Hack Instagram with Instagram Bruter-force tool by Alisan
Category: Ethical Hacking and Cyber Security & Approved by email@example.com On December-11-2020 16:01:57
Disclaimer and Note
VERY IMPORTANT !
This course is Entirely for EDUCATIONAL PURPOSE only and TO MAKE PEOPLE AWARE about the various ATTACKS and PREVENT YOURSELF and YOUR FAMILY from such ATTACKS.
Under no circumstances will the course Instructor i.e. Aashish Dwivedi / TechGyan-Today Team or Interstellar Association
will be held responsible or liable in any way for any claims, damages, losses, expenses, costs or liabilities whatsoever (including, without limitation, any direct or indirect damages for loss of profits, business interruption or loss of information) resulting or arising directly or indirectly from your use of or inability to use this website or any websites linked to it, or from your reliance on the information and material on this website, even if the Instructor has been advised of the possibility of such damages in advance.
You need to follow some steps , Lets begin...
1.) First, you need to generate a password list using different password generating tools. We recommend to use Cupp tool,if you are not aware about password list generation then Click here
2.) Now you have to follow all steps and have to use all commands over Kali-Linux/Termux terminal. Lets begin......
Copy following commands and paste in your terminal
git clone https://github.com/Pure-L0G1C/Instagram.git
3.) Now enter the downloaded tool folder:-
4.) To install the toolbar prerequisites, enter the following:-
pip3 install -r requirements.txt
5.) Once the installation is complete, run the original instagram.py file with the -h switch to display the help
python3 instagram.py -h
6.) To crack Instagram, enter the following command
python3 instagram.py username password-list.txt
7.) In the username field, enter the victim's username
In the password-list.txt field, enter the name and address of the list password file to the tool
8.)If you copy the list password tool in your folder, just enter its name
Finally, wait for the passwords to be checked and the result to be displayed
Note: The advantage of this tool is that it does not need a proxy list and is automatically downloaded from online sites.