.

ighack works on both rooted Android devices and Non-rooted Android devices. The tool was made by N17R0 using bash and was tested on termux.


Before we discover how to get and install igHack we have first to discuss its requirements so that we avoid errors when installing. What we need to install Ighack:

igHack Features

  • Instagram stable API!
  • Updated maintenance!
  • tor usage!
  • And also it is easy to use for Beginners!

Get and install igHack on termux

Now we can start the installation process if only we have all requirements. But for PHP don’t worry we are going to see how to get it, also you must have installed termux.

Then, before we continue we have first to update and upgrade our termux repository by using the command:

pkg update && upgrade

The following step is to install PHP by using the command:

pkg install php
installation of PHP

After that we are going to install python and python3 using the command:

pkg install python -y
pkg install python2 -y
installation of python

Then, we are going to install lolcat by using the pip command:

pip install lolcat

And also we are going to install git so that we can be able to get igHack from GitHub by using the command:

pkg install git
installation of git

Then, here we are going to get igHack folder from Github by using the git command:

git clone

The process of cloning ighack will start and when it will finish, we can now navigate into the folder we got from Github by using the command:

cd ighack

And the last step is to execute the script by using the command:

bash setup

Well done, after all these steps if everything works well we are going to get this screenshot



  • From this option, you can start the attack on the default pass list of tools.


  • Also, from this option, you can select the manual pass list and try to attack.


  • From this option, you can know more about the developer.


  • You can also update ighack tool if updates are available for that.


  • And then from this option, you can exit the tool