TAG

Security

How to build Windows Remote Access Trojan? [SOLVED]

After the installation is complete, we can now proceed to install, run and use RAT-el to build a Windows RAT payload. We download the tool’s file from its

By kennedymuthii · 6 min read · Ethical hacking

MobSF: Android App Pentesting [Step-by-Step]

Mobile app pentesting is a crucial process that ensures the safety of data and sensitive information stored in mobile applications. With the rising number of

By kennedymuthii · 5 min read · Ethical hacking

APKHunt: Android App Pentesting [Step-by-Step]

APKHunt is a powerful tool used in the android app pentest. Android app pentest, short for Android application penetration testing, is the process of

By kennedymuthii · 5 min read · Ethical hacking

How to use Andriller - Forensic Tool [SOLVED]

Andriller is a popular and comprehensive android forensic tool that provides a powerful suite of features for forensic experts and law enforcement agencies to

By kennedymuthii · 5 min read · Ethical hacking