In this article I’m going to show you top 10 termux phishing tool. Lot’s of phishing tools are there in termux. If you use termux means you can try all these phishing tool’s to hack your victim social media username and password.
Table of Contents
1. Weeman termux phishing tool
This tool can make mostly all biggest website to http phishing page.This tool make python language and this tool mostly used for DNS spoofed attack ( see dsniff, ettercap). before installation you must check requirements.
4.5/5
How to install
Specification
Tested platform
Requirements
Specification
- Make unlimited phishing page
- Create any web page as a phishing page
- No cost
- Very easy to use
Tested platform
- Termux
- Linux
- Windows
- Mac
Requirements
Android
- Android version 5.0 and above
- Termux application
- Git package
- Php package
- Python package
- Bs4 python module
Linux
- Update up to date
- Git package
- Php package
- Python package
- Bs4 python module
2. Nero phishing server
Nero phishing server This tool clone any website at a phishing page if you make any phishing page definitely you should know HTML programming or any other language but if you use this tool you can easily make any website as a phishing page.
4/5
How to install
What is Nero phishing server?
Requirement’s
Tested platform
What is Nero phishing server?
Nero phishing server This tool clone any website at a phishing page if you make any phishing page definitely you should know HTML programming or any other language but if you use this tool you can easily make any website as a phishing page.
Requirement’s
- Android version 5.0 and above
- Termux
- Python package
- Git package
Tested platform
- Termux
- Linux
- Windows
- Mac
3. Mrphish termux phishin tool
mrphish is a bash based script which is officially made for phishing social media accounts with portforwarding and otp bypassing cntrole. This tool works on both rooted Android device and Non-rooted Android device
5/5
How to Install
what is Mrphish
Specification
Requirement’s
what is Mrphish
mrphish is a bash based script which is officially made for phishing social media accounts with portforwarding and otp bypassing cntrole. This tool works on both rooted Android device and Non-rooted Android device
Specification
- 60+ uptodate pages
- Updated maintainence
- 1 Port Forwarding Option
- No link issues, timing
- 5+ categories in pages
- Easy for Beginners
Requirement’s
- Android version 5.0 and above
- Termux
- Ngrok
- Php
- Hotspot
- Git package
- Lolcat python module
4. Nexphisher
nexphisher is an automated phishing tool made for termux & linux . This tool has 40 phishing tool templates of 30 websites. there are 5 port forwarding options are there including localhost.
4/5
How to install
What is nexphisher?
Requirements
Tested Platform
What is nexphisher?
nexphisher is an automated phishing tool made for termux & linux . This tool has 40 phishing tool templates of 30 websites. there are 5 port forwarding options are there including localhost.
Requirements
- Android version 5.0 and above
- Git package
- Python package
- Ngrok
- OpenSsh package
Tested Platform
- Termux
- Linux
- Windows
- Mac
- ubuntu
5. Hacklock termux phishing tool
Hacklock is a bash based script which is officially termux from this tool in just one click you can generate pattern phishing tool which can hack victim android mobile password and. This tool works on both rooted Android device and Non-rooted Android device.
5/5
How to install
Feature’s
Requirement’s
Tested Platform
Feature’s
- Real pattern hacking
- Updated maintainence
- Ngrok link
- Easy for Beginners
Requirement’s
- Android version 5.0 and above
- Termux application
- Git package
- Php package
- Ngrok
Tested Platform
- Termux
- linux
- windows
- Mac
6. Seeker
Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get
4.5/5
How to install
What is seeker?
Feature’s
Requirement’s
Tested Platform
What is seeker?
The seeker is simple base script this script help you to find Accurately Locate Smartphones using Social Engineering
Feature’s
- Longitude
- Latitude
- Accuracy
- Altitude – Not always available
- Direction – Only available if user is moving
- Speed – Only available if user is moving
Along with Location Information we also get Device Information without any permissions
- Operating System
- Platform
- Number of CPU Cores
- Amount of RAM – Approximate Results
- Screen Resolution
- GPU information
- Browser Name and Version
- Public IP Address
- IP Address Reconnaissance
Requirement’s
- Android 5.0 and above version
- Termux
- Ngrok
- Git package
- Openssh package
- Python and python2 package
Tested Platform
- Kali Linux
- BlackArch Linux
- Ubuntu
- Kali Nethunter
- Termux
- Parrot OS
7. Phish mailer
Lot’s of tools available in web but if you use that tools so many procedure there at the same time errors also came. This tool very easy to use and sent lot’s of mails from different templates.
5/5
How to install
Features
Requirement’s
Tested Platform
Features
- Phshing any template
- The mail received on primary section
- Professional template
- More phishing template
Requirement’s
- Android version 5.0 and above
- Termux application
- Python & python2
- Phishmailer
- Fake email account
Tested Platform
- Termux
- Linux
- Windows
- Mac
8. T-phish
This tool have more option’s specifically for Facebook once your victim click your link and type any data you will get all information on your terminal.
3/5
How to Install
Requirement’s
Special Feature
Tested Platform
Requirement’s
- Termux or linux
- Ngrok
- If you use termux your hotspot should be on
Special Feature
- FB – photo phish
- FB – group phish
- Facebook verifi
- Instagram followers phish
- IPFinder
Tested Platform
- Termux
- Linux
- Windows
- Mac
9. LordPhish
loard Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
3.5/5
How to install
Features
Requirement’s
Tested platform
Features
- Latest Login Page
- Mask URL Added
- 50 Fake Screen Option
- Easy for Beginners
Requirement’s
- Android version 5.0 and above
- Termux application
- Git package
- Ngrok
- Openssh package
- bash Language
Tested platform
- Termux
- Linux
- Windows
- Ubuntu
10. Create own phishing page
From the previous tools are create some other person so they can delete any time so if you need phishing page you will create. in this section you will learn how to create phishing page.
10/10
How to create
Requirements
Features
Requirements
- Any Device
- Chrome Browser
Features
- Get username and password
- Get User-Agent information
- Get Otp
Post a Comment