unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Install NetHunter on TicWatch Pro after flashing factory firmware
You tried to flash custom ROM, root it or install Kali NetHunter on your TicWatch Pro (ca...
2024-7-17 16:47:14 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
ticwatch
sideload
rom
twrp
nethunter
TicWatch Pro: Returning to Factory Firmware
In previous blog I guide you how to root TicWatch Pro and install Kali NetHunter. In this tutor...
2024-7-16 16:2:7 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
ticwatch
fastboot
nethunter
rom
flashing
How to install NetHunter on TicWatch Pro
In this guide, I’ll walk you through the steps to install Kali NetHunter on TicWatch Pro smartw...
2024-7-15 16:17:14 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
ticwatch
mobvoi
rom
bootloader
M5StickC Plus 2 running Nemo firmware: WiFi evil portal attacks
The M5StickC Plus 2 is a compact, ESP32-based development board with built-in Wi-Fi, infr...
2024-7-10 16:17:2 | 阅读: 20 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nemo
network
twin
m5stickc
firmware
Kali NetHunter 101: Your Path to Mobile Ethical Hacking
This is a recap of a complete NetHunter Hacker series where I covered various aspects of...
2024-7-4 15:31:59 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
arsenal
oneplus
wardriving
aspects
Uncover Bluetooth Vulnerabilities with BlueToolkit
BlueToolkit is an extensible Bluetooth Classic vulnerability automated t...
2024-7-2 16:47:12 | 阅读: 75 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
bluetoolkit
lmp
hardware
RFID Hacking with Proxmark3: Cloning, Emulating, and Standalone Mode
Access cards – those little plastic rectangles that grant us entry to buildings, parking...
2024-6-26 20:17:7 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
proxmark3
security
cloning
emulate
rfid
Monitoring Android file system with fsmon
fsmon is a FileSystem Monitor utility created by by Sergi Àlvarez at Nowsecure can run on Linux...
2024-6-24 20:32:1 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
rooted
fsmon
monitoring
loaded
security
NetHunter Hacker XVI: Metasploit payload generator in your pocket
Metasploit is a powerful and comprehensive framework that allows you to create, test, and execu...
2024-6-20 20:32:13 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
payload
nethunter
network
security
nmap
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
With physical access to Android device with enabled ADB debugging running Android 12 or 1...
2024-6-17 20:17:3 | 阅读: 26 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
0044
exfiltrated
unpatched
exfiltrate
smartphone
How charging your phone can compromise your data using Juice Jacking attack
This is a third time I have seen FBI posting warnings on X about risks of using free public cha...
2024-4-4 20:16:56 | 阅读: 34 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
cable
smartphone
charging
jacking
juice
BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
In January 2024 Marc Newlin published prove of concept script that exploits 0-click Bluetooth v...
2024-3-26 18:16:50 | 阅读: 31 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
blueducky
vicinity
marc
adapter
recognized
Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
This critical security issue allows third party user to record audio from Bluetooth speaker wit...
2024-3-22 16:31:54 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
speaker
bluespy
pairing
paring
headset
Analyze installed Android applications for security risks in Termux
APKDeepLens is a Python-based tool that is used for scanning Android applications (APK files) t...
2024-3-11 16:31:54 | 阅读: 24 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
apkdeeplens
apk
termux
identify
analysis
Kali NetHunter now supports Bad Bluetooth HID attacks to inject keystrokes wirelessly
Bluetooth Human Interface Device (HID) profiles allow devices like keyboards, mice, and game co...
2024-3-6 18:4:9 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nethunter
attacker
keystrokes
hid
inject
NetHunter Hacker XV: Use Nmap for network scanning
In today’s post we will talk about network scanning using Nmap using our Android device. Nmap i...
2024-3-1 17:17:38 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
nmap
network
nethunter
security
NetHunter Hacker XIV: Find exploits using SearchSploit and setup Wi-Fi Pineapple connector
SearchSploit is a powerful command-line tool that is part of the NetHunter system, developed by...
2024-2-27 19:2:14 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
pineapple
database
nethunter
connector
security
Automated DNS poisoning using Android while charging via computer
In today’s interconnected digital world, the Domain Name System (DNS) plays a pivotal role in t...
2024-2-20 17:16:58 | 阅读: 22 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
poisoning
windows
rubber
ducky
malicious
NetHunter Hacker XIII: Overall guide to MITM framework
Man-in-the-middle (MITM) attacks are a type of cyberattack in which the attacker intercepts and...
2024-2-13 16:46:54 | 阅读: 23 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
mitmf
attacker
network
poisoning
spoofing
NetHunter Hacker XII: Master Social Engineering using SET
Social engineering is a technique used by attackers to trick people into disclosing private inf...
2024-2-2 14:32:20 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - www.mobile-hacker.com
payload
arduino
malicious
phishing
tabnabbing
Previous
3
4
5
6
7
8
9
10
Next