0Day.Today | Learn Exploit | Zero World | Dark web |
آموزش رت اندرویدی Cypher Rat #android #rat —————— 0Day.Today @LearnExploit @Tech_Army
نسخه جدید Cypher Rat V3.5
+ [FIX] Rename Client
+ [FIX] Edit Connection info
+ [FIX] Apk not open on some MIUI Phones
+ [Update] Better & Faster Keylogger
+ [Update] injection works with more apps
+ [Update] Screen Monitor Faster
+ [New] Enable/Disable Any App
Download
Github
#rat #android
——————
0Day.Today
@LearnExploit
@Tech_Army
+ [FIX] Rename Client
+ [FIX] Edit Connection info
+ [FIX] Apk not open on some MIUI Phones
+ [Update] Better & Faster Keylogger
+ [Update] injection works with more apps
+ [Update] Screen Monitor Faster
+ [New] Enable/Disable Any App
Download
Github
#rat #android
——————
0Day.Today
@LearnExploit
@Tech_Army
CVE-2022-20452 ( privilege escalation on Android from installed app to system app (or another app)
Github
#android #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#android #exploit
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - michalbednarski/LeakValue: Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app…
Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle() - michalbednarski/LeakValue
Andronix - The Power of Linux on Android
Install Linux on your Android
Github
andronix.app
#linux #android
——————
0Day.Today
@LearnExploit
@Tech_Army
Install Linux on your Android
Github
andronix.app
#linux #android
——————
0Day.Today
@LearnExploit
@Tech_Army
This media is not supported in your browser
VIEW IN TELEGRAM
قابلیت جدید اندروید ۱۴ جهت محافظت از رمز عبور در برابر shoulder surfing یا قاپیدن پسورد زمان ورود به گوشی
همونطور که در ویدیو میبینید نسخه جدید اندروید همه کاراکترهای پین رو کاملا مخفی میکنه ولی نسخه های فعلی هر کاراکتر پین رو برای مدت بسیار کوتاهی درزمان وارد کردن نشون میدهند.
#android #news
——————
0Day.Today
@LearnExploit
@Tech_Army
همونطور که در ویدیو میبینید نسخه جدید اندروید همه کاراکترهای پین رو کاملا مخفی میکنه ولی نسخه های فعلی هر کاراکتر پین رو برای مدت بسیار کوتاهی درزمان وارد کردن نشون میدهند.
#android #news
——————
0Day.Today
@LearnExploit
@Tech_Army
0Day.Today | Learn Exploit | Zero World | Dark web |
آموزش Dogerat متصل به تلگرام Github #Rat #Android #Telegram iliya(h.r) —————— 0Day.Today @LearnExploit @Tech_Army
DogeRat Free version Src code published:
Github
#Rat #Android
imem!
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#Rat #Android
imem!
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - shivaya-dav/DogeRat: A multifunctional Telegram based Android RAT without port forwarding.
A multifunctional Telegram based Android RAT without port forwarding. - shivaya-dav/DogeRat
Android backdoor
SSH Backdoor for android
Github
#android #backdoor
——————
0Day.Today
@LearnExploit
@Tech_Army
SSH Backdoor for android
Github
#android #backdoor
——————
0Day.Today
@LearnExploit
@Tech_Army
ApkHack-BackDoor
ApkHack-BackDoor is a shell script that simplifies the process of adding a backdoor to any Android APK file.
Github
#tools #android #backdoor
——————
0Day.Today
@LearnExploit
@Tech_Army
ApkHack-BackDoor is a shell script that simplifies the process of adding a backdoor to any Android APK file.
Github
#tools #android #backdoor
——————
0Day.Today
@LearnExploit
@Tech_Army
Xiaomi HyperOS BootLoader Bypass - A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings
Github
#android
——————
0Day.Today
@LearnExploit
@Tech_Army
Github
#android
——————
0Day.Today
@LearnExploit
@Tech_Army
GitHub
GitHub - MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass: A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community…
A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings. - MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass
drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Android Runtime, other apps' IPC endpoints and the underlying OS.
cd drozer
python setup.py bdist_wheel
pip install dist/drozer-<version>-py3-none-any.whl
cd drozer
virtualenv -p /usr/bin/python3 venv
source venv/bin/activate
python setup.py bdist_wheel
sudo pip install dist/drozer-<version>-py3-none-any.whl
adb install drozer-agent.apk
#Android #Security #Pentest
Please open Telegram to view this post
VIEW IN TELEGRAM