Search the Community

Showing results for tags 'android'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 76 results

  1. VideoPlayer on Android versions 7 through 9 suffer from an ihevcd_parse_pps out-of-bounds write vulnerability. View the full article
  2. FireApp is a Real-Time complete chatting app with support for Video & Voice Calls along with Stories feature . you can share images, audio, video, contact, even sharing your location!. Demo: [Hidden Content] [HIDE][Hidden Content]]
  3. Android tiene un nuevo malware que se distribuye de manera silenciosa, infectando y sustituyendo apps que tienen como fin el robo de datos. El agente Smith es un nombre conocido para muchos que disfrutaron Matrix hace más de 20 años. Hoy toma relevancia ya que así se ha nombrado a un nuevo malware de Android que se comporta de manera similar a como lo hizo el personaje interpretado por Hugo Weaving. De acuerdo con la empresa de seguridad Check Point, Agent Smith ha infectado alrededor de 25 millones de dispositivos Android. El malware se disfraza como una aplicación relacionada con Google y reemplaza otras aplicaciones instaladas con versiones maliciosas que cuentan con código propio. Agent Smith sustituye aplicaciones como WhatsApp de manera silenciosa Los investigadores de Check Point indican que Agent Smith explota la vulnerabilidad de Android conocida como Janus, que permite inyectar malware a las aplicaciones del móvil saltándose un proceso de verificación que compara la firma anterior con la nueva, todo esto de manera silenciosa sin que el usuario pueda darse cuenta. Una de las características de este malware es que muestra anuncios fraudulentos que podrían derivar en un robo de datos del dueño del móvil, como información personal y bancaria. El hecho de atacar y sustituir las aplicaciones instaladas vuelve compleja la tarea de que el usuario pueda combatirlo por su cuenta, por lo que una de las formas de defenderse ante una posible infección es no instalar aplicaciones de fuentes que no sean confiables. Agent Smith ha afectado a más de 25 millones de usuarios, principalmente en India, donde contabiliza 15 millones de dispositivos. El malware se ha extendido a otros países como Pakistán y Bangladesh, aunque también se han reportado casos en Reino Unido y Estados Unidos. La presencia de Agent Smith no es nueva, de hecho se tiene registro desde principios de 2016 cuando apareció en 9Apps, uno de los canales de descarga de aplicaciones más populares de Asia. El malware se ha mantenido vigente durante todo ese tiempo, incluso infectando algunas aplicaciones de la Play Store. Fuente
  4. Works on Android Pie
  5. Version 6.4 FEATURES [Hide][Hidden Content]] Password: level23hacktools.com
  6. itsMe

    SUPER 0.5.0 - Android Analyzer

    super: Secure, Unified, Powerful and Extensible Rust Android Analyzer SUPER is a command-line application that can be used in Windows, MacOS X and Linux, that analyzes .apk files in search for vulnerabilities. It does this by decompressing APKs and applying a series of rules to detect those vulnerabilities. But, why create a new analyzer? Is it not enough with MobSF, Qark, Androbugs…? Well, we think it’s not enough. All of them have two main issues we wanted to fix: They are written in Java or Python and they are not easily extensible. They are not meant to be used by businesses directly working in Android analysis and don’t put that kind of functionality first. Our approach solves those issues in different ways: We first decided to use Rust as our programming language. The language developed openly by Mozilla Foundation gives us lots of utilities to work with regular expressions, files etc. and, most importantly, it enables us to create a secure software that does not depend in JVM or JIT compilers. With Rust, stack overflows, segmentation faults etc. are directly not possible, which makes sense in a security-centered application. And it also gives us enough power to do efficient analysis, giving us the option to automate it in high volume. This is given by Rust zero-cost abstractions, that gives us an efficiency only comparable to C/C++. And secondly, we decided to make the software 100% extensible: All rules are centered in a rules.json file, and each company or tester could create its own rules to analyze what they need. It’s also modular so that new developments can easily add new functionality. Finally, a templating system for results reports gives users the ability to personalize the report. It also gives great code review tools, directly in the HTML report, so that anyone can search through the generated code with syntax highlighting for even better vulnerability analysis. [HIDE][Hidden Content]]
  7. dEEpEst

    Anubis 2.5 Android Bot Banking

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  8. [Hidden Content]
  9. scrack

    Android bot xerxes

    The bot was written to order. The client has merged. What is able. SMS interception covertly, autopush banks and cardboard, manual launch of pushes, sending sms, launching injects, injecting work on all versions of android, injecting stores on the phone of the holder, sms jump, spam by contacts, bot autoscript, traffic encryption and fucking still describe everything I do not want. The bot does not work on ru.Krypt api to describe in the admin did not become lazy if something later lay out the instructions. The bot works on all versions of android, tested on the last 8-9. The installation is simple, there is a manual, we upload it to the hosting, we prescribe the database in the config file, we fill it Baza.Nuzhen crypts with a crypt% 70 bots live for weeks. Cardboard on normal traffic% 10-12 approximately, traffic from google. Palit until 1 av. I hope to save nk $ Building the bot: Build apk, install apktool We unpack the apk with the apktool d -f app.apk command. We recursively change the admin address ( http: // localhost / ), for Windows fans, set Notepad ++ and choose the function to replace in all files. If you need to change the icon, go to the apk / app / res / mipmap-xxxhdpi folder and change the ic_launcher.png icon to the desired one, leave the name as it is. The name of the application can be changed in the manifest. We are building the build apktool b app -o new_app.apk. We sign the application with the commands echo y | keytool -genkey -dname "CN = Unknown, O = Unknown, C = Unknown" -keystore mykeystore.keystore -keysize 1024 -alias b5a -validity 14000-keypass 123456 -storepass 123456 -sigalg SHA1withDSA jarsigner -verbose -sigalg SHA1withDSA -digestalg SHA1 -keystore mykeystore.keystore new_app.apk b5a -keypass 123456 -storepass 123456 That's all! password
  10. (Decompiler, Editor, Debugger & More) Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX Decompiler, GUI Procyon Java Decompiler, GUI Krakatau, GUI CFR Java Decompiler, GUI FernFlower Java Decompiler, GUI DEX2Jar, GUI Jar2DEX, GUI Jar-Jar, Hex Viewer, Code Searcher, Debugger and more. It’s written completely in Java, and it’s open source. It’s currently being maintained and developed by Konloch. There is also a plugin system that will allow you to interact with the loaded classfiles, for example, you can write a String deobfuscator, a malicious code searcher, or something else you can think of. You can either use one of the pre-written plugins or write your own. It supports groovy scripting. Once a plugin is activated, it will execute the plugin with a ClassNode ArrayList of every single class loaded in BCV, this allows the user to handle it completely using ASM. Code from various projects has been used, including but not limited to: J-RET by WaterWolf JHexPane by Sam Koivu RSynaxPane by Robert Futrell Commons IO by Apache ASM by OW2 FernFlower by Stiver Procyon by Mstrobel CFR by Lee Benfield CFIDE by Bibl Smali by JesusFreke Dex2Jar by pxb1..? Krakatau by Storyyeller JD GUI/JD Core by The Java-Decompiler Team Enjarify by Storyyeller Key Features: Krakatau Integration for Bytecode assembly/disassembly. Smali/BakSmali Integration – You can now edit class files/dex files via smali! APK/DEX Support – Using Dex2Jar and Jar2Dex it’s able to load and save APKs with ease! Java Decompiler – It utilizes FernFlower, Procyon, and CFR for decompilation. Bytecode Decompiler – A modified version of CFIDE’s. Hex Viewer – Powered by JHexPane. Each Decompiler/Editor/Viewer is toggleable, you can also select what will display on each pane. Fully Featured Search System – Search through strings, functions, variables and more! A Plugin System With Built-In Plugins – (Show All Strings, Malicious Code Scanner, String Decrypters, etc) Fully Featured Scripting System That Supports Groovy. EZ-Inject – Graphically insert hooks and debugging code, invoke main and start the program. Recent Files & Recent Plugins. And more! Give it a try for yourself! Changelog v2.9.22 Notable Changes The ASM Classwriter will now automatically update all pre-Java 1 classes to have the proper standard class format. It will also update the classes minor version from <= 2, to 3. (This should fix all of the decompilers inside of BCV) [HIDE][Hidden Content]]
  11. Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what the specific type of obfuscation is used. Before and After The code on the left is a decompilation of an obfuscated app, and the code on the right has been deobfuscated. [HIDE][Hidden Content]]
  12. [Hidden Content]
  13. Spy MAX Remote control system in Android systems with simple graphical interfaces and easy to use requirements Java NET framework 4.5 The program is compatible with the following Microsoft Windows application windows 10 windows 8 windows 7 windows Pach is compatible with modern Android systems 9.0 - eBay 8.0 - Orio / oreo 7.0 - Noga / nougat 6.0 - Marshmallow One of the most important features Multi-port Size 18.5 KB / Clean Encode with insertion point Run more than one patch on one phone Secure data sent and received over the network Ability to control the program settings to suit your needs and your own taste And other features .. Explanation Code: +----------------------+ | [1] Files Manager | | [2] SMS Manager | | [3] Calls Manager | | [4] Contacts Manager | | [5] Location Manager | > +--+[6] GPS | | | | | +--+[7] GSM | [8] Account Manager | | [9] Camera Manager | > +--+[10] Front | | | | | +--+[11] Back | [12] Shell Terminal | | [13] informations | | [14] Applications | | [15] Microphone | | [16] Server | > +--+[17] EditSocket | | | +----------------------+ +--+[18] Restart | +--+[19] Rename | +--+[20] Close [1] files [2] Messages [3] Calling [4] Contact [5] Location [6] Global Positioning System (GPS) [7] Global System for Mobile communications (GSM) [8] Calculations [9] What is your favorite camera? [10] Front camera [11] Rear camera [12] Execution of linux commands [13] Information [14] Installed applications [15] The microphone [16] server [17] Editing or modifying the communication [18] Restart the connection [19] Renaming contact [20] Close the connection after restarting the phone Code: +---------------+ | | | [1] Build | | | | [2] Settings | | | | [3] About | | | | [4] Exit | | | +---------------+ [1] Window Builder Patch [2] Settings [3] About the program 4 Code: +-----------------------------------------+ | [1] connection | | + | | +-> [2] dynamic DNS/ip +--+ | | v | | +----------------------+ | | | | | +-> [3] port | | | [8] DNS/ip:port | | | | | | +-> [4] Add | | | | | | | | | +-> [5] DEL | | | | | | | | | +-> [6] up | | | | | | | +----------------------+ +-> [7] down | | | +-----------------------------------------+ [1] Communications [2] Your address is on LAN or WAN external domain [3] Port number Preferably choose a port between 1024 to 65535 [4] Add the title and entry in the list [5] Delete title and port from list [6] Upload contact information up to become a priority in communication [7] Contact information down [8] List of contacts Code: +----------------------------+ |[1] installation | | + | | +--> [2] name of victim | | | | | +--> [3] name patch | | | | | +--> [4] version | | | | | | +-----------+ | | | | | | | +--> | [5] hide | | | | | [6] icon | | | | | [7] doze | | | | | | | | | +-----------+ | | | | | +--> [8] sleep | | | | | +--> [9] futex | | | | | +--> [10] flavor | | | +----------------------------+ [1] Composition [2] Contact Name [3] The name of the patch is the name shown when installed on the phone [4] issue number [5] How to hide the patch after playback [6] Choosing the icon You can add custom icons to the res \ Icons \ Apps folder and the sizes must be 144 in 144 or 192 in 192 pixels [7] In case of non-activation will be restricted to doze system and applications and other artificial intelligence systems and control on activation You can add custom icons to the folder res \ Icons \ Notification The sizes must be 24 in 24 or 32 in 32 pixels [8] You have to set the time in milliseconds. Click on the box to see the timing, it will work under any circumstance doze or other. If you do not need a timer, you can set the value to 0. [9] Generating keys to secure communication and data synchronization Pass the key on the box and the keys will be generated automatically [10] to create different versions after the dot. You must put your own suffix in English only without letters, numbers or symbols Code: +------------------------------------+ | | | +---------------+ +--------+ | | | [1] browse | | [2] OK | | | +---------------+ +--------+ | | | +------------------------------------+ [1] You must install java and then select the bin folder from the operating environment of jre java applications Code: \Java\jre x.x.x\bin [2] Select the patch that is included with the program to configure your settings Code: +------------------------------------------+ | | | [1] socket +> [3] high | | + | | | +> [2] performance+> [4] normal | | | | | | +> [6] Encoding +> [5] low | | | + | | | | | | | +-------+> [7] Default | | | | | | | +> [8] UTF8 | | | | | | | +> [9] UTF32 | | | | | | | +> [10] ASCII | | | | | +> [11] Disconnected | | + | | | | | +----------+-----------+ | | v v | | [12] Close windows [13] Just tell me | | | +------------------------------------------+ [1] The Socket [2] Program performance with communications, processor and data traffic [3] If you have a high-quality device and have lots of connections, you can make the most of the program [4] Using normal mode will work on low and high mode (recommended) [5] If you have a low-specification device and have little communication you can use low mode [6] Character encoding [7] The default codec on your device [8] UTF8 [9] UTF32 [10] ASCII [11] Disconnect [12] Close all active client windows if connection is interrupted [13] You will be notified only when you disconnect and will not close any window Code: +-----------------------------------+ | | | [1] Alert | | + | | +> [2] Show Alert +> [3] Yes | | | | | | | +> [4] No | | | | | +> [5] Location | | + | | +------+------+ | | v v | | [6] Left [7] Right | | | | | +-----------------------------------+ [1] Alert [2] View alert or notification of new customer login or connection [3] Yes if you need to show the alarm [4] No need to show the alarm [5] Alert site on desktop screen [6] Left desktop screen [7] Right desktop screen Code: +---------------------------------------+ | | | [1] Camera Manager | | + +-> [3] Yes | | +> [2] Auto focus | | | | +-> [4] No | | | | | | | | +> [5] Effects +-> [7] Gray | | | + | | | | +-+-------> [8] Raw-01 | | | | | | | | v +-> [9] Raw-02 | | | [6] Normal | | | | | | | | | | | +> [10] Quality | | + | | +---+--> [11] Auto | | | | | v | | [12] high quality | | | +---------------------------------------+ [1] Camera settings [2] Auto focus [3] Autofocus activation (not recommended) [4] Auto focus is inactive [5] Effects [6] without any default effect [7] Gradient effect [8] Raw Impact 01 model click here [9] The raw effect 02 is similar to the impact of crude 01 and the difference coloration of the model model click here [10] Broadcast quality [11] Automatic depending on the speed of communication between the parties [12] Top quality (not recommended) Code: +---+ +---------------------------------------+ | | | | | | [1] Location Manager | | | | + | | | | | | | | | +---> [2] Style | | | | + | | | | | | | | | +--> [3] Silver | | | | | | | | | [4] Aubergine <--+ | | | | | | | | | +--> [5] Dark | | | | | | | | | [6] Standard <--+ | | | | | | | +---------------------------------------+ | +---+ [1] Site settings [2] Map format [3] Silver model click here [4] Eggplant Form Click Here [5] Dark model click here [6] Basic Form Click Here Code: +------------------------------------+ |[1] Saving data | | + + | | | | | | | +>[2] Auto save | | | + | | | +----------+-----------+ | | | | | | | | +-> [3] No [4] Yes <-+ | | | | | + | |[5] Colors | | + + | | | +---------+ | | | | | | + | | |[10] Font | | | + +-> [6] Foreground | | | | | | +-----+ +-> [7] Background | | | | | | +-> [11] Size +-> [8] Titles | | | | | | +-> [12] Style +-> [9] New Files | | | +------------------------------------+ [1] Save data [2] Autosave [3] No data saving will appear on the records. You can save them again [4] Yes to save data automatically Records and data will be saved in the client folder Use (Firefox - Google Chrome) to open the records [5] Color in the sample program click here [6] Color Foreground - one color includes text, buttons, icons, etc. [7] Background color - one color will be used in the program background [8] Color Titles [9] Color of new files shared or modified by user or software [10] Program line [11] font size [12] Style font - bold or regular Show client folder Two clicks on the contacts To show contact information, click on the first column Total frames per second = FPS (Frames Per Second) Size = one frame size 170.25kb = 15fps * 11.35KB total size per second The accuracy of the site was less than all the best. The correct location is almost 0 to 75.0 = Accuracy Speedometer in kilometers per hour The speed of the vehicle or any other vehicle is measured = km / h Go to Google Maps two clicks on the map Zoom the map with the mouse wheel or the keyboard up or down To the end of the explanation here was to cover the most important details in the program If you encounter problems with the program, write down the details of the bugs, and they will be fixed in the next version. [Hidden Content] Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  14. HI guys , I have been trying to access my phone through a malicious apk that i've created with msfvenom , but when i open it on the android victim phone it doesnt appear the meterpreter on the metasploit screen Does someone know what did i do wrong? Did the android antivirus detect the payload?
  15. Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and fin the vulnerabilities. Yaazhini includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a report. System Requirements Operating Systems Mac OSX(64bit), Windows(64bit & 32bit) RAM Minimum Usage 4GB of available memory. 16GB required for larger Android Apps Storage 10GB of available disk space Dependancy Software Java 1.8+ Advantages of Yaazhini Scan Android APK by just one click Scan Android Application REST API (emulator, device) Generate report Free to use Easy to use How to use Yaazhini Android Application APK Scanner [HIDE][Hidden Content]]
  16. dEEpEst

    Assassin Android RAT

    Assassin one of the best Android RAT beta 1.0.0 adapter android Lollipop-Pie commit issues to me Construction Features get Sms_List send Sms to destinationAddress get Calling_History get GPS get Contacts_List something that u can do in background call someone take a photo then send to server record audio then send to server record video then send to server of course the duration decided by yourself Basement/Environment Gradle JDK1.8 AndroidSdk node.js npm Usage Options: -V, --version output the version number -a,--assassin <assassin> select a command post to the clients if you choose the shadow you should input the cmd -t to choose a type between pic/audio/video [sms,contacts,call,gps,shadow] (default: "sms") -C,--Clients show every client info -d,--address <address> input a phone num who you want to send a msg -m,--msg <msg> you should write the msg content, if your command is sms -t,--type <type> select a type between pic/audio/video and you should input the -l to choose the camera lens [pic,audio,video] -c,--client <client> select a client to post the command -l,--lens <lens> which camera lens that you want to open [0,1] -h, --help output usage information Step.1 clone/download the project and start up the server 1. git clone git@github.com:honglvt/TalentRAT.git / or download the project yourself on the github 2. cd the project path such as: ~/AndroidProject/ProjectPath/Server/ 3. cd Server 4. npm install 5. npm start now you can see the terminal console "ASSASSIN" Step.2 build assasin.apk with shell at project folder befor build the apk confrim that you have prepare the env for building the app connect the android device to ur PC enable the develop mode on ur android device if you can not do step.2 and step.3 you can build the assassin.apk and install it to your device manually now let's start assembleApk at the first time when you download the project you should confirm your OS type mac or linux, and get your server IPAdress by "ifconfig/ipconfig" 0. chmod 777 ./assembleApk.sh chmod 777 ./installNewestApk.sh 1. execute the assemble shell "./assaembleApk.sh OS serverIP" serverIP type as 127.0.0.1:3000 OS type as mac or linux as follows: "./assembleApk.sh mac 127.0.0.1:3000" "./assembleApk.sh linux localHost:3000" 2. ./installNewestApk.sh if you are not able to connect the device to your PC, send the apk by email or xx and install it manually 3. look at your device, the apk has been installed into your device run it grant all of permissions and now you can see { a user connected info }at terminal you have opened at Step.1 Step.3 execute command,then you will get whaterver you want!!! cmd ./assassin.js -a sms -c 9910294050493 description select the command between [sms,contacts,call,gps,shadow] if you choose the shadow you should also use -t to choose a type between pic/audio/video args with -c can be gotten at server terminal {a user connected info} type the cmd into a new terminal at ~/project/Server and the result: { "command": "send_contacts_list", "IMEI": "99001249798100" } response is : [{name:ASX,phoneNum:2345 67}] exemples cmd -a description select the command between [sms,contacts,call,gps,shadow] if you choose the shadow you should also use -t to choose a type between pic/audio/video example ‘’./assassin.js -a sms‘’ ‘’ ./assassin.js -a shadow -t pic ‘’ result ERROR:you should input a type with -c to choose a client that you want to send cmd cmd -C description show every client info example ‘’./assassin.js -C ‘’ result {IMEI:9525238415950202,brand:Nokia,model:CAL-20,version:9.0} cmd -c description select a client with its IMEI to post the command example ‘’./assassin.js -a sms -c 9525238415950202 ‘’ result { command: 'send_sms_list', IMEI: '184859203' } Prompt keep node server alive when you send a command cmd with ./assassin.js will return a Json data you can do whatever with the response if you want to get a pic or video you should type the cmd as follow: ./assassin.js -a shadow -c 123456 -t pic -l 0 then you can find the pic has saved on the */project/Server/public/images/xxxx.jpeg' the same with other shadow the duration in recording video or audio decided by yourself Screen Shot server assembleApk installApk client connect to server executeCmd [Hidden Content]
  17. dEEpEst

    Android IMSI-Catcher Detector

    Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike. Find out more in our Wiki on GitHub. Index What it does Why use it Contributing Bug Tracker Warnings Research Support Contact Wiki FAQ What it does AIMSICD attempts to detect IMSI-Catchers through detection methods such as these: Check Tower Information Consistency Check LAC/Cell ID Consistency Check Neighboring Cell Info Prevent silent app installations Monitor Signal Strength Detect silent SMS Detect FemtoCells Make sure to see our app goals and development status as well as technical overview. Why use it The FBI or local police regularly deploys IMSI-Catchers hidden in vehicles at protests to obtain a record of everyone who attended with a cell phone (leave your phones at home by all means if you really have to attend). IMSI-Catchers also allow adversaries to intercept your conversations, text messages, and data. Police can use them to determine your location or to find out who is in a given geographic area at what time. Identity thieves can use freely available tools and even build their own rogue GSM BTS to monitor and manipulate communications from a parked car in your residential neighborhood - notably for stealing passwords or credit card data from people nearby who make purchases on their phones. The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. It also aims to make users safer by alerting on possible interception and tracking. Fight for your privacy! Warnings Please read our Disclaimer! This app does not: Provide secure phone calls Provide secure data transmission Provide app permission control Provide secure application sand-boxing Provide ROOT and remove bloatware Provide secure SMS Provide firewalls Provide full device encryption Prevent already installed rogue apps from full access and spying Solutions for the above may be found in our Recommendations. Bug Tracker Please follow our Bug Submission Guide. Support Although our app is fully Open Source, developing it is a lot of work and done by privacy enthusiasts during their free time. If you're a developer yourself, we welcome and credit your pull requests! To keep developers in a great mood and support development, please consider making a donation. It will be split into pieces and directly sent to developers who solved the backed Issue. [Hidden Content]
  18. Level23HackTool

    Android Payload Fud

    [Hidden Content]
  19. The Qualcomm Android kernel suffers from a use-after-free vulnerability via an incorrect set_page_dirty() in KGSL. View the full article
  20. dEEpEst

    Tor Browser for Android

    [Hidden Content]
  21. Level23HackTool

    Android Ransomware

    [Hidden Content]
  22. [Hidden Content]
  23. [HQ RELEASE] EARN $50 A MONTH l ANDROID AUTOPILOT MONEY MAKING METHOD [Hidden Content]