Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Tuesday, May 27, 2025

Category: Andorid Hacking

Kage – Control Android and Window Device with GUI Interface

Shubham Goyal11 August 202021 October 2020
Andorid Hacking / Exploiting Tools / Window Hacking

Hey Folks, In this tutorial we are going to discuss about an interesting tool called “Kage“. It is specifically designed to create payloads for different platforms and interact with the meterpreter session via the (GUI) interface. But through this program we cannot execute the command because it gives us limited […]

Continue Reading

Hack Audio Recording of Android Phone

Shubham Goyal24 June 202021 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we will tell you interesting tricks that you can use for listen to the communication of your enemies and friends anonymously. Sayhello – thelinuxchoice Sayhello is an open source tool, hosted on the github page. This tool becomes a link and when victim clicks on […]

Continue Reading

Spy on Any Android Phone – XploitSPY

Shubham Goyal18 May 202018 May 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

In this article, you will learn about the sapying on adnroid phone. As you know that various tools or software are available to spy on android phone but they will charge form you. Why should we use XploitSPY ? If you want to spy on someone such as : friends, […]

Continue Reading

Access Any Android Phone Without Touching – Ghost Framework

Shubham Goyal5 May 202022 October 2020
Andorid Hacking / Exploiting Tools

In this article, we will going to talk about how to access any android device. There will be many ways to access the android phone but in this method you can access android device without touching the phone. Lets take a look ! What is Android Debug Bridge (ADB) ? […]

Continue Reading

How to Hack Android Phone over the WAN

Shubham Goyal2 May 20206 May 2020
Andorid Hacking / Ethical Hacking

As you know we already discussed about android hacking over LAN ( Local Area Network ). Click here to see. Now in this article we will talk about how to access any android phone over WAN ( Wide Area Network ) without port forwarding. What is LAN ? Local area […]

Continue Reading

Hack SMS, Call Logs, Whatsapp of any Android Phone

Shubham Goyal30 April 202030 April 2020
Andorid Hacking / Ethical Hacking

In the india total number of android mobile users has reached 114 million. Cause of increasing the total number of andorid mobile users the cybercrime has also be incressed. Hence In this article we will discuss how to hack any android phone using metasploit framework and how to protect himself. […]

Continue Reading

AdvPhishing : OTP Bypass Phishing Tool

Shubham Goyal24 April 202021 October 2020
Andorid Hacking / Ethical Hacking / Soical Engineering

AdvPhishing tool is the latest phishing technique in which you can easily access social media accounts of users . there are many type of tools like this but in this tool you can access social media accounts of user even if if two-factor authentication is activated. with the help of […]

Continue Reading

Posts pagination

Previous 1 2 3

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy