Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      PhoneSploit v1.2 - Using Open Adb Ports We Can Exploit A Andriod Device

      1 post in this topic

      Hidden Content

        Give reaction to this post to see the hidden content.

      Using open Adb ports we can exploit an Andriod device.
      you can find open ports here

      Hidden Content

        Give reaction to this post to see the hidden content.

      To find out how to access a local device -->

      Hidden Content

        Give reaction to this post to see the hidden content.


      Recent News (New Update v.1.2)
      Port Forwarding
      NetStat
      Grab wpa_supplicant
      Turn WiFi On/Off

      Show Mac/Inet
      Remove Password
      Extract apk from app
      Use Keycode

      Get Battery Status
      Get Current Activity

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 3
      • Thanks 1

      Share this post


      Link to post
      Share on other sites

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          Cisco Small Business switches versions 200, 300, and 500 suffer from information leakage and open redirection vulnerabilities.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe
          Ghostfuscator
          Obfuscate python scripts making them password-protected using AES Encryption
          Usage
          Just execute the script, and follow the menu.
          Info
          Once an script is obfuscated, when running it a password asking prompt will appear, after submiting the correct password, the script will execute decrypting it's decrypted content in the memory

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Penta (PENTest + Automation tool)
          Penta is a Pentest automation tool using Python3.
          Main menu
              Port scanning     To check ports for a target. Log output supported.     Nmap     To check ports by additional means using nmap     Check HTTP option methods     To check the methods (e.g. GET, POST) for a target.     Grab DNS server info     To show the info about DNS server.     Shodan host search To collect host service info from Shodan. Request Shodan API key to enable the feature.     FTP connect with anonymous To check if it has anonymous access activated in port 21. FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it. Anyone can log in to the server if the administrator has allowed an FTP connection with anonymous login.     SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in data/dict.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The software runs your .exe in a .docx format that can be easily mailed, the file is not detected but "yes" if your .exe file is not encrypted.
          Functionality:
          Loader (download and start the exe plugin link, do not use https/ssl)
          Infects all files inside rar and zip
          Infects everything .docx
          Copyed by disks and networks
          It sends itself in all contacts in Skype
          Socks5 proxy bot with IP mail
          All files must be in the same folder as the builder when creating the .docx file.

          Hidden Content
          Give reaction to this post to see the hidden content.