Movatterモバイル変換


[0]ホーム

URL:


Hackers HubHackers Hub
Learn Now

Archives

Categories

Hackers HubHackers Hub
Hackers HubHackers Hub

What are You Looking For?

onMarch 21, 2020

Grabcam | Hack victims camera and see realtime image

Grabcam
2 min read

About grabcam

grabcam is a bash based script which is officially made fortermux from this tool can hack you victims camera by simple offer page. This tool works on both rooted Android device and Non-rooted Android device.

Well it have hurt the privacy of victim so here is a disclaimer. Use it only for fun and educational purpose. Don’t use to harm or take revenge.

Now I will give you instructions to install this tool.

Go to website

https://github.com/Abhi6722/grabcam

or simply copy this link from here

Now openTermux and write the following command one by one.

$   apt update && apt install$   pkg install python python2 vim figlet curl$   pkg install php$   pip2 install lolcat$   pkg install git$   git clone https://github.com/noob-hackers/grabcam$   ls$   cd grabcam$   ls$   bash grabcam.sh

Remember Termux is case sensitive. So be very careful while writing thecommands.

Now you will see this image which is on your right side if you have successfully completed all the previous steps.

But if not it might be some syntax error so just repeat the steps form starting and you will reach here.

And if you get any problem just contact me.

Give me screenshot of the terminal and i will surely help you out.

Not after this lets just try to create a link and send it to our victim.

We will do it by ngrok remember we install in our previous lecture.

Write 2 and press enter

You will see it will start installating automatically. Just keep in mind to turn on hotspot because there is a bug in ngork and will not generate link until to open hotspot.

Now copy the direct link which is generated and send it to victim.

Remember don’t turn close termux from recent app and don’t turn your hotspot off.

Now as soon as victim open the link it will ask permission for him to acess his camera and it will start sending pictures of your victim to you.

And victim will see fake jio recharge script.

Now open termux and you will see [+] cam file recieved! in your terminal. It will send you pictures until you turn it off. To do so write

$ ctrl+c

Now in order to see the files received write

$ ls

You will see the files appear there.
Now we have to move these files to our
storage. To do so write the move command
as shown below.

$ mv filename.png /sdcard

You will see files are not there it means they are moved in sdcard.
Now open your file manager and you will see your victims picture there.
So enjoy and if you like our post Don’t forget to share with your friends and family and let us know in the comments section.

Last words
So folks a debt of gratitude is in order for visiting our blog. I trust you discover our article “termux metasploit pack mistake arrangement” supportive for you kindly offer and remark your idea about this article and continue visiting to get hacking and gaming and parcel more devices and news for nothing. much obliged to you!

Share
Previous Article

Ngrok | Host unlimited Phishing pages without any issue

Next Article

ShellPhish | Best Phishing tool for Instagram, Facebook, Twitter, Netflix and many more

Recent Comments

No comments to show.

About

Hackers Hub Avatar

Hackers Hub

Learn Ethical Hacking From Scratch

Hackers Hub empowers cybersecurity learners with practical, ethical hacking guides and tool walkthroughs. Learn, practice, and grow your skills—responsibly.

India

Our Journey

Growing with your love and support

2019 — Now

Launched Books and courses

2018 — 2019

Start of Something Great

2017 — 2018

Technologies

Termux

Termux is an Android terminal application with Linux.

Notion

Organize, track, and collaborate on projects easily.

Creating

Best AI Tools for Learning

Master ethical hacking with AI-powered training platforms, automated vulnerability scanners, and intelligent penetration testing tools.

Latest Tech Gadgets

Essential cybersecurity hardware: USB rubber duckies, WiFi pineapples, hardware keyloggers, and portable penetration testing devices.

Hacking Trends for 2024

AI-powered attacks, cloud security exploits, IoT vulnerabilities, and advanced persistent threats dominating the cybersecurity landscape.

Read Next

onMarch 21, 2020

ShellPhish | Best Phishing tool for Instagram, Facebook, Twitter, Netflix and many more

About ShellPhish Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as…
7 Min Read
Kali Linux | Why it is known as hackers paradise
onMarch 28, 2020

Kali Linux | Why it is known as hackers paradise

What is Kali Linux Hi Guys on the off chance that you are happy to comprehend what is kali linux however in simple strategy and you are…
onApril 12, 2020

XploitSPY | Hack android device

How to use xploitspy in termux Hello, guy’s I am back with another amazing post so in this post let’s learn how to use xploitspy RAT to hack…

Subscribe to our Newsletter

Subscribe to our email newsletter to get the latest posts delivered right to your email.
Pure inspiration, zero spam ✨

[8]ページ先頭

©2009-2025 Movatter.jp