Search the Community

Showing results for tags 'mobile'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 29 results

  1. Tencent Reports $13.5B Net Income for 2019, Mobile Games Drive Revenue Growth PUBG Mobile Became The Highest Earning Mobile Game Worldwide in May 2020 PUBG Mobile was reportedly the top-grossing mobile game in terms of revenue in the month of May. According to a report by Sensor Tower, Tencent earned over $226 million (Rs 1.7 thousand crore approx) in user spending making it the highest-grossing game in the world for the particular month. This doesn’t come as a surprise considering the Covid-19 lockdowns across the world forcing people to stay indoors and spend more time on mobile gaming. Most of you would have uninstalled other Chinese apps from your phone but not PUBG why ? TikTok crosses 2 billion downloads; India accounts for over 30% TikTok ‘targeting ₹100 crore revenue in India’ by September 2020 Xiaomi, India's largest smartphone maker, sending browser data to China: Report Company tracking user data even on the private “incognito” mode, claim researchers ... MOST IMPORTANT AND EXPENSIVE THING IN THE WORLD CAN BE DATA , YOU LITERALLY HAVE NO IDEA WHAT THEY CAN DO WITH IT Chinese smartphone brands, including Oppo and Xiaomi, account for eight of every 10 smartphones sold in India. India smartphone market Share (Q1 2020): Xiaomi (China): 30% Vivo (China): 17% Oppo (China): 12% Realme (China): 14% And Ofcrs OnePlus Total 75% Of market share is with Chinese manufacturers Intelligence Agencies Flag 52 Chinese Mobile Apps Over Security Risk Of Data Theft All of the information is collected from google , i just combined all the information from internet ... We dont claim it we are just informing you ... If you are admin of any channels , groups you should post this .. * It is you people who are making them earn " Billions " every year .. before blaming the government , army , others , blame yourself .. its you who is helping them earn * I guess Its time for you to stand up for your country .. i dont have to tell you what you have to do , you should know by now...
  2. itsMe

    Runtime Mobile Security v1.4

    Runtime Mobile Security v1.4 - manipulate Android Java Classes and Methods at Runtime Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts, and much other useful stuff. General Info Runtime Mobile Security (RMS) is currently supporting Android devices only. It has been tested on MacOS and with the following devices: AVD emulator Genymotion emulator Amazon Fire Stick 4K It should also work well on Windows and Linux but some minor adjustments may be needed. Changelog v1.4 All the most important features of RMS have been ported to iOS devices [hide][Hidden Content]]
  3. [Hidden Content]
  4. With PlayTube users can view & Interact with lasted videos and like and comment and more, now using the application is easier, and more fun! PlayTube is easy, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  5. dEEpEst

    Premium Mobile Antivirus

    Premium Mobile Antivirus Best Antivirus app for your Mobile if other app not work properly in your Mobile then try this one. [Hidden Content]
  6. Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS/Windows) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android, iOS and Windows Mobile Applications and supports both binaries (APK, IPA & APPX ) and zipped source code. MobSF can also perform Web API Security testing with it’s API Fuzzer that can do Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session and API Rate Limiting. Changelog v3.0 Features or Enhancements OWASP Mobile Top 10 2016 is supported Major UI Update for MobSF Major Schema changes to rest API iOS URLs Scheme iOS ATS Analysis improved New iOS Static Analysis Rules New iOS Static Analysis Rules New Android Manifest Analysis Rules Updated dependencies Optimized Windows Setup Updated Scoring mechanisms Improved Tracker detection Remove Global Proxy after dynamic analysis Android Permission database update Added Play with Docker support AppMonsta support Code QA Bug Fixes Fix Security issue #1197 (Directory Traversal) iOS Static Analyzer fixes Typo Fix Moved to oscrypto and distro Windows binscope bug fix Reduce False positives [HIDE][Hidden Content]]
  7. Mobile Application Penetration Testing Cheat Sheet The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics and checklist, which is mapped OWASP Mobile Risk Top 10 for conducting pentest. [Hidden Content]
  8. Udemy Learn Kali Linux and Hack Android Mobile devices Penetration Testing Setup Your Lab Finding Your Way Around Kali Important Tools Exploitation Hacking Android devices Social Engineering Hacking using Android devices Remote attacks On Android Download: [Hidden Content] Pass: [Hidden Content]
  9. With PlayTube users can view & Interact with lasted videos and like and comment and more, now using the application is easier, and more fun! PlayTube is easy, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  10. [Hidden Content]
  11. Mobile Security Framework (MobSF) Version: v2.0 beta Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing. Screenshots Static Analysis - Android APK Static Analysis - iOS IPA Dynamic Analysis - Android APK Web API Viewer Download: [HIDE][Hidden Content]]
  12. dEEpEst

    Mobile numbers in bulk

    [Hidden Content]
  13. BUILD PROFESSIONAL APPS BRIDGING THE GAP BETWEEN BUSINESS AND IT WITH A CODE ABSTRACTION RULE YOU WON'T NEED HELP OF AN EXPERT DEVELOPER. ONE LICENSE INFINITE APPS YOUR IDEA. YOUR APP DEPLOYED FOR SEVERAL DEVICES. NO ROYALTIES. ONE PROJECT, MULTI-PLATFORM DEPLOY FOR DIFFERENT OS AND DIFFERENT DEVICES, SHARING COMPATIBILITY. WE HAVE BEAUTIFUL ICON SETS AND THEMES YOU CAN USE IT TO START YOUR APP INTERFACE. [Hidden Content] [HIDE][Hidden Content]]
  14. [Hidden Content]
  15. Unknown_hacker

    Mobile computing

    Sir anyone please explain Mobile computing
  16. Large Amount Of European ISP’s Mobile Traffic Rerouted Through China Telecom [Hidden Content]
  17. Cryptors, a cyber security company, invented a mobile app called HACKUNA (Anti-Hack) that can block and detect these WiFi hackers. The exciting part here is, you can also track the hackers within the area. It will give you all the details you need to find the hacker within the area or to report it to the authority. We are now given the power to fight back against the WiFi hackers. Do you often connect to Public Free WiFi? Study says that a hacker can hack your online accounts within at least 60 seconds, just because you connect to Public Free WiFi... Experts says that the best thing to do to secure yourself from this, is to ditch the use of public Free WiFi. How annoying right? But not anymore! Proof that this works [Hidden Content]
  18. How to use Edit Cookies Chrome Extensions in Android Mobile If you want to run cookies of Netflix, amazon prime, ahref etc paid premiums account in your android mobile Here is a way for you. Many people do not know this that why I posting this simple way to do That [Hidden Content]
  19. [HIDE][Hidden Content]] introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. The project's name quite literally explains the approach as well, whereby runtime specific objects are injected into a running process and executed using Frida. Note: This is not some form of jailbreak / root bypass. By using objection, you are still limited by all of the restrictions imposed by the applicable sandbox you are facing. features Supporting both iOS and Android and having new features and improvements added regularly as the tool is used in real world scenarios, the following is a short list of only a few key features: For all supported platforms, objection allows you to: Patch iOS and Android applications, embedding a Frida gadget that can be used with objection or just Frida itself. Interact with the filesystem, listing entries as well as upload & download files where permitted. Perform various memory related tasks, such as listing loaded modules and their respective exports. Attempt to bypass and simulate jailbroken or rooted environments. Discover loaded classes and list their respective methods. Perform common SSL pinning bypasses. Dynamically dump arguments from methods called as you use the target application. Interact with SQLite databases inline without the need to download the targeted database and use an external tool. Execute custom Frida scripts. iOS specific features in objection include the ability to: Dump the iOS keychain, and export it to a file. Dump data from common storage such as NSUserDefaults and the shared NSHTTPCookieStorage. Dump various formats of information in human readable forms. Bypass certain forms of TouchID restrictions. Watch for method executions by targeting all methods in a class, or just a single method. Monitor the iOS pasteboard. Dump encoded .plist files in a human readable format without relying on external parsers. Android specific features in objection include the ability to: List the applications Activities, Services and Broadcast receivers. Start arbitrary Activities available in the target application. Watch a class method, reporting execution as it happens. screenshots The following screenshots show the main objection repl, connected to a test application on both an iPad running iOS 10.2.1, and Samsung Galaxy S5 running Android 6. A file system listing of the iOS applications main bundle A file system listing of the Android applications bundle iOS Keychain dumped for the current application, and later written to a file called keychain.json Inline SQLite query tool SSL Pinning bypass running for an iOS application SSL Pinning bypass running for an Android application sample usage A sample session, where objection version 0.1 is used to explore the applications environment. Newer versions have the REPL prompt set to the current applications name, however usage has remained the same:
  20. A project by Offensive Security The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs. [HIDE][Hidden Content]]
  21. Everus.org Mobile Wallet version 1.0.9 suffers from an information disclosure vulnerability. View the full article
  22. yoyohoneysinger

    Mobile Phone Call and Towers Tracking java

    Guide :- [Hidden Content] Github :- [Hidden Content]