Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      dEEpEst

      SpyNote V5 (Andorid RAT)

      Recommended Posts

      Staff
      hace 2 horas, tornado32 dijo:

      It's no longer relevant, detect play protect on all version android! need obfuscation

      @tornado32 

      Well, you already know what you have to do. Encrypt the file.

      Share this post


      Link to post
      Share on other sites
      Staff
      On 31/8/2018 at 22:23, tornado32 dijo:

      need obfuscation.. you have? pls help

      @tornado32 look here >>> https://level23hacktools.com/hackers/forum/78-crypters/

      Share this post


      Link to post
      Share on other sites

      Is it stabler than Droidjack 4.4? Anyone tried?

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A multifunctional Telegram based Android RAT without port forwarding.
          Features
              Read all the files of Internal Storage
              Delete files or folder from victim device
              Download Any Media to your Device from Victims Device
              Get system information of Victim Device
              Retrieve the List of Installed Applications
              Retrive SMS
              Retrive Call Logs
              Retrive Contacts
              Click photos from victim device front/main camera
              Send SMS
              Keylogger {not working in android 11 or higher version}
              Record Audio
              Pre Binded with [Instagram Webview]
              Runs In Background
                  Auto Starts on restarting the device
              No port forwarding needed
          Requirements
              Glitch Account
              ApkEasy Tool ( For PC ) or ApkTool Editor ( for Android)
          Disclaimer
          Devolper Provides no warranty with this software and will not be responsible for any direct or indirect damage caused due to the usage of this tool. Dogerat is built for both Educational and Internal use ONLY.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. An Obfuscation-Neglect Android Malware Scoring System
          Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.
          We have an order theory of criminal which explains stages of committing a crime. For example, the crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.
          According to the above principle, we developed our order theory of android malware. We develop five stages to see if malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. A certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of malware.
          Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.
          Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe
          Google’s Threat Analysis Group (TAG) has confirmed that Android users around the world are being targeted by the Alien spyware family, which is commercial spyware. Tracking shows that the malware family is an advanced malware family developed by Cytrox Technologies of the Republic of North Macedonia in the Balkans of Southeastern Europe. The company primarily sells it to certain national government agencies or groups backed by those government agencies for the purpose of hacking and spying on targeted Android users. In essence, this is no different from the Pegasus spyware launched by the Israeli commercial spyware company NSO, except that the Alien spyware is for Android.

          Hidden Content
          Give reaction to this post to see the hidden content. Analysis shows that the Alien spyware family mainly exploits zero-day vulnerabilities and certain known outdated flaws, and is mainly spread by email. For example, after the email of the target user is known, a phishing email is sent to induce the user to click on the link, and the Predator virus can be automatically loaded after clicking.
          The organization that launched the attack uses a short-link system. When a user clicks, the virus will be loaded for the first time, and then they will jump to the website mentioned in the phishing email to confuse the user. The three campaigns identified by Google’s threat analysis team belong to the Alien malware family, and there are currently dozens of Android users under attack. Obviously, this is also a targeted attack, and the attacker will only carry out targeted attacks after selecting the target. Google writes:

          Analysis revealed that the Alien malware family has features such as audio recording, hiding apps, stealing user data, and turning on microphones for monitoring. Zero-day vulnerabilities that have been discovered by Google will be fixed soon, but for most Android users, there is no way to update the system in time to fix it. In particular, many of the vulnerabilities exploited by the malware are outdated, meaning they have long been fixed by Google but the OEM has not sent an update to the user. This makes the security of the Android system very weak, because many outdated vulnerabilities have been published long ago, and virtually any attacker can exploit the vulnerabilities. Google reminded that users should not click on links in unknown emails, and users should double-check the sender to ensure that the email is safe before clicking on the link.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Coolmuster Android Assistant
          As the professional Android managing software, Coolmuster Android Assistant offers you a one-stop solution to manage Android data easily.
          * Back up and restore everything on Android device with 1 click.
          * Selectively export or import one or more files from/to Android device.
          * Add, transfer, delete and edit contacts on the computer.
          * Send, resend, forward, delete and copy text messages directly on your Computer.
          * Support to manage contacts, SMS, call logs, music, videos, photos, books, etc.
          Supported OS:
          Windows 11/10/8/7/Vista/XP
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A machine learning malware analysis framework for Android apps.
          DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious.
          Features and qualities of Droid Detective include:
              Analysing which of ~330 permissions are specified in the application's AndroidManifest.xml file.
              Analysing the number of standard and proprietary permissions in use in the application's AndroidManifest.xml file.
              Using a RandomForest machine learning classifier, trained off the above data, from ~14 malware families and ~100 Google Play Store applications.

          Hidden Content
          Give reaction to this post to see the hidden content.