Category Archives: Termux

Hacktronian all in one termux tool for hacking

Welcome reader to this post that is about Hacktronian all in one termux tool. This tool is amazing hope you are going to like it. Just make sure you read this post and make sure you don’t miss any steps.

well, in our previous article, we discussed Badrobo tool for getting Instagram user information. This tool helps you to get Instagram user information without even having an Instagram account. Then you may have a look at it if you are interested.

Then, without wasting time let us introduce our today tool that is Hacktronian. for termux new users I thought about you and prepared for you some articles which can help you.

What is Hacktronian all in one termux tool?

Hacktronian all in one termux tool is a Linux and termux tool for penetration testing which helps users to perform some pentest works and vulnerability testing. Also, the tool itself helps you to do multiple tasks there where the name all in one came from.

Then, know that by using this tool you will be able to perform these tasks. Information gathering, password attacks, wireless testing, exploitation, sniffing & spoofing, web hacking and more.

Also, Hacktronian facilitates the use of some of the tools for information gathering like, Nmap, Setoolkit, CMS Scanner …

And also for password attacks, it uses Cupp and Ncrack. Also, for wireless testing, it uses reaver, pixiewps and Fluxion.

Then, as you know already what Hacktronian all in one termux tool is let us discuss who can install it.

Who can install Hacktronian all in one termux tool?

Well, to install Hacktronian you need to have an android device or a computer that has Linux. Then, for android users, you must also have Termux installed.

What is termux?

Termux is an Android terminal emulator and Linux environment application that works directly with no rooting or setup required. A minimal base system is installed automatically, additional packages are available using the package manager.

How to get and install Hacktronian in Linux ?

Then, let us discuss the process of installing Hacktronian in Linux then we are going to discuss how to install it in Termux.

well, to install it in Linux you have first to open your terminal then, update with the command sudo apt update. And after when it will finish updating, use the command cd to change the directory and go to desktop: cd Desktop

Then, when it will show you that it is on desktop use this command to get Hacktronian from Github.

git clone https://github.com/thehackingsage/hacktronian.git

Now, it will start cloning the tool from Github once done. you have to navigate into the Hacktronian folder by using the command cd hacktronian. And after when you will be into that folder you can now install it by using the command:

chmod +x install.sh

Then, command chmod helps to change the permission of the file, before executing it. Now we can execute the script by using the command:

sudo ./install.sh

Then, if everything was done very well you must be able to run Hacktronian by using the command hacktronian. And you will see the hactronian menu.

How to get and install Hacktronian all in one termux tool in termux?

Now, let us discuss how we can install Hacktronian in termux and start using it. Before we install the tool make sure you have a good network and some storage space.

well, then first we open termux then we update and upgrade our repository with the command: pkg update && upgrade. Then, after that we are going to install git so that we can be able to get hacktronian from Github by using the command:

pkg install git

Then, after we have installed git, we can now install python by using the command:

pkg install python
pkg install python2

Well, now we can get the tool from Github because we have already installed git. we can use the command:

git clone https://github.com/thehackingsage/hacktronian.git

Then, after we have got hacktronian from Github and we have it already in our termux terminal. We can now navigate into the hacktronian folder by using the command:

cd hacktronian

Now, in Linux in order to execute the script, we have to change its permission so that we won’t get an error when trying to execute the script by using the command.

chmod +x hacktronian.py

Now, we can execute the script as it was written in python we are going to use python2 so that we execute the script by using the command:

python2 hacktronian.py

Well done, you are now able to use the tool congratulation. If you don’t get t the same result as me re-read the process and make sure you follow all processes.

Now we have reached the end of this article, hope you have found it interesting, and also if you do have a question just comment down and we will try to give an answer.

Get Instagram followers using BadRobo termux hacking tool

Welcome, read to this article that is about BadRobo a termux hacking tool to get Instagram followers. If you are reading this article is because you want to know which tool you can use to get followers. Don’t worry you are in a good place to get what you need.

We are going to discuss BadRobo a tool that will help you to get Instagram followers using termux. Also, in our previous article, we discussed how to get Instagram user info even if we are not connected or using Instagram.

You might know other tools or technics to use to get Instagram followers. But I’m sure this tool is also doing a great job. Termux is powerful and is giving its users the possibility of installing different hacking tools. if you have never tried I suggest you start today.

Well, Instagram is a social networking platform which is having  1 billion monthly active users getting followers seems to be difficult because you have to get a good plan for it. Big companies use Instagram for advertising their product and get audiences. Also, for personal uses, you people like to see having 1k or 1M of followers and that makes you happy. Using the BadRobo tool will help you to get followers.

what is BadRobo for Instagram followers?

BadRobo is the Best Instagram Bot available now with all features!. Also, this BOT did not violate any of Instagram’s rules, so you don’t have to worry about being blocked!

BadRobo features

Then, here is the list of all features for BadRobo. Also, this tool is updated on version 2.0. The developer provides updates to maintain the project safely.

  • FollowBot
  • FollowBot 2
  • Masslooker
  • Re-Hashtag
  • C-Mention
  • Boom Group DM
  • Unfollow Non-Followers
  • Hashtag Liker
  • Hashtag Liker 2
  • Like&comment Hashtag

Who can install BadRobo Instagram followers bot?

Well, to be able of installing BadRobo, the first thing is to install termux in your android and if you have already done it’s okay. Then, make sure you have good internet and 400 Mb of free space. Also, some Linux basics commands are required.

Having also, some termux knowledge will be also essential otherwise you can read How to hack with your android using termux.

Installation process

Now, to start the installation for the good habit let us update and upgrade termux repositories. Also, don’t forget updating and upgrading termux repositories when you want to install a new package:

dpk update && upgrade

Then, by using the command git we are going to get BadRobo from Github to our termux. Also, if you have not yet installed git on your termux you can use the command: pkg install git. Know that if you don’t have git installed you will get an error when you try to get the tool from Github.

git clone https://github.com/jaleelx98/Bad-Robo.git

Now, the process of getting BadRobo from Github will start, and after when it will finish we will be able to navigate inside the folder. Then, using the cd command that means change directory, this command will help us to navigate in the BadRobo folder.

cd Bad-Robo

Then, we are going to unzip BadRobo, to unzip it we are going to use the unzip command which is familiar for Linux users. But before we use the command unzip have first to install it with the command: pkg install unzip -g

unzip Bad-Robo.zip

After, the unzip process, we have to install some BadRobo requirements so that we don’t get errors during installation. We are going to use the pip to be able to install those requirements.

pip install -r requirements.txt

Now, we have reached the end of the installation to run the tool we have to use the command:

python badrobo.py

Now, we are ready to use the tool, if you get an error during installation you can comment so that we help you. Also, if any beg or misworking of the tool be free to contact the developer of the tool.

How to get Instagram users info using termux

This article is about how you can get Instagram users information without even following them. And also as the title mentioned we are going to use termux for that task but you can also use Kali Linux if you want.

Instagram is a free, online social network where people can share photos, videos and all also messages. Users can upload and edit photos and short videos because of its features it becomes more popular. Also, nowadays it’s not only for individuals but also for businesses, companies can advertise their products using Instagram and get clients.

With Instagram, users can earn money using it in many ways. But we are not going to cover that in this article. Then, because of its popularity, it becomes a target of most hackers and mostly scripts kiddies. Script kiddies try to hack Instagram users account to impress their friends or to have fun.

Also, if you are a new user of termux you can check the following articles which can help you to have an Idea about termux. You might also be an advanced or intermediate user hope these articles can also interest you.

Now, without wasting time let us now dive into our topic. The tool which we are going to discuss in this article is Get Instagram users info.

What is Get Instagram Users Info?

Well, Get Instagram Users Info is a termux and kali Linux tool that helps you to get Instagram users information without login into your account or following the person.

This tool was developed by KADA. The tool itself is simple to use both beginners and advanced can use it without a problem. Also, it has 4 contributors and you can contact them or follow them on Telegram.

Know that the tool is not about cracking or getting user passwords but only users information. Also, the tool itself works perfect on Kali Linux but it supports termux also without any problem.

The tool is still in development, if you find any error or bug you can report the bug or error to the developer to fix it. Get Instagram Users Info was developed using Python3.

How to install Get Instagram Users Info on Kali Linux?

Then, before we discuss how to use this tool let us first see how we can get and Install it on Kali Linux then we will see how to install it on termux.

Now before we start the installation make sure you update your Kali Linux by opening your terminal and using the command:

Sudo apt-get update

Then, after kali finishes updating you can now install python3 as the script was written in python3 so that you can be able to install it. Those who don’t have python3 installed can use the command:

sudo apt-get install python3

Now, as you have installed python3, you can then get the tool from Github so that you can be able to install it. Before you clone the tool make sure you navigate into the desktop or anywhere you want to store it but I put it on the desktop.

git clone https://github.com/zxllkada/Get-instagram-users-info---Any-instagram-account.git

Then, the folder of Get Instagram Users Info is cloned on the desktop (the destination you have chosen). Now we are able to install the tool, then navigate into the folder you downloaded and you will see the folder “Get-Instagram-users-info–Any-instagram-account”.

after, you have navigated into that folder you can now install the requirements.txt by using the command:

pip3 install -r requirements.txt

Then, requirements will start installing and when it will finish navigating into zxllkada subdirectory using the command:

cd zxllkada
cd Dump_Instagram_Information_ANY_ACCOUNT

Now, as we are in the Dump_Instagram directory we can then run the tool with the command:

python3 InstaInfo_zxll.py

Then, you will see the first page of the script appear which will ask you to put the username of the Instagram account. And when you put it and you press enter the script will start searching for information and give you the result of your search.

Install on Termux

As we have seen how we can install Get Instagram users information on Kali Linux, now let us install it on termux. the procedures are the same but instead of using apt, we are going to use pkg.

Now, to start the installation for the good habit let us update and upgrade termux repositories. Also, don’t forget updating and upgrading termux repositories when you want to install a new package:

pkg update && upgrade

Then, here we can install other requirements in order to install properly the tool without a problem. At this step, we are going to install git, python and python3 because the tool was developed in python.

pkg install git -y 
pkg install python -y

Now, we have to install python3, because git will help us to clone the tool from Github so that we can install it.

pkg install python3 -y

Then, its time of cloning Get Instagram users Info from Github using git with the command:

git clone https://github.com/zxllkada/Get-instagram-users-info---Any-instagram-account.git

Now, as we have cloned the tool from Github into our termux we are now ready to install and run the tool. Then, we are going to navigate into Get Instagram Users Info directory using the command:

cd Get-instagram-users-info---Any-instagram-account

Then, we are going to install some requirements using the command:

pip3 install -r requirements.txt

Now, we can navigate in zxllkada directory then, in Dump_Instagram_Information_ANY_ACCOUNT so that we install the tool.

cd zxllkada
cd Dump_Instagram_Information_ANY_ACCOUNT

Then, as we are now in that directory we are now ready to install Get Instagram Users Info tool using the command:

python3 InstaInfo_zxll.py

Well done, we have done everything as it is in this article we are now ready to use the tool. The tool will ask for the username that you want to get its information.

Contribution

If you would like to contribute to this project kindly feel free to contact the developer of this tool. Thanks

Termux package management everything you need to know

Hello reader, welcome to this article that is about Termux package management. You may ask yourself why to talk about Termux package management and yet you know how to use termux. But let me tell you that there are many reasons you should know about it to not do mistakes in the future.

I also know it’s better to know about Termux management to understand how termux deal with packages. You may think it’s not important to know about Termux package management. But I’m sure when you will finish reading this article you will understand why I wrote this article.

There are many articles all over the internet that discuss termux hacking. But what I saw is that most of them forget to talk about important things to help Termux users. The reason why we are going to discuss this forgotten topic is that it’s rare to get. Also, I wrote about the differences between termux and Linux because people were confusing about it, so I decided to help them as I do now.

Termux uses apt and dpkg for package management, similar to Ubuntu or Debian. So what are the differences? I invite you to read this article, the differences between termux and Linux to have a clear understanding.

Using Termux package management

As you might know, Termux uses apt and dpkg for package management. We strongly recommend using a pkg utility instead of apt directly. It is a wrapper that performs a number of tasks:

  • Provides command shortcuts. Use “pkg in” instead of “pkg install” or “apt install”.
  • Automatically runs “apt update” before installing a package if necessary.
  • Performs some client side repository load-balancing by automatically switching mirrors on a regular basis. That is important to prevent termux hitting quota limit on hosting.

Install Termux package

Installing a package in termux is simple than you might think. It is highly recommended to upgrade existing packages before installing the new one. You can install updates by running this command:

pkg update
pkg install "package-name" 

Additionally, it’s better to check for updates at least once a week or when you want to install a new package. Otherwise, there is a certain risk that during package installation or upgrade you will encounter issues.

You may also like to know why you should avoid using termux for hacking

Then, when it comes to removing an installed package, make sure you know the name of that package then, use the command:

pkg uninstall "package name"

The package will be removed but modified configuration files will be left intact. If you want to remove them, use apt purge instead.

there are other additional commands which you can use with pkg.

CommandDescription
pkg autocleanRemove outdated .deb files from the cache.
pkg cleanRemove all .deb files from the cache.
pkg files <package>List files installed by the specified package.
pkg list-allList all available packages.
pkg list-installedList currently installed packages.
pkg reinstall <package>Re-install specified package.
pkg search <query>Search package by a query.
pkg show <package>Show information about a specific package.

Termux official repositories

Termux is having one official repository, and also some additional repositories. Those repositories provide content on a specific topic and can be enabled by installing packages with names ending in -repo.

The main repository of termux can be found on this link: https://packages.termux.org/apt/termux-main/. Also, all packages for termux official repositories are built from scripts located in github.com/termux/ and are maintained and signed by members of the Termux developer team. And, the public keys for verifying signatures are provided in the package termux-keyring.

You may like also to know what are the differences between termux and Linux

Other Termux repositories

RepositoryCommand to subscribe to the repository
game-packagespkg install game-repo
science-packagespkg install science-repo
termux-root-packagespkg install root-repo
x11-packages (Android 7+ only)pkg install x11-repo
unstable- packages (Android 7+ only)pkg install unstable-repo

Packages command errors

Termux moved the primary Termux package repository hosting from Bintray to Mirrors since Bintray has shut down on May 1st, 2021. This created problems for users while running package installation and update commands with pkg or apt and commands will fail with errors similar to the following:

E: The repository 'https://termux.org/packages stable Release' does no longer have a Release file.
N: Metadata integrity can't be verified, repository is disabled now.
N: Possible cause: repository is under maintenance or down (wrong sources.list URL?).

If that is the case, then run termux-change-repo command and change your mirror for the main repository to a different Termux Mirror. If you have installed other package repositories, like sciencegames and unstable, then you must select and change those mirrors as well. You can check your current mirrors by running termux-info.

If for some reason termux-change-repo is not available, you can manually edit the source.list to replace the main URL with a value obtained from Termux Mirrors List. Run nano $PREFIX/etc/apt/sources.list to edit it. This will not change the URLs of other package repositories, to change those run pkg install termux-tools afterwards and use termux-change-repo or manually edit their files under $PREFIX/etc/apt/sources.list directory.

AnonPhisher Termux Social Media Hacking Tool

Welcome readers to this post in that we are going to discuss Anonphisher automated phishing tool. You may be in need of creating some fake websites and get sensitive information from your victim. The good news is that with Anonphisher it’s possible to do that using Termux.

Then, let me invite you to help me to thanks Mr AnonyminHack5 who took the time to think about this problem and brought a solution for that. This developer passionate about hacking and security has many projects that require support. We can change the world together by supporting him. Here is his Telegram bot where you can encourage him.

Now, let us see what this tool can do, and how we can get it. I’m sure you are familiar with Termux, or if not don’t worry you can start with our guides which will help you to understand what Termux is and why you should use it.

With, these articles I’m sure you can start your Termux journey from beginner to advanced. Also, you can find more article about termux on the Termux menu because I didn’t list all here. Then, let us discuss our AnonPhisher Tool.

What is AnonPhisher tool?

AnonPhisher is an automated phishing tool made by AnonyminHack5 to phish various sites with 40+ templates. Also, has an inbuilt ngrok already to easily help you generate your link and send it to your victim. Anonphisher tool is made with pure bash script and needs required packages for it to work.

AnonPhisher was tested on various platforms that means you can use it not only on Termux but also in Linux distribution

  • Linux
  • Ubuntu
  • Slax Linux
  • Lubuntu
  • Also, on windows

AnonPhisher features

AnonPhisher is having many features which anyone can use depend on your need, both beginner and advanced can make his choice. Then, as you have seen in the definition AnonPhisher is having 40+ templates those are AnonPhisher features here we are going to discuss some.

When you want to use AnonPhisher feature you are the one to choose one depending on the template you want.

Also, know that this project is under development the author adds new features on updates you may find other new features and changes when you update AnonPhisher.

What is new?

[+] Custom !

[+] Pugb free uc phishing page 2021 !

[+] Free fire phishing page !

[+] Latest Login Pages !

[+] 5 Port Forwarding Options !

[+] Easy for Beginners !

[+] Wi-fi phishing added!

[+] Facebook free likes phishing page !

[+] Fortnite phishing page !

[+] Credit card and call of duty phishing pages !

Installation requirements

Well, we can’t continue without discussing the requirements because we will need them before installing AnonPhisher otherwise we will get errors. Like other Termux tools, AnonPhisher has also some requirements for the best result.

AnonPhisher requirements are not new for you because most of the termux tools have the same requirements. Also, you may find that you have even them installed already.

  • PHP
  • Wget
  • Unzip
  • Curl
  • Also, you need to have internet

How to install AnonPhisher in Termux?

Then, let us discuss how you can install this tool in Termux. But before we start the installation let us first discuss how we can get AnonRequirements for those who don’t have them.

To install requirements we are going to use a command that will help us. Then, open the terminal and by using the command.

apt install git php curl wget -y 

Then, now we can proceed with the installation, we are going to use simple Linux commands for the installation. For beginners, we have prepared an article that can help you to start with Linux. Linux tutorial for beginners complete guide. Also, Basic commands Linux for beginners to advanced.

Before we install we are going to update and upgrade Termux repositories by using the command, apt upgrade & update. Then, when the upgrading and updating will be done we will be ready to install AnonPhisher. Now, let us get the tool from Github by using the command.

git clone https://github.com/TermuxHackz/anonphisher

Then, once termux will finish cloning AnonPhisher into our termux, we will navigate into Anonphisher folder by using the command, cd anonphisher.

Notice: just type the command as it is written here or you can copy and paste to avoid errors. Then, we are going to install Anonphisher by using these commands.

bash setup & install.sh
bash anonphisher.sh

Then, the first screen of anonphisher will appear and we are ready to use the tool and do what we need. This tool is easy to use for both beginners and professionals. And also if you face any errors during installation make sure you entered correctly all commands as written in this article.

Asking for support

For the development of this tool, if you find any issue feel free to submit it to the Anonphisher developer to review it. You can use and rate him on the Telegram bot.

Also, you can support this project as you can, just feel free to contribute to the development of this project or other projects under development. There are many projects that need your contribution

Notice: After you have run the bash install.sh don’t run it next time you’re using it, it will be deleted only run the bash anonphisher.sh

Additional information

> Localhost (127.0.0.1)

> NGROK (https://ngrok.com)

> SERVEO (https://serveo.net)

> LOCALHOSTRUN (https://localhost.run)

> LOCALXPOSE (https://localxpose.io/)

Then, when using Anonphiser if the link is not generated you must run the bash setup turn on your device hotspot then select ngrok.

Also, if the issue persists, go to ngrok.com, then download ngrok, set it up in termux. Then, copy your authtoken and paste it into your termux home then turn on your device hotspot and run ./ngrok http 3333. Then, go back to the Anonphisher session and select ngrok.

ShellPhish Termux tool to hack social media

ShellPhish is a powerful open-source tool that was designed for phishing attacks. Phishing attacks have become popular for both beginners and advanced attackers. AbirHasan created Shellphisher due to the need of beginners and made this tool easy to work for them.

Also, it contains some templates generated by another tool called SocialFish and offers phishing templates webpages for more than 10 popular sites such as:

  • Facebook
  • Instagram
  • Google
  • Microsoft
  • Netflix
  • Paypal
  • Twitter, also playstation
  • GitHub, also Twitch
  • And more other

List of available sites in ShellPhish

Then, as I said ShellPhish has more than 10 templates that we are going to list here. And also, the developer adds other templates on each update of ShellPhish.

ShellPhish v2.5-MOD

ShellPhish v2.5 is the updated version of this tool. Here we are going to list what is new for this version.

  • New login/phishing page
  • Traditional login page
  • Also, advanced voting poll login page
  • Fake security login page
  • Facebook messenger login page
  • Also, new sites were added, and 4 port forwarding options

What can you do with Shellphish?

Well, with ShellPhish you can create phishing pages of the most popular social networking websites and other popular websites. It is easy to use for creating a fake page in order to get sensitive information from victims.

also you might like to know about wifi hacking with airgeddon

What is Phishing attack?

Phishing is a type of social engineering where an attacker sends a fraudulent (“spoofed”) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware.

Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.

Installation process

The installation of ShellPhish is quite simple, we are going to discuss how you can install it in both Termux and Linux.

Then, before we continue and see how we can get and install ShellPhish make sure you have Termux on your device. And if you have not yet installed termux don’t worry you can read our post about How to hack with your smartphone using termux. And for Linux users, you can read how to start with Kali Linux. best way to follow.

Then, after we have installed what is required, make sure you know some Linux commands. But if you don’t know you can read Basic Linux commands for beginners to advance.

How to install ShellPhish in Termux

Now, open the terminal and we are going first to update and upgrade termux packages by using the command:

apt update && upgrade

Then, once the process has finished we can now install git that will help us to clone Shellphish from Github. Also, you can skip this step if you have already git installed.

apt install git -y

Now, by using the git command we can get ShellPhsh from Github to our Termux. But before we do so we have first to install some ShellPhish dependencies to avoid errors during the installation process.

apt install git wget php unzip curl -y

Then, we can get Shellphish from Github in order to install it in termux by using the command.

git clone https://github.com/AbirHasan2005/ShellPhish

Well done! we can now navigate into the Shellphish folder to install the tool cloned from Github. We are going to use the Basic Linux commands for beginners.

cd ShellPhish

Then, we are going the change the permission and install Shellphish by using the command.

chmod +x * && bash shellphish.sh

Now we have installed Shell phish in Termux. if you followed all steps listed in this article, you will see this screen appear.

How to install Shellphish in Kali Linux?

Now, let us see how we can install Shellphish in Kali Linux. The first step we are going to navigate and move to Desktop with the command cd Desktop.

Then, when on the desktop we are going to create a folder where we will clone Shellphish. we can use the command mkdir shellphish

Now, we can navigate into shellphish file by using the command cd shellphish. Then we are going to clone shellphish from Github using the command.

git clone https://github.com/AbirHasan2005/ShellPhish 

Finally, we are going to execute shellphish tool by using the command: ./shellphish.sh. Also, know that for new kali Linux will ask you to run that command as root.

Note: This is version 1.8 if you want to update to version 2.5 just run the command bash update.sh

Legal disclaimer:

Usage of Shellphish for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state, and federal laws. This article is for education purposes only we assume no liability and are not responsible for any misuse or damage caused by this article

Why you should avoid using Termux for hacking

Welcome reader to this article where we are going to discuss why you should avoid using termux for hacking. If you are reading this article is because you would like to know why Termux discouraged hacking. We are going to discuss how you can use termux safely instead of using it as a cyber weapon.

On various Internet resources, Termux is recognized as utility extremely helpful for varieties of purposes like hacking, phishing, and information gathering. This is possible due to the availability of famous pentesting software like  Metasploit Framework, SQLMAP, Aircrack-NG, Nmap, and many others. The best experience could be achieved by using a rooted device and NetHunter modified kernel.

Why Termux discourages hacking

Most script kiddies are using Termux as a hacking weapon to have fun or to scare their friends by using phishing attacks, information gathering, and so on. Know that is not about the legit use of Termux for authorized pentesting by security specialists.

What is the general purpose of Termux?

Termux has been created as a general-purpose tool suitable for a wide range of use cases. Here are some uses of Termux:

  • Automation via shell scripting
  • SSH client
  • File synchronization and backup
  • Running pocket web server
  • Development environment
  • Hacking is the most used.

The internet is full of examples of bad usages of Termux, people are only interested in privacy violation, fraud, spying, password cracking, and other many bad usages. What is surprising is especially people who are new to command-line software and scripting who often ask questions like how to hack?, how to hack Facebook?

Obviously, this has nothing to do with legit penetration testing. Because of this Termux users don’t get chances to discover other Termux use cases, and this brings to mature communities of Linux enthusiasts to consider the Termux project as a “script kiddie” sandbox, rather than a serious project.

Questions often ask by script kiddies

Here are some questions often ask by script kiddies on social media and others Termux communities.

  • How to hack WiFi with Termux?
  • How to hack Facebook?
  • Also, How to view private photos of someone’s instagram?
  • How to clone a website using Termux?
  • How to spam with SMS?
  • Also, how to hack whatsapp account?
  • How to spy someone’s phone?
  • How to hack Instagram account?

As I said, this has nothing to do with legit penetration testing. People should know that Termux was not created for privacy violations. Also, know that hacking is far from the Termux community idea.

Also, in Termux repositories there are no again hacking tools like Metasploit, Hasscat, Hydra, and so on. Termux community did this to avoid misuse of the Termux project and not participating in script kiddies foolishness.

Why Termux removed Hacking tools like metasploit, hydra, Nmap in their repositories?

Well, let us see what Termux Community decided about these hacking tools, and about other hacking tools.

Now, we have chosen to not participate in this nonsense. We do not provide hacking tools in our repositories anymore – don’t even ask for them. Several common tools were removed, i.e. Metasploit, Hashcat, Hydra, SQLMAP. Additionally, we have banned these topics in our community social media: Hacking, Phishing, Spying (including OSINT), Spamming and others describing activity deliberately violating other person’s privacy or is destructive.

From Termux wiki.

Then, as you can see Termux community decided to not participating in hacking activities or answering any questions about hacking. Here is another Termux community rule.

Any kind of representing Termux as a tool for hacking, phishing and other potentially disruptive activity is strongly discouraged. Termux has never been developed for the purpose of being “cyber weapon”. We do not provide assistance with hacking, phishing, denial-of-service attacks, spamming, and so on. If you are interested in such activity – you are on your own. Entirely, without any help from our side.

How to be a hacker

If you have a dream to become a hacker, using just Kali Linux or parrot won’t make you a hacker. Because it requires a huge amount of skills, there are more than 100 videos on youtube that will tell you how to become a hacker in just 1 hour watching a video, what rubbish is that probably you can’t even in one month. You have to know that becoming a hacker takes years of studying and research. if you are interested in how your road map will look, I invite you to check this article: how to become a hacker, get into the penetration testing field.

Now, if you decide to use Termux for hacking purposes, you agree that you are on your own. Because if you get some issues termux community won’t help you to fix them, but you can contact the author of the tool for help.

How to use Termux safely

To use Termux safely you have only to follow some principles. Here are some principles that you can follow for a better experience with Termux.

There are many tutorials on youtube which show you how you can use Termux, make sure when watching you understand the goal and every instruction. Also, make sure you type commands that you know.

Also, if you want root permission only use it when necessary. Avoid running everything, including the current shell, as root. One thing you have to keep in your mind is to install only software from trusted sources because even open-source tools can contain trojan functionality.

Terminology

Script kiddie: a person with poor knowledge of computer systems and programming. he tries to use pentesting software for impressing friends or gaining authority in computer enthusiast communities.

Hacker: a computer expert who uses their technical knowledge to achieve a goal, within a computerized system by non-standard means. often referred to as “power” or “advanced” users. Hackers are not necessarily persons who use their skills to breach computer system security.

Hacking: exploiting weaknesses in computer systems or networks in order to bypass defenses, gain unauthorized access to data.

Ethical Hacking: also known as “Penetration Testing” – a simulated authorized cyberattack on computer units for evaluating the security level of a given system. All uncovered security issues are reported to the owner of the targeted system.

Phishing: a type of fraudulent activity involving the psychological manipulation of people to reveal confidential information. Since phishing exploits human nature instead of computer system weaknesses, it cannot be considered as hacking and moreover, it is never ethical.

Exploit: a fragment of data that is used to take advantage of a software or hardware bug to cause unintended or unanticipated behavior of computer system, leading to a denial of service or attacker’s privilege escalation (e.g. gaining root permissions).

Attacks & actions

DoS attack: an attack causing a denial of service through exhausting computing resources (e.g. network throughput), exploiting software bugs causing abnormal CPU or memory usage, or leading to crash of server software.

DDoS attack: a denial-of-service attack performed by multiple actors, usually by thousands of infected computer systems.

Spamming: sending unsolicited content to messaging systems and social media for the purpose of commercial advertisement, phishing, etc. Spam has nothing to do with hacking, but it doesn’t mean that it is an acceptable activity.

SMS bombing: a destructive variant of spam, involving the continuous sending of a large number of SMS messages in a short time.

Phone call bombing: same as SMS bombing but with phone calls. Under certain cases, it can be even considered rather as a DoS attack than just spam.

Brute force: a way to guess the password by trying every possible combination of characters, numbers, and special symbols. Under perfect conditions and without time constraints, this attack is almost always successful. In reality, it is the most expensive way of gaining unauthorized access as requires a trade-off between consumed computing resources (energy) and time.

Rooting: an activity aiming to gain root privileges on the device. Can involve exploiting vulnerabilities in an operating system, but often this is done in a “legal” way through installing custom firmware.

Root: also known as Superuser – a special user account that has all permissions and thus having full control over the operating system. On modern Linux-based systems, its privileges are defined through capabilities, which can be revoked or selectively granted to non-root users. More fine-grained root user permissions control can be achieved through implementing mandatory access control policies, e.g. via SELinux.

Track IP address in termux with the best tool

Do you need to track IP addresses for your friends or for business purposes? here we are going to see how we can use a Termux tool name “IP Tracer”. This tool makes it simple and easy even a beginner can use it.

Also, we discussed how to install IP-Info on termux in our previous post. Then, if you are a beginner or an advanced termux user we have prepared some interesting articles for you which will help you.

Then, before we continue let us first see what an IP address is because some might know the name IP but don’t know what it is.

What is an IP Address?

An IP address (Internet Protocol ) is a unique numerical label assigned to a device. It provides the location of the device in a network and a route on how to get there. The internet uses an IP address to send IP packets from a source to a destination. It is a building block that lets the internet function.

Also, you have to know that an IP address does not reveal personal information like a name, physical address. Then, as now we know what an IP address s we can now see what the IP Tracker tool is.

also you might like to know about wifi hacking with airgeddon

What is IP Tracer? – Track IP location

IP-Tracer is a Linux tool that is used to track an IP address and identify users, collect online details.

Features

  • Track IP address
  • Track your IP address
  • Update IP-Tracer

Who can install IP Tracker to Track IP address?

IP Tracker was designed and developed for Termux and Linux-based systems. Then, if you are using Termux or one Linux distribution you can use IP Tracker.

Then, before we continue and see how we can get and install IP Tracker make sure you have Termux on your device. And if you have not yet installed termux don’t worry you can read our post about How to hack with your smartphone using termux. And for Linux users, you can read how to start with Kali Linux. best way to follow.

Then, after we have installed what is required, make sure you know some Linux commands. But if you don’t know you can read Basic Linux commands for beginners to advance.

you might like also to know how to hack a Wi-Fi password using a dictionary attack.

How to install IP Tracer?

Now, this is a great time to get and install IP Tracer, as we said we have to install termux. Now we are going to update and upgrade Termux packages. Then, open your terminal and type the command:

apt update && upgrade

After we have updated and upgraded Termux packages we are now going to install git to get IP Tracer from Github. And to install git we use the command:

apt install git -y

Then, we are ready to get IP Tracer from Github if the git was been well installed. Now let us get IP Tracer from Github using the command:

git clone https://github.com/rajkumardusad/IP-Tracer.git

Well done! we can now navigate into the IP Tracer folder to install the tool cloned from Github. We are going to use the Basic Linux commands for beginners.

cd IP-Tracer

Then, we are going to change the permission so that we install properly IP Tracer by using the command:

chmod +x install

Now, after we have done changing the permission of the installation. we are going to install IP Tracer with the command:

sh install or ./install

You might like also Graphical Environment on Termux

Well done! if we have followed all processes we are now ready to use IP trace. Then, let us see how we can use IP tracer.

You might like also to know how to install Nexphisher on termux

How to use IP Tracer to track IP addresses?

Then, as we have IP Tracer installed, we can see that IP Tracer has some features as we have discussed before in this article.

Now, if we want to track our own IP address we use the command:

trace -m

This command will help us to track our own IP addresses. We don’t need to type our own IP address because the tool will do all for us. Then, if we want to track someone IP address we have to use the command:

trace -t target-p

Also, by using this command you have to mention the target IP address. for example tracer -t 12.0.0.1. Then, the tool will provide all information which it will get. Also, if we want to get more information about IP Tracer we can use the command trace.

You might like also to know how to install D-TECT on termux.

TigerShark tool on termux for penetration testing

Hello reader, welcome to this article. We are going to discuss how to install TigerShark in Termux. I’m sure that after you finish reading this article, you are going to decide either to install it or not but I hope you will.

As the title mentioned, you may ask yourself why penetration testing? I know it sounds heavy. But I will explain why. in our previous article, we discussed how to install Nexphisher on termux. Also, we have more than 10 articles on how you can install some special tools on termux.

Now, before we continue with our topic let us first have a look at some keywords. Also, if you are a beginner or new termux user, we have some articles which you can read for a better beginning, we care about you.

Then, it might be your first time or not to hear the word termux. If you don’t know what is it exactly, don’t worry we will discuss it.

What is termux?

Termux is an Android terminal emulator and Linux environment application that works directly with no rooting or setup required. A minimal base system is installed automatically, additional packages are available using the package manager.

The terminal emulator is basically an application that launches the command line program by using system call execve, and redirecting standard input, output and error streams onto the display.

Most terminal applications available on Android OS work with a very limited set of utilities which are usually provided either by the operating system or other rooting tools such as Magisk.

What is penetration testing?

Penetration testing is a type of security testing that is used to test the security of an application. It is conducted to find a security risk that might be present in a system.

When a system is not secure, then it’s easy for an attacker to get into it. Security is normally an accidental error that occurs while developing a system.

Then, as now we know what is termux and penetration testing. let us continue with TigerShark.

What is TigerShark?

TigerShark is a tool that incorporates various different phishing tools, frameworks, domain gathering, and mail spammers to create a fully customizable phishing kit. Also, this kit allows the creation of small to large phishing campaigns.

Additional information about this tool. it was created by s1l3nt78. Also was developed using shell and python languages.

TigerShark installation process

Now, if you don’t have termux you can download it from the play store. Then, open your terminal and update and upgrade termux packages with the command:

apt update && upgrade

Then, in the following step, we have to install git in order to clone TigerShark from Github. You can skip this step if you have git on your termux. Make sure you install git otherwise it won’t work.

apt install git -y

Now, we have to clone TigerShark from Github in order to install it on termux.

git clone https://github.com/s1l3nt78/TigerShark.git

Now, as we have already clone TigerShark from Github we are going to navigate in Nexphisher folded in order to install it.

cd TigerShark
Then, we can now install nexphisher with the command.
bash install.sh or ./install.sh

Then, after all the steps you will have TigerShark on your terminal. you can then use it as you wish.

Warning

This article is only for educational purposes. If you use this tool for other purposes except for education we will not be responsible in such cases.

Nexphisher best termux tool to hack any social media account

Hello, reader welcome to this article named Nexphisher advanced phishing tool. You are about to discover Nexphisher a termux tool that will help you to perform phishing attacks.

You are on a good way to learning about termux hacking tools. we have discussed more than 10 tools of termux. Also, if you are a new termux user don’t worry we have some articles for you. In our previous article, we discussed how to install D-TECT on termux. Also, if you wish you can have a look at other termux tools.

Then, before we continue let’s first discuss what phishing means because I’m sure some of you don’t know it.

what is a phishing attack?

When you want a victim to install malware or divulge sensitive information, you can use a phishing attack, you pretend to be someone or something else to get a victim to take any action he normally wouldn’t. Since you rely on human curiosity and impulses, phishing attacks can be difficult to stop.

so in a phishing attack, an attacker sends a victim an email that appears to be from someone he trusts, like his boss or a company he does business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account).

In the email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install the malware on the victim device. If he clicks the link, it may send him to a legitimate-looking website that asks him to log in to access an important file, except the website is actually a trap used to capture his credentials when he tries to log in.

What is Nexphisher?

Nexphisher is an advanced phishing tool that helps the user to create a fake website that looks like the trusted one in order to get the victim’s information.

Also, Nexphisher can work on Linux and also on termux, it requires only some Linux basics in order to install it.

Features

[+] Latest Login Pages!

[+] 5 Port Forwarding Options!

[+] Easy for Beginners!

Nexphisher installation process

Now, before we install make sure you have termux. Also, if you don’t have termux you can download it from the play store. Then, open your terminal and update and upgrade termux packages with the command:

apt update && upgrade

Then, in the following step, we have to install git in order to clone Nexphisher from Github. You can skip this step if you have git on your termux.

apt install git -y

After we have done the installation of git, we can now go on the following step which is to clone Nexphisher from Github.

git clone git://github.com/htr-tech/nexphisher.git

Now, as we have already cloned Nexphisher from Github we are going to navigate in Nexphisher folded in order to install it.

cd nexphisher
Then, we can now install nexphisher with the command.
bash tmux_setup
bash nexphisher

Warning

This article is only for educational purposes. If you use this tool for other purposes except for education we will not be responsible in such cases.