Skip to main content

How to Hack Your Friends Screen Lock

Password Hacked:
 

    Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it. 

You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device.


Please follow each steps carefully to get perfect run of this tool :

  1. First , open your play store on your android mobile phone and then search TERMUX and you have to download it.
  2. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection.
  3. type pkg update then hit enter.
  4. Now type pkg upgrade then it will automatically upgrade your envoirment.
  5. Then you have to clone this tool in termux, Tool link (LockPhish), to copy this tool type git clone https://github.com/JasonJerry/lockphish.git and hit enter.(You should have installed git on your system to install git type pkg install git)
  6. then type ls press enter for showing what is inside in the current directory.
  7. You can see a folder name lockphish was created so let's go inside the folder type cd lockphish and press enter.
  8. type ls press enter now you can see what is in this directory.
  9. type bash lockphish.sh press enter for making this file executable.
  10. If you have never used termux before then type pkg install php press enter then it will start downloading PHP, because this program needs PHP for executing this program even a lot of programs requires PHP for executing them.
  11. then type bash lockphish.sh press enter.
  12. If you have not installed wget on your system then type pkg install wget and it will start downloading wget because ngrok is required for this tool we need to start a server and ngrok is one of the best service providers for servers. After installing wget it will be downloading nrgok automatically.
  13. then open hotspot and again follow all the steps written in 14 to 16.
  14. after that it will start executing after few minutes it will show you a direct link you have to copy that link and don't close the app only hide it and send this link to your victim . When victim will open that link you can see your victim IP address .
  15. when your victim opens the link and allows access you will start getting Password of his mobile phone.
Warning: this trick will work until the victim's data connection is on after that it will automatically off.

Warning: Please use if for educational purposes don't try to do any illegal thing then we are not responsible.

     
    if you like this blog please comment on your experience and also if you have any query or if any problem then also comment it we will try our best to solve your problem ...........


Thanks for reading this blog!!!

Comments

Popular Posts

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered as a