Tiny hacking gadget is equipped with infrared, WiFi, and Bluetooth and easily fits in the palm of your hand | Evil Portal
https://www.mobile-hacker.com/2024/07/10/m5stickc-plus-2-running-nemo-firmware-wifi-evil-portal-attacks/
https://www.mobile-hacker.com/2024/07/10/m5stickc-plus-2-running-nemo-firmware-wifi-evil-portal-attacks/
Mobile Hacker
M5StickC Plus 2 running Nemo firmware: WiFi evil portal attacks
The M5StickC Plus 2 is a compact, ESP32-based development board with built-in Wi-Fi, infrared and Bluetooth capabilities. When paired with the Nemo firmware, developed by 4x0nn, it becomes a powerful tool for high-tech pranks, wireless attacks, and creativeβ¦
π18β€5
OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen
[blog] https://www.recordedfuture.com/research/oilalpha-spyware-used-to-target-humanitarian-aid-groups
[pdf] https://go.recordedfuture.com/hubfs/reports/cta-2024-0709.pdf
[blog] https://www.recordedfuture.com/research/oilalpha-spyware-used-to-target-humanitarian-aid-groups
[pdf] https://go.recordedfuture.com/hubfs/reports/cta-2024-0709.pdf
Recordedfuture
OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen | Recorded Future
Discover how OilAlpha's malicious applications are targeting humanitarian aid groups in Yemen. Learn about their tactics and how to mitigate risks.
π9β€2
[For beginners] Introduction to Android Pentesting
https://owlhacku.com/introduction-to-android-pentesting/
https://owlhacku.com/introduction-to-android-pentesting/
π26π7π₯±4β€3π₯΄2π€ͺ2π₯1
Analysis of the recent Android TangleBot malware sample
https://cryptax.medium.com/untangling-android-tanglebot-38a52cd8f420
https://cryptax.medium.com/untangling-android-tanglebot-38a52cd8f420
Medium
Untangling Android/TangleBot
We dig in a malicious sample of Android/TangleBot of May 2024. TangleBot is also reported as a BankBot, although it is more an Android RATβ¦
π5π
3π»2β€1
I have created a dedicated WhatsApp channel with focus on Mobile offensive security, tools, tutorials, red team (without malware news)
Feel free to join and share:
https://whatsapp.com/channel/0029VabYeVdGOj9oBPNRMk3c
Posting in this channel will not be stopped or terminated
Feel free to join and share:
https://whatsapp.com/channel/0029VabYeVdGOj9oBPNRMk3c
Posting in this channel will not be stopped or terminated
π37π14π€‘9π6π4π©3π
3πΏ3π2π1π€ͺ1
How to root and install NetHunter on TicWatch Pro and extend battery life
https://www.mobile-hacker.com/2024/07/15/how-to-install-nethunter-on-ticwatch-pro/
https://www.mobile-hacker.com/2024/07/15/how-to-install-nethunter-on-ticwatch-pro/
Mobile Hacker
How to install NetHunter on TicWatch Pro
In this guide, Iβll walk you through the steps to install Kali NetHunter on TicWatch Pro smartwatches. With NetHunter, which is sometimes also called FitHunter
π10
Android & iOS mobile security cheatsheets
https://github.com/justmobilesec/Android-iOS-Cheat-Sheet/
https://github.com/justmobilesec/Android-iOS-Cheat-Sheet/
π18π₯5π2β€1
TicWatch Pro: Returning to Factory Firmware
If you messed up while rooting and installing NetHunter, you can always go back to stock ROM
https://www.mobile-hacker.com/2024/07/16/ticwatch-pro-returning-to-factory-firmware/
If you messed up while rooting and installing NetHunter, you can always go back to stock ROM
https://www.mobile-hacker.com/2024/07/16/ticwatch-pro-returning-to-factory-firmware/
Mobile Hacker
TicWatch Pro: Returning to Factory Firmware
In previous blog I guide you how to root TicWatch Pro and install Kali NetHunter. In this tutorial, I will lead you how to start clean by flashing default stock system ROM (factory firmware) on your TicWatch Pro smartwatches. Why? In case you end up in anyβ¦
π11
Jailbreaking Rabbit R1 running RabbitOS
https://www.da.vidbuchanan.co.uk/blog/r1-jailbreak.html
https://www.da.vidbuchanan.co.uk/blog/r1-jailbreak.html
π6
Install NetHunter on TicWatch Pro after flashing factory firmware + troubleshooting
https://www.mobile-hacker.com/2024/07/17/install-nethunter-on-ticwatch-pro-after-flashing-factory-firmware/
https://www.mobile-hacker.com/2024/07/17/install-nethunter-on-ticwatch-pro-after-flashing-factory-firmware/
Mobile Hacker
Install NetHunter on TicWatch Pro after flashing factory firmware
You tried to flash custom ROM, root it or install Kali NetHunter on your TicWatch Pro (catfish) but something went wrong? Your smartwatches end-up in bootloop, always boots into recovery, from installation logs you were informed there is not enough free spaceβ¦
π14
APKscan: Scan for secrets, endpoints, API keys, tokens, credentials in Android apps
https://github.com/LucasFaudman/apkscan
https://github.com/LucasFaudman/apkscan
GitHub
GitHub - LucasFaudman/apkscan: Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Androidβ¦
Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .smali, .zip, .aar, .arsc, .aab, .jadx.kts). - LucasFaudma...
β€21π₯8π4π3
Use TicWatch Pro as a Keystroke Injector
https://www.mobile-hacker.com/2024/07/18/ticwatch-pro-as-a-keystroke-injector/
https://www.mobile-hacker.com/2024/07/18/ticwatch-pro-as-a-keystroke-injector/
Mobile Hacker
TicWatch Pro as a Keystroke Injector
If you successfully installed NetHunter as described in previous blogs, we can start use its tools. In this blog, I will focus on Duck Hunter provided by NetHunter. Using DuckHunter allows our TicWatch Pro smartwatches to behave as Rubber Ducky, also knownβ¦
π11
Cellebrite leaked documents display which Android and iOS versions it is capable to unlock and access data from
https://www.404media.co/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock/
https://www.404media.co/leaked-docs-show-what-phones-cellebrite-can-and-cant-unlock/
β€22π4
Konfety Spreads βEvil Twinβ Android Apps for Multiple Fraud Schemes
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-konfety-spreads-evil-twin-apps-for-multiple-fraud-schemes
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-konfety-spreads-evil-twin-apps-for-multiple-fraud-schemes
HUMAN Security
Satori Threat Intelligence Alert: Konfety Spreads βEvil Twinβ Apps for Multiple Fraud Schemes - HUMAN Security
Uncover the intricate web of the Konfety ad fraud operation spreading through 'evil twin' apps, exposing malicious tactics and deceptive practices in the mobile advertising realm.
π8
Beware of BadPack: One Weird Trick Being Used Against Android Devices
https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/
https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/
Unit 42
Beware of BadPack: One Weird Trick Being Used Against Android Devices
Our data shows a pattern of APK malware bundled as BadPack files. We discuss how this technique is used to garble malicious Android files, creating challenges for analysts.
π12π5β€4
Exploiting the EvilVideo vulnerability on Telegram
Discovered a 0-day Telegram for Android exploit that allows sending malicious apps disguised as videos
https://www.welivesecurity.com/en/eset-research/cursed-tapes-exploiting-evilvideo-vulnerability-telegram-android/
Discovered a 0-day Telegram for Android exploit that allows sending malicious apps disguised as videos
https://www.welivesecurity.com/en/eset-research/cursed-tapes-exploiting-evilvideo-vulnerability-telegram-android/
Welivesecurity
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos.
π11π₯4β€1π1π1
Hacking a 2014 tablet... in 2024!
https://blog.r0rt1z2.com/hacking-a-2014-tablet-in-2024.html
https://blog.r0rt1z2.com/hacking-a-2014-tablet-in-2024.html
β€12π₯4π₯°3
Part 1: Injecting and Exploiting Synthetic Remote Vulnerabilities to explore Signal-iOS and WebRTC
https://margin.re/2024/07/you-cant-spell-webrtc-without-rce-part-1/
https://margin.re/2024/07/you-cant-spell-webrtc-without-rce-part-1/
Margin Research
You Can't Spell WebRTC without RCE - Part 1
Injecting and Exploiting Synthetic Remote Vulnerabilities to explore Signal-iOS and WebRTC
Itβs another average Friday morning and my iPhone shows 705 unread Signal messages. Signal has not completely supplanted my use of iMessage, but it does dominate communicationsβ¦
Itβs another average Friday morning and my iPhone shows 705 unread Signal messages. Signal has not completely supplanted my use of iMessage, but it does dominate communicationsβ¦
π₯17π₯°1