Advertisement · 728 × 90

Posts by Mobile Hacker

Preview
uConsole Review: A Portable Linux Cyberdeck Mobile Hacker Today we will look at the ClockworkPi uConsole as a pocket‑sized Linux. I will explain what the device is, what comes in the box, how to install popular OS images (Kali, Ubuntu, Arch, RetroPie), how t...

uConsole Review: A Portable Linux Cyberdeck

Tested this device since December - unboxing, OS installs, expansion boards, and a reproducible use case.
Full write‑up here: www.mobile-hacker.com/2026/03/30/u...

2 weeks ago 34 1 2 0
Preview
The First Mobile Hacking Conference Is Coming This March Mobile Hacker The world of mobile security is getting its very first dedicated online conference - and you’re invited! Get ready for summit dedicated entirely to mobile hacking, organized by Mobile Hacking Lab - a ...

First‑ever Mobile Hacking Conference, happening next week — fully online and completely free.
I’ve summarized everything you need to know in one place — speakers, talks, CTFs, giveaways, free courses, and more.
www.mobile-hacker.com/2026/02/23/t...

1 month ago 0 0 0 0
Preview
How to Install OpenClaw on an Android Phone and Control It via WhatsApp Mobile Hacker In this post I’ll show you the exact steps I use to run OpenClaw on Android by installing Ubuntu inside Termux (no root), then launching the OpenClaw Gateway and chatting with it from WhatsApp, Telegr...

How to install OpenClaw on Android and control it via WhatsApp using automated script
Blog: www.mobile-hacker.com/2026/02/11/h...
Installer script: github.com/androidmalwa...

2 months ago 1 0 0 0
Post image

FIRST Ever Online Mobile Hacking Conference.
Free, worldwide online event bringing the mobile security community together for sessions on mobile hacking, AI, malware, forensics, live mobile‑focused CTF with prizes!
When: March 3 and 4, 2026
Register here: www.mobilehackinglab.com/mobile-hacki...

2 months ago 0 0 0 0
Preview
Sapsan Terminal: AI-Powered BadUSB Script Generator - Mobile Hacker Sapsan Terminal is an AI-driven online platform that simplifies payload generation for hardware-based attacks. Instead of manually writing scripts, you can describe your goal in plain language, and th...

Sapsan Terminal: new AI‑powered HID scripting tool that speeds up payload creation and handles the syntax for 15 supported devices (video test)
www.mobile-hacker.com/2026/02/03/s...

2 months ago 0 0 0 0
Preview
Plug, Play, Pwn: Hacking with Evil Crow Cable Wind It’s a tiny hacking implant hidden inside a cable. Plug it into a computer, and it pretends to be a keyboard. Then it starts typing — fast. We’re talking up to 1,000 keystrokes per minute, all automat...

Charging cable that hacks your device

Once plugged in, it can:
-detect OS,
-inject keystrokes,
-controlled over Wi-Fi,
-create remote shell access without network connection of target
www.mobile-hacker.com/2025/12/01/p...

4 months ago 0 0 0 0
Preview
Pi‑hole on Android: Turn Your Spare Smartphone into a Network‑Wide Ad‑Blocker Pi‑hole is a network‑level ad and tracker blocker. Instead of installing ad‑blockers on each device, Pi‑hole runs as your DNS server, intercepting domain lookups and returning a null/blocked response ...

Turn Your Old Android Into a Privacy Weapon!
Forget ads, trackers, and shady link - Pi-Hole is your network - level shield. And guess what? You don’t need a Raspberry Pi. That old Android in your drawer? It’s about to become your portable Pi-Hole server
www.mobile-hacker.com/2025/11/25/p...

4 months ago 2 0 0 0
Preview
WhatsApp by the Numbers: What Anonymized Metadata from a Security Flaw Reveals The dataset originates from metadata published in connection with a security study titled “Trivial WhatsApp Security Issue Exposed 3.5 Billion Phone Numbers.” That research demonstrated how a simple f...

WhatsApp by the Numbers

I dived into anonymized metadata published after a #WhatsApp security issue that exposed 3.5B phone numbers
-Android rules (81%)
-iOS dominates in rich markets
-Monaco = multi-account heaven
-China is niche but enterprise-heavy
www.mobile-hacker.com/2025/11/20/w...

4 months ago 0 0 0 0
Post image

CVE-2025-10184 is permission bypass that affects multiple OnePlus devices running OxygenOS 12–15 (NOT FIXED) with PoC
This vulnerability allows any application installed on the device to read SMS/MMS without permission, user interaction, or consent.
www.rapid7.com/blog/post/cv...

6 months ago 0 0 0 0
Preview
Deobfuscating Android Apps with Androidmeda: A Smarter Way to Read Obfuscated Code I came across a new tool—Androidmeda—that caught my attention. It attempts to deobfuscate decompiled Android code using a large language model (LLMs). I decided to give it a try, and to my surprise, t...

Deobfuscating Android Apps with Androidmeda LLM: A Smarter Way to Read Obfuscated Code

✅As a bonus, example of deobfuscating Crocodilus Malware
www.mobile-hacker.com/2025/07/22/d...

8 months ago 1 0 0 0
Advertisement
Preview
How To Turn Old Android Smartphone into Travel Router With NAS Mobile Hacker It’s not perfect, but it works—a clever DIY project that blends portability, privacy, and practicality.

How To Turn Old Android Smartphone into Travel Router With NAS
www.mobile-hacker.com/2025/07/21/h...

8 months ago 2 0 0 0
Preview
Remote Input Injection vulnerability in Air Keyboard iOS App Still Unpatched On June 13, 2025 was disclosed vulnerability in the iOS version of the Air Keyboard app that exposes users to remote input injection over Wi-Fi. The flaw, documented in CXSecurity Report, allows an at...

Keyboard Input Injection vulnerability in Air Keyboard iOS App Still Unpatched
www.mobile-hacker.com/2025/07/17/r...

9 months ago 0 0 0 0
Preview
Offline, Encrypted, and Private Messaging using new Bitchat Bluetooth App Bitchat app is designed for private, secure communication without needing the internet. Instead, it uses a Bluetooth mesh network, meaning your messages travel directly between nearby phones — no serv...

The first version of Bitchat Android app was published yesterday

It is open-source, private, secure messaging app without needing the internet, that relies on Bluetooth mesh network
www.mobile-hacker.com/2025/07/10/o...

9 months ago 1 1 0 0
Post image

How to Install Gemini CLI on Android using Termux
www.mobile-hacker.com/2025/07/09/h...

9 months ago 0 0 0 0
Post image

Vibe Hacking with Nmap using Android
www.mobile-hacker.com/2025/07/07/v...

9 months ago 0 0 0 0
Preview
Introducing FileFix – A New Alternative to ClickFix Attacks A new browser attack vectors just dropped, and it’s called FileFix — an alternative to the well-known ClickFix attack. This method, discovered and shared by mrd0x, shows how attackers can to execute c...

FileFix – New Alternative to ClickFix Attack
www.mobile-hacker.com/2025/06/24/i...

9 months ago 0 0 0 0
Preview
How to Run ADB and Fastboot on a Non-Rooted Android Smartphone Using Termux Thanks to Termux and the clever termux-adb project, you can run ADB and Fastboot directly from your phone — no computer needed. This guide breaks down how to install it, how it works, and practical us...

How to use ADB & fastboot in Termux without root

You can use non-rooted Android to unlock bootloader, run ADB commands, remove bloatware, flash ROM, or even root another Android
www.mobile-hacker.com/2025/06/16/h...

10 months ago 0 0 0 0
Preview
Stryker App Goes Free: The Ultimate Mobile Pentesting Toolkit Stryker is a powerful mobile app that transforms your Android device into a pentesting workspace. Designed to help you test networks and devices for common vulnerabilities without requiring specialize...

Stryker - Android pentesting app with premium access now free until 2050!
Scan networks, launch exploits, and test web apps—all from your phone
Bonus: includes a list of suggested WiFi adapters and SimpleUSB tool for identifying USB devices on the go
www.mobile-hacker.com/2025/06/12/s...

10 months ago 0 0 0 0
Preview
Seeker: How a Simple Link Can Reveal Your Smartphone’s Location What if someone could pinpoint your smartphone's location and gather detailed device information without you ever installing a malicious app? This is precisely what the Seeker tool is designed to demo...

Locating Smartphones Using Seeker: How a Simple Link Can Reveal Your Smartphone’s Location
www.mobile-hacker.com/2025/06/10/s...

10 months ago 2 1 0 0
Preview
Transform Your Old Smartphone into a Pocket Cyberdeck with Kali NetHunter This setup serves as a convenient alternative to carrying a full-sized laptop or struggling with a smartphone’s virtual keyboard for complex technical tasks. It offers comfortable typing and an effici...

Transform Your Old Smartphone into a Pocket Cyberdeck with Kali NetHunter

Tutorial on how to 3D-print a minimalist palmtop-style case for Google Pixel 3 XL and install NetHunter on it with custom kernel
www.mobile-hacker.com/2025/06/06/t...

10 months ago 0 0 0 0
Advertisement
Preview
Analysis of Spyware That Helped to Compromise a Syrian Army from Within This case demonstrates that effective smartphone espionage doesn't always require expensive zero-day exploits or the development of sophisticated, custom and undetected spyware. Instead, attackers can...

Analysis of Spyware That Helped to Compromise a Syrian Army from Within
👉 Smartphone espionage doesn’t need expensive exploits. Cheap tools like SpyMax with targeted phishing a social engineering can breach even military targets - no 0-days required
www.mobile-hacker.com/2025/06/05/a...

10 months ago 0 0 0 0
Preview
Security Issues Found in preinstalled apps on Android Smartphones Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska, expose users to sig...

Vulnerabilities Found in Preinstalled apps on Android Smartphones

3rd party app installed on a device could misuse vulnerabilities to:
✅perform factory reset of device
✅exfiltrate PIN code
✅inject an arbitrary intent with system-level privileges
www.mobile-hacker.com/2025/06/02/s...

10 months ago 0 1 0 0
Preview
HackRF PortaPack H4M with Mayhem Firmware – A Powerful Handheld SDR Toolkit In the Q4 of 2024, a new SDR (Software Defined Radio) was released: the HackRF PortaPack H4M, shipping with the Mayhem firmware. Whether you’re a hobbyist, hacker, ham radio enthusiast, or security re...

I was playing around with new and smaller HackRF PortaPack H4M.
In a summary blog, you can find what's new with H4M, how to flash it, copy necessary data, and a couple of use-cases.
www.mobile-hacker.com/2025/05/19/h...

11 months ago 2 0 0 0
Preview
Feberis Pro: The Ultimate 4-in-1 Expansion Board for Flipper Zero In a previous blog post, I introduced Feberis, a versatile expansion board that enhanced the capabilities of the Flipper Zero by offering additional communication protocols. Now, I am excited to dive ...

Feberis Pro: I have tested a new 4-in-1 Expansion Board for Flipper Zero
www.mobile-hacker.com/2025/03/31/f...

1 year ago 1 0 0 0
Preview
EvilLoader: Unpatched Telegram for Android Vulnerability Disclosed A newly disclosed in Telegram for Android, dubbed EvilLoader, allows attackers to disguise malicious APKs as video files, potentially leading to unauthorized malware installations on users' devices.

EvilLoader: Yesterday was published PoC for unpatched vulnerability affecting Telegram for Android.
The exploit has been sold on underground forum since January 2025.
✅Don't install external players if requested by received corrupted video file on Telegram.
www.mobile-hacker.com/2025/03/05/e...

1 year ago 0 0 0 0
Preview
Building a Portable Kali Box with Raspberry Pi and Touchscreen In this guide, I will walk you through the process of setting up a Raspberry Pi with a 3.5-inch touchscreen running Kali Linux. This compact yet powerful setup is perfect for on-the-go penetration tes...

How to build portable Kali box with Raspberry Pi and Touchscreen

✅installation process
✅install drivers and switch output to touchscreen
✅allow auto-login
✅enable SSH as root
✅setup virtual keyboard
www.mobile-hacker.com/2025/02/26/b...

1 year ago 3 2 0 0
Preview
Bettercap on Android: A Portable Network Security Toolkit This setup is not only lightweight and portable but also ensures that a pentester can operate in plain sight, appearing as just another person on their phone. In this guide, we'll show you how to inst...

60-pages guide on how to use Bettercap on Android
www.mobile-hacker.com/2025/02/21/b...

1 year ago 2 0 0 0
Preview
Evil Crow RF: A Portable Radio Frequency Device This tool expands your smartphone’s capabilities, allowing you to dive into RF analysis, penetration testing, and signal manipulation—bringing mobile hacking to a whole new level.

Evil Crow RF: A Portable Radio Frequency Device compatible with Flipper Zero Sub-GHz file format
www.mobile-hacker.com/2025/02/11/e...

1 year ago 0 0 0 0
Advertisement

It is lilygo t-dongle

1 year ago 1 0 1 0
Preview
USB Army Knife: The Ultimate Close Access Penetest Tool Whether you want to transform into a USB Ethernet adapter and capture network traffic, create custom user interface for your attacks, or use covert storage devices, the USB Army Knife has you covered.

USB Army Knife: Close Access Pentest Tool

It is capable of remote keystroke injection, VNC, USB network adapter, EvilAP, Marauder, record microphone, controlled over web interface with fancy LCD screen
www.mobile-hacker.com/2025/01/24/u...

1 year ago 0 0 2 0