unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Feberis Pro: The Ultimate 4-in-1 Expansion Board for Flipper Zero
Feberis Pro 是 Flipper Zero 的扩展模块,集成了 2 个 CC1101(433MHz 和 868MHz)、NRF24、ESP32 和 GPS 模块,支持多种无线通信功能。相比原版 Feberis,它增加了 GPS 模块和更多射频功能,适用于安全研究、渗透测试和无线实验。...
2025-3-31 10:46:51 | 阅读: 88 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
feberis
flipper
security
cc1101
gps
EvilLoader: Unpatched Telegram for Android Vulnerability Disclosed
Telegram安卓版被发现存在EvilLoader漏洞,允许攻击者将恶意APK伪装为视频文件传播。该漏洞尚未修复,已被地下论坛销售两个月。建议用户更新应用、关闭自动下载并谨慎处理不明文件以防范风险。...
2025-3-5 07:32:21 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
malicious
underground
evilloader
forums
security
Building a Portable Kali Box with Raspberry Pi and Touchscreen
文章介绍如何在 Raspberry Pi 4 上安装带有 3.5 英寸触摸屏的 Kali Linux,详细说明了从镜像写入、驱动安装到安全配置的过程,并提供了便携供电方案和虚拟键盘设置建议。该设备适用于移动渗透测试和网络安全研究。...
2025-2-26 10:31:27 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
raspberry
touchscreen
ssh
security
microsd
Bettercap on Android: A Portable Network Security Toolkit
Bettercap 是一款功能强大的网络分析与渗透测试工具,支持Wi-Fi和蓝牙扫描、会话劫持等操作。通过Termux或NetHunter Terminal可在Android设备上运行,实现便携式网络测试。该工具适用于攻击者识别漏洞及防御者增强安全 posture,并强调合法使用以避免法律风险。...
2025-2-21 09:31:32 | 阅读: 34 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
bettercap
network
nethunter
security
caplets
Evil Crow RF: A Portable Radio Frequency Device
Evil Crow RF V2是一款便携式RF hacking设备,支持Sub-GHz频段和多种任务如信号接收与发射。通过智能手机操作,无需额外设备。相比Flipper Zero等产品更经济实惠且便于携带。其开源固件支持定制化功能,在移动安全测试中表现优异。...
2025-2-11 06:53:9 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
crow
firmware
flipper
ghz
frequencies
Hacking on the Go: Wi-Fi Karma Attacks with Mobile Devices
本文介绍了Wi-Fi Karma攻击的原理及其风险。攻击者通过伪装成用户曾连接过的Wi-Fi网络,诱使其设备自动连接到恶意热点,从而窃取隐私信息或传播恶意软件。文章还探讨了如何利用移动设备实施此类攻击,并提供了防范建议,如禁用自动重连、遗忘未使用的网络等。...
2025-2-5 07:32:25 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
network
karma
captive
attackers
rogue
USB Army Knife: The Ultimate Close Access Penetest Tool
USB Army Knife, a powerful tool designed to meet a wide range of red teaming needs. Whether you...
2025-1-24 08:31:25 | 阅读: 64 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
army
knife
lilygo
adapter
network
Boost Your Flipper Zero with FEBERIS: 3-in-1 SubGhz, NRF24, and WiFi board
Today, I am excited to introduce you to FEBERIS, an expansion 3-in-1 development board for the...
2025-1-9 08:32:27 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
feberis
flipper
nrf24
cc1101
development
Run Firmware Anywhere: Flexibility of M5Stick Launcher
In the previous blog about Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Displ...
2024-12-29 11:1:24 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
firmware
m5burner
wui
yellow
cheap
Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Device
The Cheap Yellow Device (CYD) is a cost-effective development board that has captured the atten...
2024-12-23 09:1:20 | 阅读: 142 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
firmware
cyd
bruce
network
marauder
Detect ARP spoofing attack using Android app
ARP (Address Resolution Protocol) spoofing is many times initial phase of Man-In-The-Middle (MI...
2024-12-16 07:31:45 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
network
spoofing
poisoning
attacker
security
Bluetooth and Wi-Fi Jamming using Flipper Zero
Jamming is a technique used to disrupt wireless communications by overwhelming the signal with...
2024-12-12 22:18:45 | 阅读: 170 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
jamming
jammer
flipper
band
Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN
ThreatFabric has identified a new cash-out tactic that wasn’t seen before called “Ghost Tap”, w...
2024-12-2 17:46:47 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nfcgate
smartphone
contactless
enrolled
mule
Smartphone scareware: cracked screen as a result of virus
Scareware is a type of malicious advertisement designed to frighten users into believing...
2024-11-27 16:46:38 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
scareware
security
software
invitations
malicious
Locate smartphones using Advertising ID without spyware or exploit
This blog is actually a video that explains how it is possible to locate Google and Apple...
2024-10-25 14:16:22 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
advertising
smartphones
sold
eight
Portable Hacking Lab: Control The Smallest Kali Linux With a Smartphone
Running Kali Linux on a Raspberry Pi Zero is a fantastic way to create a portable, powerful tes...
2024-10-4 15:2:7 | 阅读: 63 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
raspberry
smartphone
vnc
ssh
adapter
WiFiPumpkin3 integrated into NetHunter: Powerful Duo allows malware distribution via Captive Portal
WiFiPumpkin3 is a powerful framework designed for rogue access point attacks and network securi...
2024-9-27 17:17:5 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
network
captive
security
phishing
How to install Kali NetHunter on TicWatch Pro 3
In previous series of blogs I focused on installation of Kali NetHunter on older model of TicWa...
2024-7-25 17:47:1 | 阅读: 39 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
keycode
nethunter
ticwatch
sideload
magisk
WhatsApp trick: Android malware can impersonate PDF file
On July 14th 2024, a malware analyst @0x6rss discovered and shared on X a security issue in Wha...
2024-7-23 20:16:58 | 阅读: 54 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
apk
messenger
malicious
security
manipulated
TicWatch Pro as a Keystroke Injector
If you successfully installed NetHunter as described in previous blogs, we can start use...
2024-7-18 14:32:0 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
hid
rickroll
hidg
ducky
Previous
2
3
4
5
6
7
8
9
Next