Fake SMS : Skip Phone Verification By Using A Proxy

Fake SMS is a simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.

Note-1: This is just an experimental tool, do not use this in any banking transactions. Unethical use of this tool is strictly not encouraged.”

Note-2: The tool uses upmasked, A Eurpoean service provider, data will be stored on their servers, make sure you agree to EU Data governance laws and GDPR. I recommend you not to use this for any personal transaction which reveals your identity.

Features

  • Written in Go-1.15 (with modules support enabled)
  • Provides an interactive CLI, which is easier to use.
  • Provides a local file based DB to save and manage a list of fake phone numbers to help you remember and reuse.
  • Unofficial client of upmasked

Requirements

  • Go programming language – 1.15+

To build:

The build process is simple, it is just like building any other Go module. Follow the steps below:

export GOBIN=$PWD/bin
go install

This will build the binary and place it in bin/. You can also consider using the pre-built binary which is available under bin/

Steps to use:

  • Register a number in local DB: You can register a number by selecting one of the available numbers as shown below.
  • Get the messages from any registered number: You can select a number which was saved in step-1 and view its messages as a list. The tool will also save the dump as json in the format ${PWD}/selected-phone-number.json. As shown below:
  • Optionally, you can choose to delete the rembered numbers or list them.

Acknowledgements

The similar tool is also available in pure shell script. Check this out.

Contributing

The tool is very simple and I don’t think there is any major feature missing. But I would welcome any kind of suggestion, enhancements or a bug-fix from the community. Please open an issue to discuss or directly make a PR!!

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

2 days ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

2 days ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

4 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago