-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. A multifunctional Telegram based Android RAT without port forwarding.
Features
Read all the files of Internal Storage
Delete files or folder from victim device
Download Any Media to your Device from Victims Device
Get system information of Victim Device
Retrieve the List of Installed Applications
Retrive SMS
Retrive Call Logs
Retrive Contacts
Click photos from victim device front/main camera
Send SMS
Keylogger {not working in android 11 or higher version}
Record Audio
Pre Binded with [Instagram Webview]
Runs In Background
Auto Starts on restarting the device
No port forwarding needed
Requirements
Glitch Account
ApkEasy Tool ( For PC ) or ApkTool Editor ( for Android)
Disclaimer
Devolper Provides no warranty with this software and will not be responsible for any direct or indirect damage caused due to the usage of this tool. Dogerat is built for both Educational and Internal use ONLY.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. An Obfuscation-Neglect Android Malware Scoring System
Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.
We have an order theory of criminal which explains stages of committing a crime. For example, the crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.
According to the above principle, we developed our order theory of android malware. We develop five stages to see if malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. A certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of malware.
Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.
Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Google’s Threat Analysis Group (TAG) has confirmed that Android users around the world are being targeted by the Alien spyware family, which is commercial spyware. Tracking shows that the malware family is an advanced malware family developed by Cytrox Technologies of the Republic of North Macedonia in the Balkans of Southeastern Europe. The company primarily sells it to certain national government agencies or groups backed by those government agencies for the purpose of hacking and spying on targeted Android users. In essence, this is no different from the Pegasus spyware launched by the Israeli commercial spyware company NSO, except that the Alien spyware is for Android.
Hidden Content
Give reaction to this post to see the hidden content. Analysis shows that the Alien spyware family mainly exploits zero-day vulnerabilities and certain known outdated flaws, and is mainly spread by email. For example, after the email of the target user is known, a phishing email is sent to induce the user to click on the link, and the Predator virus can be automatically loaded after clicking.
The organization that launched the attack uses a short-link system. When a user clicks, the virus will be loaded for the first time, and then they will jump to the website mentioned in the phishing email to confuse the user. The three campaigns identified by Google’s threat analysis team belong to the Alien malware family, and there are currently dozens of Android users under attack. Obviously, this is also a targeted attack, and the attacker will only carry out targeted attacks after selecting the target. Google writes:
Analysis revealed that the Alien malware family has features such as audio recording, hiding apps, stealing user data, and turning on microphones for monitoring. Zero-day vulnerabilities that have been discovered by Google will be fixed soon, but for most Android users, there is no way to update the system in time to fix it. In particular, many of the vulnerabilities exploited by the malware are outdated, meaning they have long been fixed by Google but the OEM has not sent an update to the user. This makes the security of the Android system very weak, because many outdated vulnerabilities have been published long ago, and virtually any attacker can exploit the vulnerabilities. Google reminded that users should not click on links in unknown emails, and users should double-check the sender to ensure that the email is safe before clicking on the link.
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Coolmuster Android Assistant
As the professional Android managing software, Coolmuster Android Assistant offers you a one-stop solution to manage Android data easily.
* Back up and restore everything on Android device with 1 click.
* Selectively export or import one or more files from/to Android device.
* Add, transfer, delete and edit contacts on the computer.
* Send, resend, forward, delete and copy text messages directly on your Computer.
* Support to manage contacts, SMS, call logs, music, videos, photos, books, etc.
Supported OS:
Windows 11/10/8/7/Vista/XP
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. A machine learning malware analysis framework for Android apps.
DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious.
Features and qualities of Droid Detective include:
Analysing which of ~330 permissions are specified in the application's AndroidManifest.xml file.
Analysing the number of standard and proprietary permissions in use in the application's AndroidManifest.xml file.
Using a RandomForest machine learning classifier, trained off the above data, from ~14 malware families and ~100 Google Play Store applications.
Hidden Content
Give reaction to this post to see the hidden content.
-