Hacking

55 Publication

? Android phones can be listened to using motion sensors

? Android phones can be listened to using motion sensors A group of scientists from five American universities has developed a side-channel EarSpy attack, with which you can listen to Android devices: recognize the gender and identity of the caller, as well as partially disassemble the contents of the conversation. Wiretapping is proposed to be carried out using motion sensors that are able to ? Android phones can be listened to using motion sensors

Kali Linux Utilities in Thermex - Tools

Kali Linux Utilities in Thermex - Tools In this post, we will consider an interesting utility from GitHub, it contains quite a lot of utilities that can be found in Kali Linux. Nmap, Hydra, SQLMap, Metasploit, ngrok, Kali Nethunter, angryFuzzer, RedHawk, Weeman, IP GeoLocation, Cup, routersploit and so on. All this can be found in this utility. Kali Linux Utilities in Thermex - Tools

Anonymous and encrypted file sharing

AnonX is a program for downloading and uploading encrypted files. The downloaded archive is stored for one week and is subject to deletion from the server. AnonX encrypts (AES-256-CBC encryption) the directory before uploading to the server. The download function requires a download ID and AES password to successfully download and decrypt the archive. The maximum download size in AnonX is 2 GB. Anonymous and encrypted file sharing

We generate a fake identity with a work number, credit card and mail

There are quite a lot of resources for generating a personality, but why are they needed at all? First of all, for registration on sites where you need to specify a maximum of personal information. Such services save you time by generating fake data for you. The main disadvantage of sites for generating personalities is the lack of a real number and mail, because at the time of registration these We generate a fake identity with a work number, credit card and mail