
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
ihackit
Advanced tools
Instagram Private Api, Device Customization, User-Agent Generator & Identifier Generator Library
ihackit is a powerful and flexible python library for automating instagram accounts with private api from apk pinning, generate device configuration and customizing user-agent strings to avoid suspicious login, built to provide full control over account management, media posts scraping, and etc.
i made this library for instagram hacking tools :) https://github.com/termuxhackers-id/instahack
| Library | Installation |
|---|---|
| Requests | pip install requests |
| Pycryptodomex | pip install pycryptodomex |
install with pip
pip install ihackit
install with clone repository
git clone https://github.com/iqbalmh18/ihackit
cd ihackit
pip install .
example usage of ihackit
from ihackit import Instagram
# set new instagram session
ig = Instagram(cookie='YOUR INSTAGRAM COOKIE')
# get account info
print(ig.account())
# get username info
print(ig.username_info('username')
# get location info from username
print(ig.location_info('username')
# get followers from target username
foll = ig.followers('username')
for user in foll:
print(user)
# get following from username
foll = ig.following('username')
for user in foll:
print(user)
# get mediapost from username
media = ig.mediapost('username')
for post in media:
print(post)
# get media info from media id or url
url = 'https://www.instagram.com/p/XXXX'
print(ig.media_info(url))
Check Available Device
from ihackit import DEVICE, DEVICE_LIST
print(DEVICE)
print(DEVICE_LIST)
Check Available Country
from ihackit import COUNTRY, COUNTRY_LIST
print(COUNTRY)
print(COUNTRY_LIST)
Device Customization
from ihackit import Device
device = Device(device_brand='Samsung', device_model='SM-A125F', device_country='ID')
info = device.info()
print(info)
User Agent Customization
from ihackit import Device, UserAgent
device = Device(device_brand='Samsung', device_model='SM-A125F', device_country='ID')
useragent = UserAgent(device)
print(useragent.dalvik())
print(useragent.threads())
print(useragent.facebook())
print(useragent.instagram())
example usage of ihackit for hackers
from ihackit import (
Device,
UserAgent,
Generator,
Instagram
)
cookies = 'YOUR INSTAGRAM COOKIE'
proxies = {'http': 'protocol:ip:port', 'https': 'protocol:ip:port'}
devices = Device('Samsung').info()
useragent = UserAgent(devices)
generator = Generator()
device_id = generator.device_id()
ig = Instagram(cookie=cookies, device=devices, device_id=device_id, proxies=proxies)
info = ig.account()
if info:
print(info)
print(ig.session.headers)
else:
print('cookie is not valid or have been expired')
example usage to generate identifier for hackers
from ihackit import Identifier
identify = Identifier(firstname='john', last_name='doe', domain=['gmail.com','yahoo.com'], result=10)
emails = identify.email()
for email in emails:
print(email)
usernames = identify.username()
for username in usernames:
print(username)
fullname = identify.fullname()
print(fullname)
wordlist = identify.wordlist()
print(wordlist)
FAQs
Instagram Automation, Device Customization & User-Agent Generator Library
We found that ihackit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.