I want to create a .apk payload which as powerful as .exe payload that can take over another running applications that are running in background and lot more.
- Hot
- Active
-
Forum Thread: Free Proxy Servers? 9 Replies
17 hrs ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 day ago -
Forum Thread: 12 Ways How to Hack Any Social Network and Protect Yourself 2018 1 Replies
2 days ago -
Metasploit Error: Handler Failed to Bind 40 Replies
5 days ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
2 wks ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
2 wks ago -
Forum Thread: How to Hack School Website 8 Replies
3 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
1 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
1 mo ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
1 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
3 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago
-
How To: Dox Anyone
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Scan Websites for Interesting Directories & Files with Gobuster
-
How To: Install Kali Linux as a Portable Live USB for Pen-Testing & Hacking on Any Computer
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
Tutorial: Create Wordlists with Crunch
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Use an ESP8266 Beacon Spammer to Track Smartphone Users
-
How To: Log Wi-Fi Probe Requests from Smartphones & Laptops with Probemon
-
How To: Change a Phone's Coordinates by Spoofing Wi-Fi Geolocation Hotspots
-
How To: Brute-Force Nearly Any Website Login with Hatch
Be the First to Respond
Share Your Thoughts