- Hot
- Active
-
Forum Thread: How to Hack Wireless Password Through MAC Address and IP Address 25 Replies
1 day ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 50 Replies
5 days ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 18 Replies
2 wks ago -
Forum Thread: Mitm attack problem 2 Replies
3 wks ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
4 wks ago -
Metasploit Error: Handler Failed to Bind 40 Replies
1 mo ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
1 mo ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
1 mo ago -
Forum Thread: How to Hack School Website 8 Replies
1 mo ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
1 mo ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
1 mo ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
2 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
2 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
3 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
3 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
4 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
4 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
4 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
4 mo ago
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Hack Android Using Kali (Remotely)
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Gain Complete Control of Any Android Phone with the AhMyth RAT
-
How To: Discover XSS Security Flaws by Fuzzing with Burp Suite, Wfuzz & XSStrike
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
1 Response
Nope. Even if you did get it onto the victim's phone, You would need someone to run the apk file. It's pretty useless if the file's there on its own.
However, what you could do is make a persistent Keylogger (using Metasploit), and send it to him (email, if possible) and let him run it.
Share Your Thoughts