Skip to main content

Check amount of Bitcoin present in an wallet

 Hello Friends in this post I gonna tell you how to find how much cryptocurrency a person have. Bitcoin is the latest Cryptocurrency which worth is too much high. Gone are the days where people are unaware how much money a person have. But in this new generation world people can check someone wallet easily without his/her permission. So I am here to show you the steps to check this- DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Requirements- 1. The victim bitcoin wallet address 2. Internet( Soon I will post how to

Phishing Attack:Beginner Guide

So many wants to know what phishing actually is so simply it is making a fake duplicate site and getting victim's login credentials. For example you want to hack your friend Facebook account. So sent him a link like www.faceb00k.com (not www.facebook.com) and tell your friend visit this website you can get free PUBG hack or free girls number. When your friend visit that link and enter his credential you will get the login credentials. In this way your friend Facebook  account will got hacked.

What is ShellPhish?

A phishing attack is the most common attack to get access to the victim's credentials of any website. ShellPhish is one of the phishing tools that allows you to create a phishing link using termux. ShellPhish is created by thelinuxchoice and its a project on GitHub (But as of now he has been removed from github.


How ShellPhish tool works?

Using this tool you can create a link which will look like an exact page of the social media, when the victim will log in using your link , you will get the Credential at your terminal. ShellPhish uses port forwarding using 2 methods one of them is SSH (which currently not working). second one is Ngrok which I think have a bug but I will tell you how to use it properly.


NOTE: This post is only for educational purpose. I and this site do not support any criminal activity. If you are doing any sort of misuse of this information This site is not responsible for that. THIS SITE ONLY SUPPORT ETHICAL HACKING.


How to install ShellPhish in termux step-by-step: 

1. Update and upgrade the termux to the current date.

command-apt update && apt upgrade

Press N if ask about the version.



2. Install dependencies for ShellPhish without installing this tool you will get errors.

command-apt install php wget git

(While installing if it is asking do you wanna install just press y.)

This will install Php wget and git in termux which will be used while using ShellPhish.

If you already have any of this you can remove the name from command while installing.


 

3. Cloning the shellPhish project from the git Hub repository. 

command-git clone https://github.com/Ethical-Hacking-Zone/shellphish

 (I have older photo so don't go photowise)



4. Change directory to shellPhish.

command- cd shellphish



5.Granting access permission to the shellPhish.sh file.

command- chmod +x shellphish.sh



How to Use ShellPhish in termux:

1.  Use the below command to run shellPhish.sh file in termux.

 command- bash.shellphish.sh


2. Now you have 18 available options. every social media name have an assigned number Like Instagram have 01 Netflix have 08 and so on.

Here I am selecting Instagram but you can choose any from 18 options.


3. Now comes the most importat step:

[Turn on your mobile hotspot]

Now select the second option Ngrok.


4. Now you will get a link, just send this link to the Victim and wait, when user will log in using this link you will get the credentials in the terminal.


Working:

 In the below screenshot you can see that where you will find the credentials.

You will also find the IP of victim as well as the device which the victim is using(user agent).


Conclusion:

Sellphish is a great tool and freely available if anything is not working or you are facing any error just comment down below . I will be always here to help you.


DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .

 

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.


 


 



Comments

Popular posts from this blog

#5 H0w t0 cr3at3 a simpl3 c0nfig (Without capture)

How to Create an simple OpenBullet Config (Without capture) In this post, we will learn how to create config’s inside of OpenBullet. The config’s we will be making today are OpenBullet . DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. How to Create OB config Requirement- 1. Pc with internet connection 2. Opebullet software 3. A good working account of that website. 4. Patience and english knowledge to read this blog. :) Steps- 1. Go to the config tab in OpenBullet and press «New». Give a Name and author to it. (Now

Hotstar 0TP Trick(Phishing)

This post is for advance user. Who know what cracking is and what phising is?. If you don't know what phising is wait till next post. HOTSTAR OTP (TFO) BYPASS  TOOL HOTSTAR HACKING TOOL  With the help of this tool you can bypass Two Step Authentication Security   Must Use As Super User DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only . Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. OTP Bypass Instructions :- When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP w

How to get Microsoft Office 365 for free

In this post we are going to discuss how to get Microsoft 365 for free. Many people were asking how to get Microsoft Office 365. So this post is for them. Follow the steps carefully to get Microsoft 365 for free. DISCLAIMER: This website DOES NOT Promote or encourage Any illegal activities , all contents provided by this website is meant for EDUCATIONAL PURPOSE only .   Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. Steps 1. Connect your VPN to germany.(If you don't know visit my last post-  click here  ) 2. Go to  https://outlook.live.com/owa/  . And click Create Free account. 3. Enter any name you want to create account for as shown and click "next". 4. Cr