AdvPhishing : This Is Advance Phishing Tool! OTP PHISHING

AdvPhishing is a advance phishing tool with OTP phishing Bypass.

SPECIAL OTP BYPASS VIDEO WORKED

Social Media HackLink
Installation Termuxhttps://www.youtube.com/watch?v=LO3hX1lLBjI
Whatsapp OTPhttps://www.youtube.com/watch?v=pyB63ym3QYs
Google OTPhttps://www.youtube.com/watch?v=MhSb4My1lZo
Paytm OTPhttps://www.youtube.com/watch?v=3TB_sISTw9U
Instagram OTPhttps://www.youtube.com/watch?v=VmkV1rrw2-w
Phone Pay OTPhttps://www.youtube.com/watch?v=ZgaoLubKBBo
Telegram OTPhttps://www.youtube.com/watch?v=BhGyGkIDhO0

TECHNIQUE

When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him.

TUTORIAL [ KALI ]

INSTALLATION [ TERMUX APP –ANDROID ]

INSTALLATION [ KALI ]

AVAILABLE TUNNELLING OPTIONS

  1. LOCALHOST
  2. NGROK (https://ngrok.com/)

TESTED ON FOLLOWING:-

  • Kali Linux – 2020.1a (version)
  • Parrot OS – Rolling Edition (version)
  • Ubuntu – 18.04 (version)
  • Arch Linux
  • Termux App

PREREQUISITES

  • sudo – [ MUST ]
  • php
  • apache2
  • ngrok Token

LANGUAGE

  • Bash Script

Upcoming Contribution

Royal Hackers

SCREENSHOT

DISCLAIMER

TO BE USED FOR EDUCATIONAL PURPOSES ONLY. The use of the Adv-Phishing is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

2 days ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

2 days ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

4 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago