🔥 Burn Fat Fast. Discover How! 💪

Termux Hackers (Users)

Logo of telegram channel termux_for_android — Termux Hackers (Users) T
Logo of telegram channel termux_for_android — Termux Hackers (Users)
Channel address: @termux_for_android
Categories: Education
Language: English
Subscribers: 68.20K
Description from channel

╔╦╦╦═╦╗╔═╦═╦══╦═╗
║║║║╩╣╚╣═╣║║║║║╩╣
╚══╩═╩═╩═╩═╩╩╩╩═╝
Use This bot to contact with us
@Bot_Nospam_Bot
Check This bot @TermuxForAndroidBot

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

1

1 stars

1


The latest Messages 22

2022-04-25 19:45:29 HOW HACK FACEBOOK ACCOUNTS USING KEYLOGGER-BY SUDHANSHU


STEP 1: Create Server for Hacking Passwords

First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:

1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.

2. Extract the RAR file. Now you will get one folder and three files.

3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account.

4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional.

5. Click on Log and Result Setting. In Log Email Title enter the subject of email like “my keylogger report” or anything else that you you like. Click the last two options that add computer name and add the victim’s name.

6. Now click on “Other Options.” In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message – so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.

7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.

8. Now your keylogger server is ready for you to hack Facebook accounts.


Step 2: Extracting the icon file from any installer (resource hacker)

1. Open the resource hacker folder and select the reshacker file.

2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker.

3. In the menu, there is one action button. Click on it and then click save all resource.

4. Save all the resources to the desktop or any other location of your choice.

5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.

6. That leaves us with the icon of installer file (Ccleaner setup icon).

Step 3: Bind the Keylogger server with any software

1. Go to keylogger folder and open the Binder.

2. Click on the button shown below to add files.

3. Add the keylogger server and the setup software (in our case it’s Ccleaner setup).

4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown in the figure.

5. Now again go to file’s menu in Binder and click on Bind files.

6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.

Step 4: How to spread the keylogger

1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)

2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.

3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive.

Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.

Hacking someone’s Facebook account takes more than a few minutes.


Share and support us

https://t.me/Termux_For_Android
730 views- ᴋᴇᴠɪɴ, 16:45
Open / Comment
2022-04-24 12:57:42 What is Ngrok?

Ngrok may be a reverse proxy that makes a secure "tunnel" from a public termination for an online service running regionally.

In different words, you'll be able to use Ngrok to reveal a port on your system, as an example, the port on that your application or web site is running, to a public URL.

Basically, Ngrok creates a tunnel, wherever its perform is to direct external connections to your localhost.

How Ngrok works?

Let's assume you have a web server running on your machine. Now you intend to share, with a colleague, the address of a website that you developed, but as it is on the private network. To do this, just use Ngrok. Considering that the webserver is at port 8080, you only need to execute the following command:
ngrok http 8080

What is the utilization of Ngrok?

1- Share web site to a colleague that's running on a personal network;

2- Create a communications protocol server on your device;

3- Port forwarding;

4- Testing mobile apps connected to your domestically running backend;

5- Stable addresses for your connected devices that are deployed within the field;

6- Running personal cloud services from your home;

7- You can conjointly use Ngrok in moral hacking. You might be pondering the way to use Ngrok in moral hacking? primarily, you'll take the reverse shell and reverse the affiliation of any device remotely through the communications protocol tunneling with Ngrok.


How to install Ngrok in Termux?

Here ar the steps to put in Ngrok in Termux. Please follow the steps one by one to avoid any style of error. Please note that you just should look forward to every command to urge completed.

1. 1st of all, open your Termux and so sort the below command to update and upgrade your Termux repositories.

pkg update && pkg upgrade -y

2. currently sort the below command. The below command can install zip wget packages in your Termux. Here zip are accustomed unfasten the zipped folder of Ngrok whereas wget are accustomed transfer the Ngrok.

pkg install wget -y

3. currently sort the below command because it is to transfer Ngrok in your Termux.

wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-arm.zip

Wait for downloading to be finished. it's going to take up to a pair of to five minutes to transfer Ngrok relying upon your web speed.

4. sort the below command in your Termux to unfasten the Ngrok folder.

unzip ngrok-stable-linux-arm.zip

5. once Unzipping, use the below command to administer Ngrok permission to browse, write, and execute.

chmod +x ngrok

6. open the Ngrok web site Now click on the Signup button, and so produce a replacement account on Ngrok.

Now you would like to verify the Ngrok account. Open your email to verify your Ngrok account. There you may see Ngrok email. merely open that mail and click on on the ensure account button.

7. currently login to Ngrok together with your Email Id and watch word and seek for auth token on the Ngrok page. Then merely kind the below command in your Termux And replace  together with your auth token.

./ngrok (paste your authtoken)

Running this command can add your auth token to your ngrok.yml file. Connecting associate degree account can list your open tunnels within the dashboard, provide you with longer tunnel timeouts.

8. Ngrok has been with success put in in your Termux. Use the below command to visualize a way to use Ngrok in Termux.

./ngrok help

t.me/Termux_For_Android
352 views𝓮𝓻𝓶𝓲 ㅤㅤㅤ ㅤ ㅤ, 09:57
Open / Comment
2022-04-24 12:43:23 SUPPOR US

Bitcoin: bc1qtwkz2sda6s7waudl6s9sung28lsn40p6438zpf

Ethereum: 0xC4Dc696Ea0aDEeDC1f00BeAc3DE628bFf309Becb

TRC20(USDT): TFUAMBnpNKAhUZqye7BShQZ6spNqnAUbPD


t.me/Termux_For_Android
465 views𝓮𝓻𝓶𝓲 ㅤㅤㅤ ㅤ ㅤ, 09:43
Open / Comment
2022-04-22 17:45:40 Termux Hackers (Users) pinned «If anyone want Paid promotion contact me http://t.me/Promotion_by_TermuxForAndroidBot»
14:45
Open / Comment
2022-04-22 17:45:34 If anyone want Paid promotion contact me

http://t.me/Promotion_by_TermuxForAndroidBot
911 views𝓮𝓻𝓶𝓲 ㅤㅤㅤ ㅤ ㅤ, 14:45
Open / Comment
2022-04-21 14:26:04 If you're a Kali Linux User

All in one hacking tool
1.7K viewsĸevιn , edited  11:26
Open / Comment
2022-04-21 14:24:48 All-in-One Hacking Tools For Hackers! And more hacking tools! In termux and linux!

#Add your termux permision
termux-setup-storage

#Upgrade all & full packages
apt full-upgrade

#Install package git
apt install git

#clone this repository
git clone https://github.com/mishakorzik/AllHackingTools

#cd to directory allhackingtools
cd AllHackingTools

#Start script to install system
bash Install.sh

New features: 

1) New Tools And functions

New tools for penetration testing. And many new opportunities.

2) Castomization and desing

Now a new customization for the terminal has been added, and a new design has been added.

3) New Desing And functions

The AllHackingTools installer has been updated it has got a new design and many features to check packages.

4) New design for download and update

Now added the ability to quickly update AllHackingTools and new design, download, and update AllHackingTools.

5) Fixed More Bugs

Fixed many bugs in the system, now AllHackingTools works faster and more stable

6) Run Tools

The user can now run the tools directly from AllHackingTools, even though they are already installed.

7) Restart AllHackingTools

And when you run a tool and exit it, AllHackingTools automatically restarts.

if the error and the command does not work: cd AllHackingTools && bash fix.sh

And when he writes a big rainbow button: Done, everything is ready! Wait until you can write to the terminal.

#Free Ngrok authtokens:
26bDGGPyD3XWVtyzK3dfK401oIq_74Wi1m84A7rv9bP5YnihG
26bDzEjjfPls5kLHWGnG3K3voA7_69wkMBqUUExRHoA8v3gEL
26bESCvhbagWfGrHSv4NpTnSCpI_92oE8UFimPxU4nBNMK5T
26bEfSIlR1IcEEayMpRQlj0ttGw_3hrWetKnHZ4FMXc9hDt3Q
26p3rvZocfT7VzraejQNoCjPNN6_6UqEGG1izGcbE8ewtBchT
26p4VZpnXIjsiDq9YizXvkk6UAK_4ZyVi8D2Q63yWCap4LBbF
26p5O1vfFGLsdf9f8D3dzHAcmUv_454E7DaBz26mgs9yVkzQi
26t7bQBRJiFnK74z35eLcPYJPXI_2cyAyXVcEAnMTV9eAaYZw

#configure ngrok
ngrok authtoken < sеlеct free authtoken>

#start ngrok
ngrok http 80

Run command to start AllHackingTools: msdconsole
1.7K viewsĸevιn , 11:24
Open / Comment
2022-04-19 16:06:03 https://t.me/Termux_Hacking_Commands
513 viewsĸevιn , 13:06
Open / Comment
2022-04-19 16:05:45 Unlimited MEMBER SCRAPING TELEGRAM

Don't Pay For Member Adding Service✓

Process ->


(1) apt update && upgrade

(2) pkg install git

(3) git clone https://github.com/Cryptonian007/Astra

(4) cd Astra

(5) pip install -r requirements.txt

(6) python3 manager.py (add fake numbers)

(7) python3 add.py
519 viewsĸevιn , 13:05
Open / Comment
2022-04-18 10:57:08 Slowrolis

Slowloris is a low-bandwidth DoS hacking tool.
The software is rewritten in Python, and it performs an HTTP Denial of Service attack that slows down or makes the small servers crash.
One can also use Slowrolis to initiate a Dos attack on any website. DoS attack is a type of cybersecurity attack where many requests are suddenly sent to the website server to get crashed.
Slowrolis develops a large number of HTTP requests and sends headers of packets periodically to keep the network’s connection open.
Slowrolis allows never to disconnect the connection portal unless the server does so. As the server shuts down the connection, a new link has already been created. As a result, the server goes down 401 error or doesn’t fulfill any requests.

How to install and run?

You can clone the git repo or install using pip. Here's how you run it.

- sudo pip3 install slowloris

- slowloris example.com

That's all it takes to install and run slowloris.py.
If you want to clone using git instead of pip, here's how you do it.


$ git clone https://github.com/gkbrk/slowloris.git
$ cd slowloris
$ python3 slowloris.py example.com

SOCKS5 proxy support

However, if you plan on using the -x option in order to use a SOCKS5 proxy for connecting instead of a direct connection over your IP address, you will need to install the PySocks library (or any other implementation of the socks library) as well. PySocks is a fork from SocksiPy by GitHub user @Anorov and can easily be installed by adding PySocks to the pip command above or running it again like so:

sudo pip3 install PySocks

You can then use the -x option to activate SOCKS5 support and the --proxy-host and --proxy-port option to specify the SOCKS5 proxy host and its port, if they are different from the standard 127.0.0.1:8080.

Configuration options

It is possible to modify the behaviour of slowloris with command-line arguments. In order to get an up-to-date help document, just run slowloris -h.
189 viewsĸevιn , 07:57
Open / Comment