Skip to main content

How to Hack Your Friends Screen Lock

Password Hacked:
 

    Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it. 

You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device.


Please follow each steps carefully to get perfect run of this tool :

  1. First , open your play store on your android mobile phone and then search TERMUX and you have to download it.
  2. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection.
  3. type pkg update then hit enter.
  4. Now type pkg upgrade then it will automatically upgrade your envoirment.
  5. Then you have to clone this tool in termux, Tool link (LockPhish), to copy this tool type git clone https://github.com/JasonJerry/lockphish.git and hit enter.(You should have installed git on your system to install git type pkg install git)
  6. then type ls press enter for showing what is inside in the current directory.
  7. You can see a folder name lockphish was created so let's go inside the folder type cd lockphish and press enter.
  8. type ls press enter now you can see what is in this directory.
  9. type bash lockphish.sh press enter for making this file executable.
  10. If you have never used termux before then type pkg install php press enter then it will start downloading PHP, because this program needs PHP for executing this program even a lot of programs requires PHP for executing them.
  11. then type bash lockphish.sh press enter.
  12. If you have not installed wget on your system then type pkg install wget and it will start downloading wget because ngrok is required for this tool we need to start a server and ngrok is one of the best service providers for servers. After installing wget it will be downloading nrgok automatically.
  13. then open hotspot and again follow all the steps written in 14 to 16.
  14. after that it will start executing after few minutes it will show you a direct link you have to copy that link and don't close the app only hide it and send this link to your victim . When victim will open that link you can see your victim IP address .
  15. when your victim opens the link and allows access you will start getting Password of his mobile phone.
Warning: this trick will work until the victim's data connection is on after that it will automatically off.

Warning: Please use if for educational purposes don't try to do any illegal thing then we are not responsible.

     
    if you like this blog please comment on your experience and also if you have any query or if any problem then also comment it we will try our best to solve your problem ...........


Thanks for reading this blog!!!

Comments

Popular Posts

C programming basics - part 1

Data Types: There are two data types in C programming language - (1)- Primary Data Types  (2)- Secondary Data Types   (1)- Primary Data Types :      Primary data types are those data types which are defined already in the           language. They can be used directly in the program. These data types one of the main important thing in C programming.  There are mainly three types primary data types----- a)- int : For integer values range = -32767 to 32768 b)- float : For float values range = c)- char : For character values range = -127 to 128

Know Operating Systems (Briefly)

OPERATING SYSTEM :     Today's lot of operating systems have arrived in the marketplace, but some OS gets failed because of their specifications or trends. Let me tell you what is an Operating System in short " an operating system is just a system software which help us to communicate with a machine using graphical or command line interface."     That's means when someone using his/her smartphone or computer or any type of device that's sure this device has an operating system and there is a proper way to use this device. Every Operating system has its own way or type of using it.    An OS is also making a vital role in the device because there are lot of things in a device which depends on the OS like bluetooth-connectivity, wireless-connections, display and many more things.   WORKING PROCESS :   Basically an OS is a system software so it contains all information about the hardware of this device.    Now...

Application Softwares (types of softwares)

  Application Software:   An application software always works under a system software. These softwares are generally a set of one or more programmes, designed to solve a specific problem, or do a specific task e.g. An application software for payroll processing produces pay slips as the major output, and an application software for processing examination results produces mark sheets as the major output along with some other statistical reports.    And also if a person is writing a program to solve his/her personal and particular problems is also comes under the application software. These programs included in an application software package are called application programmes and who made these programs are also known as application programmers. The most commonly known application software are 1. Word Processing Software: A word processing software enables us to make use of a computer system for creating editing, viewing, formatting, storing retrieving and painting ...

why visiting darkweb is not too easy?

DARK WEB :       Today we will talk about Dark-Web ,   the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content. Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google , Bing or other search engines.          The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals.  Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion REAL WORLD:  If we talk about real world scenarios ...

Programing Langauges HLL vs LLL

High Level Languages:      High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.      High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language. Advantages of HLL: It provides higher level of abstraction from machine languages. It is machine independent languages. Less error prone, easy to find debug errors. They provides the better programming productivity. Disadvantages of HLL:  Its take additional time to translate its code to machine code. HLL programmer are much slower than...