Skip to content

Mobile Hacker

  • SAPSAN CYBERSEC SHOP
  • Blogs
    • NetHunter Hacker
      • Introduction to Kali NetHunter hacker series and which NetHunter fits you best
      • NetHunter Hacker I: Installation of rootless Kali NetHunter
      • NetHunter Hacker II: How to install Kali NetHunter on rooted OnePlus 7 Pro
      • NetHunter Hacker III: How to build Kali NetHunter for OnePlus 7 Pro
      • NetHunter Hacker IV: Introduction to NetHunter system
      • NetHunter Hacker V: How to use MAC Changer, KeX and setup USB Arsenal
      • NetHunter Hacker VI: Ultimate guide to HID attacks using Rubber Ducky scripts and Bad USB MITM attack
      • NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android
      • NetHunter Hacker VIII: Wi-Fi hacking using wifite, deauthentication and wardriving
      • NetHunter Hacker IX: Use MANA Toolkit to create Wi-Fi rogue access point and intercept traffic
      • NetHunter Hacker X: WPS attacks
      • NetHunter Hacker XI: Bluetooth arsenal
      • NetHunter Hacker XII: Master Social Engineering using SET
      • NetHunter Hacker XIII: Overall guide to MITM framework
      • NetHunter Hacker XIV: Find exploits using SearchSploit and setup Wi-Fi Pineapple connector
      • NetHunter Hacker XV: Use Nmap for network scanning
      • NetHunter Hacker XVI: Metasploit payload generator in your pocket
      • Kali NetHunter 101: Your Path to Mobile Ethical Hacking
    • Bluetooth
      • Spoof iOS devices with Bluetooth pairing messages using Android
      • Spam iOS, Android and Windows with Bluetooth pairing messages using Flipper Zero or Android smartphone
      • Android Kitchen Sink: Send BLE spam to iOS, Android and Windows at once using Android app
      • Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing
      • Bluetooth vulnerability allows unauthorized user to record and play audio on Bluetooth speakers
      • BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code execution
      • Uncover Bluetooth Vulnerabilities with BlueToolkit
    • Flipper Zero
      • How to detect Flipper Zero and Bluetooth advertisement attacks using Android app
      • How to increase radio range of Flipper Zero yourself beyond 100 meters
      • Bluetooth and Wi-Fi Jamming using Flipper Zero
      • Boost Your Flipper Zero with FEBERIS: 3-in-1 SubGhz, NRF24, and WiFi board
    • RFID
      • RFID Hacking with Proxmark3: Cloning, Emulating, and Standalone Mode
      • Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN
    • M5StickC
      • M5StickC Plus 2 running Nemo firmware: WiFi evil portal attacks
    • TicWatch Pro
      • How to install NetHunter on TicWatch Pro
      • TicWatch Pro: Returning to Factory Firmware
      • Install NetHunter on TicWatch Pro after flashing factory firmware
      • TicWatch Pro as a Keystroke Injector
      • How to install Kali NetHunter on TicWatch Pro 3
    • Vulnerabilites
      • Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
      • WhatsApp trick: Android malware can impersonate PDF file
    • Malware
      • WhatsApp trick: Android malware can impersonate PDF file
      • Locate smartphones using Advertising ID without spyware or exploit
      • Smartphone scareware: cracked screen as a result of virus
    • Cheap Yellow Display
      • Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Display
      • Run Firmware Anywhere: Flexibility of M5Stick Launcher
    • Get persistent reverse shell from Android app without visible permissions to make device unusable
    • Detect Wi-Fi deauthentication attack using ESP8266 and receive notification on smartphone
    • Automated local DNS cache poisoning using Android while charging via computer
    • How charging your phone can compromise your data using Juice Jacking attack
    • Monitoring Android file system with fsmon
    • USB Army Knife: The Ultimate Close Access Penetest Tool
  • About me

Tag: exported components

Automating Android App Component Testing with New APK Inspector

Automating Android App Component Testing with New APK Inspector

mhSeptember 18, 2025September 19, 2025Leave a comment
Security testing of Android apps often starts with identifying attack surfaces. One of the most critical is exported components. These...
Read More

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • December 2025
  • November 2025
  • September 2025
  • July 2025
  • June 2025
  • May 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023

Categories

  • Bad USB
  • bettercap
  • Bluetooth
  • Bug Bounty
  • Cheap Yellow Display
  • Deobfuscation
  • Evil Crow Cable
  • Evil Crow RF
  • Flipper Zero
  • HackRF PortaPack
  • Interview
  • iOS
  • LLM
  • M5StickC
  • Malware
  • NetHunter Hacker
  • OpenClaw
  • Privacy
  • Radio Frequency
  • Raspberry Pi
  • RFID
  • Scareware
  • SDR
  • Social Engineering
  • Termux
  • TicWatch
  • uConsole
  • Uncategorized
  • Vibe Hacking
  • Vulnerability
  • Wi-Fi
Mobile Hacker
mobile-hacker.com