{"id":1145,"date":"2022-02-07T11:56:33","date_gmt":"2022-02-07T11:56:33","guid":{"rendered":"https:\/\/news4hacker.com\/?p=1145"},"modified":"2023-05-10T08:33:04","modified_gmt":"2023-05-10T08:33:04","slug":"how-to-hack-social-media-with-anonphisher-ethical-hacking-2023","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-hack-social-media-with-anonphisher-ethical-hacking-2023\/","title":{"rendered":"How to hack social media with Anonphisher | Ethical Hacking | 2023"},"content":{"rendered":"\n<p>In this post, we will learn How to hack social media with Anonphisher. Basically, this tool contains 50+ websites phishing pages which we can use to hack anyone&#8217;s social media account\u2026<\/p>\n\n\n\n<h2 id=\"anonphisher-how-to-hack-social-media-with-anonphisher\" class=\"wp-block-heading\">Anonphisher: How to hack social media with Anonphisher <\/h2>\n\n\n\n<p>First, open your browser and search (<strong> anonphisher Github<\/strong> ), then go on the first website which is from Github. You can also go on this website by clicking on this link \u2013 ( <a href=\"https:\/\/github.com\/TermuxHackz\/anonphisher\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/TermuxHackz\/anonphisher<\/a> )\u2026<\/p>\n\n\n\n<p>Now open your terminal and go to the destination where you have to clone your tool. Then install it by typing ( <strong>git clone https:\/\/github.com\/TermuxHackz\/anonphisher.git <\/strong>)\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220206_200022-1024x133.png\" alt=\"How to hack social media with Anonphisher\" class=\"wp-image-1150\"\/><\/figure>\n\n\n\n<p>After that, come inside your tool\u2019s directory by typing this command ( <strong>cd anonphisher <\/strong>) than for viewing files and directories inside it type ( <strong>ls<\/strong> )\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220206_200348-1024x77.png\" alt=\"How to hack social media with Anonphisher\" class=\"wp-image-1151\"\/><\/figure>\n\n\n\n<p>Now you have to give executive permission to this tool by this command ( <strong>chmod +x *<\/strong> ). Now if you type  ( <strong>ls<\/strong> ) so you can see the color of all the files and directories became light green that means it is ready to use\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220206_200634-1024x76.png\" alt=\"\" class=\"wp-image-1152\"\/><\/figure>\n\n\n\n<p><strong>Installing Requirements :<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Type This Command ( <strong>bash setup<\/strong> ) Wait For 2-3 Minutes.<\/li>\n\n\n\n<li>Type This Command (<strong> bash install.sh <\/strong>) Wait For 1-2 Minutes.<\/li>\n\n\n\n<li>Type This Command ( <strong>unzip sites.zip<\/strong> ) Wait For 1-2 Seconds.<\/li>\n<\/ol>\n\n\n\n<p>Now we can use the tool by typing this command (<strong> .\/anonphisher.sh<\/strong> )&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220207_165419-1024x44.png\" alt=\"\" class=\"wp-image-1155\"\/><\/figure>\n\n\n\n<p><strong>Follow The Steps To Know How To Use This Tool :<\/strong><\/p>\n\n\n\n<p>1. Select which you want to hack like if you want to hack pubg account so type ( <strong>46<\/strong> )&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220207_165327-1024x459.png\" alt=\"\" class=\"wp-image-1156\"\/><\/figure>\n\n\n\n<p>2. Now you have to select the port forwarding option if you want to test this tool so select option  ( 1 ) but if you want to use this anywhere so select ngrok which is an option ( <strong>2<\/strong> )&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220207_171000-1024x118.png\" alt=\"\" class=\"wp-image-1157\"\/><\/figure>\n\n\n\n<p>3. After that it will start work but it will not give you ngrok direct link which means we have to generate ngrok link manually&#8230;<\/p>\n\n\n\n<p>4. So open another terminal and come inside the tool\u2019s directory then type this command ( <strong>.\/ngrok http 3333 <\/strong>). If it will show you an error so go to the ngrok website and sign up there with a new account then copy your new auth token and paste it into your terminal.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220207_171511-1024x188.png\" alt=\"\" class=\"wp-image-1159\"\/><\/figure>\n\n\n\n<p>Now if you type that ngrok command again then you will get a link. You know what you have to do next, so send that link to your target\u2026<\/p>\n\n\n\n<p>Read More related Content by clicking the Button below.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/reconcybersecurity.com\/blogs\/it-knowledge\/what-are-the-social-media-compliance-risks-and-cybersecurity-threats-recon-cyber-security-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-right\">\u2013 Dhruv Bansal<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"In this post, we will learn How to hack social media with Anonphisher. Basically, this tool contains 50+&hellip;\n","protected":false},"author":1,"featured_media":10854,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[56,57],"class_list":{"0":"post-1145","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-tools","8":"tag-phishing-tool","9":"tag-social-media-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=1145"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1145\/revisions"}],"predecessor-version":[{"id":11140,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/1145\/revisions\/11140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10854"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=1145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=1145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=1145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}