Search the Community

Showing results for tags 'mobile'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 33 results

  1. Ghidra is a free and open-source Software for Reverse Engineering of executable program(Binary) including Mobile Apps. Ghidra supports installation on multiple OS platforms inc. Windows, Linux and MacOS. [hide][Hidden Content]]
  2. What you'll learn Learn the process to hack and secure your own mobile devices before hackers do Requirements PC and Internet Connection Kali Linux Installed (Either in Virtual Box OR on Physical Machine) Description Do you want to learn How to Hack and Secure your mobile device (Android + iOS)? This course covers tools and techniques to hack a mobile device in order to teach you how to protect your mobile devices from hackers. It's a quickly learn course which focuses on hacking and security techniques for your mobile devices. What you will learn? - Android Structure - Various facts about android which you probably don't know before - Tools and Techniques to hack Android devices - Hack any Android Phone in 30 seconds - How to Jailbreak iOS Apps - How to Dis-assemble iOS [Hacking iOS] Who this course is for: Anyone who want to learn about hacking and security for mobile devices [Hidden Content] [hide][Hidden Content]]
  3. If you are a lover of the entertainment industry! If you want to increase your Business Scale & If you want to earn good capital by sitting on a comfortable chair in an air-conditioned room. There is nothing better than our product called “NEXT HOUR”. [Hidden Content] [hide][Hidden Content]]
  4. What you'll learn Android Malware Reverse Engineering How to Create a Ransomware Decryption Tool Mobile Security Static Analysis Dynamic Analysis Android App development fundamentals Requirements Basic IT knowledge Description This is an introductory course suitable for cyber security newcomers as well as cyber security professionals who would like to dive into the world of mobile security. In recent years, Android has established itself as a leader in the mobile OS market. For this reason, it is a common target of abuse among cyber-criminals. This course will provide students with the ability to set up an analysis environment, allowing them to analyse suspicious Android apps and determine whether or not they are malicious. The syllabus assumes that the student has little or no knowledge of Android security. It therefore provides the fundamentals not only on Android security, but on Android applications in general. The course will take students through the process of developing a basic Android application, which will provide insight into the inner workings of an Android APK. Upon completion, students will have their own analysis environment along with the knowledge required to analyse suspicious APKs. Course outline: -Course Requirements -Intro to Android -Course/Lab Setup -Developing a Basic Android App -Analyzing Android Apps -Case Study: Analyzing an actual ransomware and developing a decryption tool Who this course is for: Students interested in Cyber Security and Android Reverse Engineering [Hidden Content] [hide][Hidden Content]]
  5. Tencent Reports $13.5B Net Income for 2019, Mobile Games Drive Revenue Growth PUBG Mobile Became The Highest Earning Mobile Game Worldwide in May 2020 PUBG Mobile was reportedly the top-grossing mobile game in terms of revenue in the month of May. According to a report by Sensor Tower, Tencent earned over $226 million (Rs 1.7 thousand crore approx) in user spending making it the highest-grossing game in the world for the particular month. This doesn’t come as a surprise considering the Covid-19 lockdowns across the world forcing people to stay indoors and spend more time on mobile gaming. Most of you would have uninstalled other Chinese apps from your phone but not PUBG why ? TikTok crosses 2 billion downloads; India accounts for over 30% TikTok ‘targeting ₹100 crore revenue in India’ by September 2020 Xiaomi, India's largest smartphone maker, sending browser data to China: Report Company tracking user data even on the private “incognito” mode, claim researchers ... MOST IMPORTANT AND EXPENSIVE THING IN THE WORLD CAN BE DATA , YOU LITERALLY HAVE NO IDEA WHAT THEY CAN DO WITH IT Chinese smartphone brands, including Oppo and Xiaomi, account for eight of every 10 smartphones sold in India. India smartphone market Share (Q1 2020): Xiaomi (China): 30% Vivo (China): 17% Oppo (China): 12% Realme (China): 14% And Ofcrs OnePlus Total 75% Of market share is with Chinese manufacturers Intelligence Agencies Flag 52 Chinese Mobile Apps Over Security Risk Of Data Theft All of the information is collected from google , i just combined all the information from internet ... We dont claim it we are just informing you ... If you are admin of any channels , groups you should post this .. * It is you people who are making them earn " Billions " every year .. before blaming the government , army , others , blame yourself .. its you who is helping them earn * I guess Its time for you to stand up for your country .. i dont have to tell you what you have to do , you should know by now...
  6. itsMe

    Runtime Mobile Security v1.4

    Runtime Mobile Security v1.4 - manipulate Android Java Classes and Methods at Runtime Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts, and much other useful stuff. General Info Runtime Mobile Security (RMS) is currently supporting Android devices only. It has been tested on MacOS and with the following devices: AVD emulator Genymotion emulator Amazon Fire Stick 4K It should also work well on Windows and Linux but some minor adjustments may be needed. Changelog v1.4 All the most important features of RMS have been ported to iOS devices [hide][Hidden Content]]
  7. [Hidden Content]
  8. With PlayTube users can view & Interact with lasted videos and like and comment and more, now using the application is easier, and more fun! PlayTube is easy, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  9. dEEpEst

    Premium Mobile Antivirus

    Premium Mobile Antivirus Best Antivirus app for your Mobile if other app not work properly in your Mobile then try this one. [Hidden Content]
  10. Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS/Windows) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android, iOS and Windows Mobile Applications and supports both binaries (APK, IPA & APPX ) and zipped source code. MobSF can also perform Web API Security testing with it’s API Fuzzer that can do Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session and API Rate Limiting. Changelog v3.0 Features or Enhancements OWASP Mobile Top 10 2016 is supported Major UI Update for MobSF Major Schema changes to rest API iOS URLs Scheme iOS ATS Analysis improved New iOS Static Analysis Rules New iOS Static Analysis Rules New Android Manifest Analysis Rules Updated dependencies Optimized Windows Setup Updated Scoring mechanisms Improved Tracker detection Remove Global Proxy after dynamic analysis Android Permission database update Added Play with Docker support AppMonsta support Code QA Bug Fixes Fix Security issue #1197 (Directory Traversal) iOS Static Analyzer fixes Typo Fix Moved to oscrypto and distro Windows binscope bug fix Reduce False positives [HIDE][Hidden Content]]
  11. Mobile Application Penetration Testing Cheat Sheet The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics and checklist, which is mapped OWASP Mobile Risk Top 10 for conducting pentest. [Hidden Content]
  12. Udemy Learn Kali Linux and Hack Android Mobile devices Penetration Testing Setup Your Lab Finding Your Way Around Kali Important Tools Exploitation Hacking Android devices Social Engineering Hacking using Android devices Remote attacks On Android Download: [Hidden Content] Pass: [Hidden Content]
  13. With PlayTube users can view & Interact with lasted videos and like and comment and more, now using the application is easier, and more fun! PlayTube is easy, secured, and it will be regularly updated. Demo: [Hidden Content] [HIDE][Hidden Content]]
  14. [Hidden Content]
  15. Mobile Security Framework (MobSF) Version: v2.0 beta Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing. Screenshots Static Analysis - Android APK Static Analysis - iOS IPA Dynamic Analysis - Android APK Web API Viewer Download: [HIDE][Hidden Content]]
  16. dEEpEst

    Mobile numbers in bulk

    [Hidden Content]
  18. [Hidden Content]
  19. Unknown_hacker

    Mobile computing

    Sir anyone please explain Mobile computing
  20. Large Amount Of European ISP’s Mobile Traffic Rerouted Through China Telecom [Hidden Content]
  21. Cryptors, a cyber security company, invented a mobile app called HACKUNA (Anti-Hack) that can block and detect these WiFi hackers. The exciting part here is, you can also track the hackers within the area. It will give you all the details you need to find the hacker within the area or to report it to the authority. We are now given the power to fight back against the WiFi hackers. Do you often connect to Public Free WiFi? Study says that a hacker can hack your online accounts within at least 60 seconds, just because you connect to Public Free WiFi... Experts says that the best thing to do to secure yourself from this, is to ditch the use of public Free WiFi. How annoying right? But not anymore! Proof that this works [Hidden Content]
  22. How to use Edit Cookies Chrome Extensions in Android Mobile If you want to run cookies of Netflix, amazon prime, ahref etc paid premiums account in your android mobile Here is a way for you. Many people do not know this that why I posting this simple way to do That [Hidden Content]
  23. [HIDE][Hidden Content]] introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. The project's name quite literally explains the approach as well, whereby runtime specific objects are injected into a running process and executed using Frida. Note: This is not some form of jailbreak / root bypass. By using objection, you are still limited by all of the restrictions imposed by the applicable sandbox you are facing. features Supporting both iOS and Android and having new features and improvements added regularly as the tool is used in real world scenarios, the following is a short list of only a few key features: For all supported platforms, objection allows you to: Patch iOS and Android applications, embedding a Frida gadget that can be used with objection or just Frida itself. Interact with the filesystem, listing entries as well as upload & download files where permitted. Perform various memory related tasks, such as listing loaded modules and their respective exports. Attempt to bypass and simulate jailbroken or rooted environments. Discover loaded classes and list their respective methods. Perform common SSL pinning bypasses. Dynamically dump arguments from methods called as you use the target application. Interact with SQLite databases inline without the need to download the targeted database and use an external tool. Execute custom Frida scripts. iOS specific features in objection include the ability to: Dump the iOS keychain, and export it to a file. Dump data from common storage such as NSUserDefaults and the shared NSHTTPCookieStorage. Dump various formats of information in human readable forms. Bypass certain forms of TouchID restrictions. Watch for method executions by targeting all methods in a class, or just a single method. Monitor the iOS pasteboard. Dump encoded .plist files in a human readable format without relying on external parsers. Android specific features in objection include the ability to: List the applications Activities, Services and Broadcast receivers. Start arbitrary Activities available in the target application. Watch a class method, reporting execution as it happens. screenshots The following screenshots show the main objection repl, connected to a test application on both an iPad running iOS 10.2.1, and Samsung Galaxy S5 running Android 6. A file system listing of the iOS applications main bundle A file system listing of the Android applications bundle iOS Keychain dumped for the current application, and later written to a file called keychain.json Inline SQLite query tool SSL Pinning bypass running for an iOS application SSL Pinning bypass running for an Android application sample usage A sample session, where objection version 0.1 is used to explore the applications environment. Newer versions have the REPL prompt set to the current applications name, however usage has remained the same: