A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG – Android application penetration testing guide TikTok: three persistent arbitrary code executions and one theft of arbitrary files Persistent arbitrary code execution in Android’s Google Play Core Library: details, explanation and the PoC – CVE-2020-8913 Android:Read More
Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on source like transparency logscertificate transparency logs or LDAP. Furthermore, nray allow to run in a distributed manner to speed up scans and to perform scans from differentRead More
An IMSI catcher is a device commonly used by law enforcement and intelligence agencies around the world to track mobile phones. They are designed to collect and log IMSI numbers, which are unique identifiers assigned to mobile phone subscriptions. Under certain circumstances, IMSI numbers can be linked back to personal identities, which inherently raises aRead More
If you ever wanted to hack a WiFi network, then these wireless hack devices will perform such attacks for you with ease. Depending on your scope of attack, we have listed multiple wireless hacking devices for you to choose from, exploiting cars, drones, WiFi networks, tapping mobile networks, garage doors and many more. Without furtherRead More
Q4 is already upon us, The Holidays and Black Friday for 2021 is getting closer, and thus we’ve curated a list of the best gifts for hackers and cyber security professionals. Whether you’re buying a gift for a friend or have been dying to share this list with someone shopping for you, we’ve got youRead More
Hardware wifi keyloggers are the only way to covertly record keystrokes with no possibility of detection by the computer! Our KeyLoggers are WiFi enabled meaning once setup they can be accessed from a distance. Undetectable Keylogger Because our keyloggers only snoop the USB connection without altering it, they’re completely undetectable by the target pc. Unless youRead More
A wifi deauther allows you to disconnect devices from a WiFi network. Even if you’re not connected to that network. Deauthers take advantage of a weakness in the 802.11 protocol which allows the sending of deauthentication frames by unauthorised devices. Deauthers come with other features such as Beacon Spamming (spamming WiFi network names) and Probe Spamming Our deauthers are notRead More
If you’ve grown bored of day-to-day work and need a new hacking gadget to experiment with, we’ve compiled a list of hacking gadgets to help you take password cracking and wireless hacking to the next level. If you’re not a white hat or pentester yourself but have one to shop for, whether for a birthday,Read More
To date, three contactless technologies have received standards classification from the International Organization for Standards (ISO), an umbrella organization made up of 130 national standards bodies from around the world, and the International Electro Technical Committee (IEC), an organization representing more than 50 national standards bodies focused on electronics.
KeyGrabber is the smallest, best-selling and highly affordable USB and PS/2 hardware keylogger. There are a few different KeyGrabbers models (with different sizes and features) available to purchase online and we’ll mention and describe some of them below.