unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Locate smartphones using Advertising ID without spyware or exploit
This blog is actually a video that explains how it is possible to locate Google and Apple...
2024-10-25 14:16:22 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
advertising
smartphones
sold
eight
Portable Hacking Lab: Control The Smallest Kali Linux With a Smartphone
Running Kali Linux on a Raspberry Pi Zero is a fantastic way to create a portable, powerful tes...
2024-10-4 15:2:7 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
raspberry
smartphone
vnc
ssh
adapter
WiFiPumpkin3 integrated into NetHunter: Powerful Duo allows malware distribution via Captive Portal
WiFiPumpkin3 is a powerful framework designed for rogue access point attacks and network securi...
2024-9-27 17:17:5 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
network
captive
security
phishing
How to install Kali NetHunter on TicWatch Pro 3
In previous series of blogs I focused on installation of Kali NetHunter on older model of TicWa...
2024-7-25 17:47:1 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
keycode
nethunter
ticwatch
sideload
magisk
WhatsApp trick: Android malware can impersonate PDF file
On July 14th 2024, a malware analyst @0x6rss discovered and shared on X a security issue in Wha...
2024-7-23 20:16:58 | 阅读: 36 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
apk
messenger
malicious
security
manipulated
TicWatch Pro as a Keystroke Injector
If you successfully installed NetHunter as described in previous blogs, we can start use...
2024-7-18 14:32:0 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
hid
rickroll
hidg
ducky
Install NetHunter on TicWatch Pro after flashing factory firmware
You tried to flash custom ROM, root it or install Kali NetHunter on your TicWatch Pro (ca...
2024-7-17 16:47:14 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
ticwatch
sideload
rom
twrp
nethunter
TicWatch Pro: Returning to Factory Firmware
In previous blog I guide you how to root TicWatch Pro and install Kali NetHunter. In this tutor...
2024-7-16 16:2:7 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
ticwatch
fastboot
nethunter
rom
flashing
How to install NetHunter on TicWatch Pro
In this guide, I’ll walk you through the steps to install Kali NetHunter on TicWatch Pro smartw...
2024-7-15 16:17:14 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
ticwatch
mobvoi
rom
bootloader
M5StickC Plus 2 running Nemo firmware: WiFi evil portal attacks
The M5StickC Plus 2 is a compact, ESP32-based development board with built-in Wi-Fi, infr...
2024-7-10 16:17:2 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nemo
network
twin
m5stickc
firmware
Kali NetHunter 101: Your Path to Mobile Ethical Hacking
This is a recap of a complete NetHunter Hacker series where I covered various aspects of...
2024-7-4 15:31:59 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
arsenal
oneplus
wardriving
aspects
Uncover Bluetooth Vulnerabilities with BlueToolkit
BlueToolkit is an extensible Bluetooth Classic vulnerability automated t...
2024-7-2 16:47:12 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
bluetoolkit
lmp
hardware
RFID Hacking with Proxmark3: Cloning, Emulating, and Standalone Mode
Access cards – those little plastic rectangles that grant us entry to buildings, parking...
2024-6-26 20:17:7 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
proxmark3
security
cloning
emulate
rfid
Monitoring Android file system with fsmon
fsmon is a FileSystem Monitor utility created by by Sergi Àlvarez at Nowsecure can run on Linux...
2024-6-24 20:32:1 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
rooted
fsmon
monitoring
loaded
security
NetHunter Hacker XVI: Metasploit payload generator in your pocket
Metasploit is a powerful and comprehensive framework that allows you to create, test, and execu...
2024-6-20 20:32:13 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
payload
nethunter
network
security
nmap
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
With physical access to Android device with enabled ADB debugging running Android 12 or 1...
2024-6-17 20:17:3 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
0044
exfiltrated
unpatched
exfiltrate
smartphone
How charging your phone can compromise your data using Juice Jacking attack
This is a third time I have seen FBI posting warnings on X about risks of using free public cha...
2024-4-4 20:16:56 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
cable
smartphone
charging
jacking
juice
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
In January 2024 Marc Newlin published prove of concept script that exploits 0-click Bluetooth v...
2024-3-26 18:16:50 | 阅读: 22 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
blueducky
vicinity
marc
adapter
recognized
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
This critical security issue allows third party user to record audio from Bluetooth speaker wit...
2024-3-22 16:31:54 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
speaker
bluespy
pairing
paring
headset
Analyze installed Android applications for security risks in Termux
APKDeepLens is a Python-based tool that is used for scanning Android applications (APK files) t...
2024-3-11 16:31:54 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
apkdeeplens
apk
termux
identify
analysis
Previous
-2
-1
0
1
2
3
4
5
Next