Mobile Phone

  • TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus. TheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks, browser attacks, DLL files, FUD payloads against Linux, Mac OS X, Windows, and Android. It can be combined with msfvenom (Metasploit framework) which can be then utilized to utilise a reverse shell. It offers a lot of features, but in this article, I backdoor with msfvenom. How to Install the FatRat? In order to install the FatRat tool, we need to download/clone the package from Github using the following command. git clone https://github.com/Screetsec/TheFatRat.git The downloaded package contains the setup file that can be executed as follows. cd TheFatRat ./setup.sh [Note: If the setup.sh is not an executable format, then change the file permission using the chmod +x setup.sh command] The installation process can take some time due to the installation of different bundles as shown in the following screenshot. How FatRat Works? After successful installation, the FatRat tool can be executed using the following command. fatrat The tool runs a dependency check before loading in the terminal. After verifying the dependencies, the FatRat menu appears on the screen. As we can see in the above screenshot, there are a number of ways we can create the backdoors.  For instance, we can generate payloads through PwnWinds by selecting the sequence number (#6) from the list. The PwnWind has the following set of backdoors/payloads to be automatically generated by the tool. Let’s generate a test (.exe) payload written in C# + Powershell (option#2). We need to embed the localhost IP address and...
  • December 13, 2020

    Take Over Any Android Device In Minutes.

    Android Remote Administration Tool (RAT) named Ahmyth which is being trojanized into other Android apps and is getting distributed in the wild. Upon infecting an Android device this RAT can send sensitive information present on the device like SMS and call logs as well as perform functions like taking a picture, sending a text message or record audio via the microphone. Download & Install AhMyth There are two ways to download and install AhMyth. The first is to directly use the source code from GitHub. The second is to use the binaries they provide. Method 1 From Source Code If you chose to start with the source code, then you’ll need to check that you have a few prerequisites installed. Java — it’s used to generate the APK backdoor. Electron — it’s used to start the desktop application. Electron-builder and Electron-packer — they are used to build the binaries for macOS, Windows, and Linux. Once you have those prerequisites, you’re ready to proceed. First clone the code from GitHub with the following commands. git clone https://github.com/AhMyth/AhMyth-Android-RAT.git Then move to the AhMyth-Android-Rat directory with the following. cd AhMyth-Android-RAT/AhMyth-Server Once you’re in, start AhMyth with the command below. npm start This program is still in beta development, and as such, it isn’t as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below. sudo npm start --unsafe-perm You’ll know it’s working when you see the GUI launch. Method 2 From Binaries The source code is one way to download it, but if you’re lazy like me, there’s a slightly easier way — use the binaries! It’s particularly nice when you’re working on a Windows computer and don’t want to mess around with the command line....
  • DISCLAIMER: The answer provided is intended to be used and must be used for informational purposes only. PullOutCorrWhatsApp (also known as POCWAPP) was developed by Chinese hacker With this program, Whatsapp can be hacked remotely and hackers can hack several accounts at once. For now, the program is compatible with Android only. The app is paid and can be found in DarkNet, POCWAPP can process up to 15 users within 1 connection to the servers. How the program works: To hack WhatsApp with this program, it’s obligatory to have a good Internet connection. it identifies the user by the phone number and finds their id number in the server, bypassing the device and cloud storage. It analyzes the size of the whole chat history (with all media files), excluding the content of voice calls. Further, the app uploads the data to its temporal server and decrypts it. Once uploaded, every user’s chat history is available for saving on your smartphone. The device owner has no idea that the copy of their chat history has been leaked from the server and keeps using the messenger. Apparently this is the only method that has worked for me since they all require physical access to the target device one way or the other. DISCLAIMER: The answer provided is intended to be used and must be used for informational purposes only.
  • Rooting your Android device gives you unlimited possibilities to play with. However, it’s not something that phone developers want you to do. It could be very dangerous for your phone and can cause irreparable damage. When a device is not rooted, you can’t do anything wrong – mainly because the system is made so that it doesn’t allow you to modify any crucial files. When you root it and get ultimate control over it, it can be dangerous because you have access to stuff that you were not meant to have access to. If you know what are you doing, it can be very useful and interesting. However, if it’s your first time don’t rush, and pay a lot of attention at what you are doing. There are a few methods of rooting an Android device, and we’ll talk about it right now. BEST SOFTWARE FOR ROOTING ANDROID DEVICE Whether you want to root your device with or without using a PC, you will still need some software. After you have done certain “preparations” for rooting your device, the software will do the rest. Rooting a device opens up various possibilities So, why different software? Basically, not every app supports every device. Or even the system version. Ones of the most popular apps are iRoot and KingoRoot for rooting by using a computer, and King Root and One Click Root App to root without using a computer. If you are not sure how to root or which app to use, check out our guide about Best Android Root Software. It can help you a lot if you decide to root your software and all the steps are explained briefly and clearly. How to Root Android TV Besides being able to root mobile devices and tables, you can also root Android TV....
  • If you have no physical access to the WhatsApp phone, click Easy way to hack WhatsApp without touching the phone. In a connected world, Whatsapp plays a crucial role in keeping people together. With its simple to use interface, young people are one of its frequent users.  This allows them to keep up-to-date to what matters to them and who they care about. Instant messaging apps have revolutionized the way we communicate. They are called this because one is almost able to receive an instantaneous response to the messages they send. This feedback gap being bridged has solved a lot of problems in communication. How can I monitor someones WhatsApp messages But as with everything that is used for a good purpose, there are ways this revolutionary app has been used to hurt someone. Social interaction is a must for the human species so it is not out of order when two people get together to better their lives.  Relationships play a vital role in truly making the human life memorable and it has really impacted us. But the introduction of a social world has made a basic human need a complicated issue. Suggested: Easy way to remotely read someones WhatsApp messages How to hack someone’s WhatsApp using chrome Relationships used to be difficult due to the fact that lovers couldn’t stay in touch. Two people meet and once they like each other the chances of one of them cheating on the other was slim due to the difficulty of meeting people. Technology was created to arrest this situation and it seemed to be effective. But even its positives have exposed us to a greater challenge. Couples recount occasions where they find out their significant other communicating with someone else. This usually brings up issues and may ultimately lead to...