Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      PhoneSploit v1.2 - Using Open Adb Ports We Can Exploit A Andriod Device

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

      Using open Adb ports we can exploit an Andriod device.
      you can find open ports here

      Hidden Content

        Give reaction to this post to see the hidden content.

      To find out how to access a local device -->

      Hidden Content

        Give reaction to this post to see the hidden content.


      Recent News (New Update v.1.2)
      Port Forwarding
      NetStat
      Grab wpa_supplicant
      Turn WiFi On/Off

      Show Mac/Inet
      Remove Password
      Extract apk from app
      Use Keycode

      Get Battery Status
      Get Current Activity

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 3
      • Thanks 1

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By dEEpEst
          Kill Android Device
          The application consumes all Android ram and replicates the same process again n again which causes other applications not to be executed resulting Android crash and a reboot is needed to fix your device. A kind of evil app for pranks. Works on every latest Android including Android 9. Fully undetectable from Play Protect and Other Antiviruses so don't upload on shits like VirusTotal or any. 
           

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. XCat
          XCat is a command-line tool to exploit and investigate blind XPath injection vulnerabilities.
          It supports a large number of features:
              Auto-selects injections (run xcat injections for a list)
              Detects the version and capabilities of the xpath parser and selects the fastest method of retrieval
              Built-in out-of-bound HTTP server
                  Automates XXE attacks
                  Can use OOB HTTP requests to drastically speed up retrieval
              Custom request headers and body
              Built-in REPL shell, supporting:
                  Reading arbitrary files
                  Reading environment variables
                  Listing directories
                  Uploading/downloading files (soon TM)


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          EagleEye
          Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
          You have at least one image of the person you are looking for and a clue about their name.
          You enter this data into EagleEye and it tries to find Instagram, Youtube, Facebook, and Twitter Profiles of this person.




          Hidden Content
          Give reaction to this post to see the hidden content.