Advance android hacking and penetration testing
Advance android hacking and penetration testing training
Advance android hacking and penetration testing training
Goal of This Training - First Watch this
Update For beginners 2025
Introduction
Introduction 2
why we are using vps
Installation of java 2
WHAT IS RATS BOTNETS RANSOMEWARE 4
Apk Easy Tool 5
Important tips
Setuping vm
hACKING sCREEN (watch after rat section)
important notice
If you want to Hack Android Using Android
INSTALLATION OF METASPLOIT IN VPS 1
MAKING PAYLOAD 2
RAT 3
RAT 4
RAT 5
RAT 6
RAT 7
SPYNOT~1
SPYNOT~2
MUST WATCH INTRODUCTION PART OF BOTNETS
BOTNET PART 1
botnet part 2
botnet part 3
2 nd BOTENT 4
INTRODUCTION BOTNET SERIES WITHOUT VPS
SETUP PART 1
BOTNET SETUP 2
BOTNET SETUP 3
BOtnet 4
About Admin rights
Amin rights in lemon
Admin rights in Metasploit
Binding Introduction
Binding Topic 1
bindin topic 2
only on spynote
Lazy process to bind apk1
Lazy section 2
1 sec bind
LInk 2
virus in to virus 1
virus into virus 2
class 1
class 2
installing ANdroid Studio
Class 2
what is a keylogger how to make your own keylogger
class 2
class 3
class 4
class 5
class 6 keylogger
class1
class2
class3
class 4
class 5
class 1
class 2
modifying Source code 1
Fixxing forcefully 2
watch it after fixxing problem 3
modifying 4
modifying 5
next section 6
1 Backer Class Introduction
2 Backer Class some files
3 backer class
4 backer class
6 backer class
5 backer class
Inroduction class 1
making spyware class 2
making spyware 3
making spyware class 4
making spyware 5
important note class 6
ransome class
Indroduction
Hacking social media 1
1 How to Make Fake App
2 Hack logins with Fake App
3 Hack logins with Fake App
Class 1
class 2
class 3
CLASS 1
ClASS 2
Class 3
Binding
Class 1
class 2
class 3
1 spynote bind class
3 About ids
2 backer for spynote
cypher injection
1 Mobihook Bind
2 Installing
3 fake app
class 1 bypass AV basic of encryption
class 2 Note
class 1 basic of bypass
class 2 basic of bypass (2)
class 3 basic of bypass
class 1 Manual bypass
class 2 Manual bypass
class 3 Manual bypass
advance manual bypass
Class 1 Encryption
class 2 Encryption
class 3 Encryption
class 4 Encryption
Class 1 Advance bind
Class 2 Advance bind Easy
Class 3 Advance bind
Class 4 Advance Bind
bypass major antivirus run time
introduction
Class 1
Class 2
class 3
Class 4
Class 5
Class 6
class 7
Class 8
banking botnet intoduction
banking botnet class 2
banking Botnet class 3
Banking botnet class 4
banking botnet class 5
banking botnet class 6
Banking Botnet Class 1
banking Botnet class 2
Banking botnet class 3
Watch After Completion of section 1 and section 2
Banking Botnet 1
Banking botnet 2
Banking Botnet 3
solution of botnet builder
Introduction to Service class
2.Tools For Rat Service
3.Service Class on spynote
4.service class on spynote
2.hard to trace
1,vps problrm
1.spymax service
1.mobispy service
Provide Botnet service to your client
encrypt and complete concept
RAT SERVICE MOBIHOK
RAT SERVICE SPYNOTE V5
RAT SERVICE IN SPYAMX 2
EDIT NAMES
Manually add hardware id
introductions
Class 2
Class 3
Class 1 Introduction
Class 2 Installation of tools
Class 3 How to extract any kind of img file
Class 4 How to Extract
Class 5
Cypher rat
1.Fix issue
2.Fix Injection Issue
CLASS 1 Installation
CLASS 2
CLASS 3
CLASS 4
CLASS 5
CLASS 6
CLASS 7
CLASS 8
CLASS 9 UPDATES
1.Modify Source code
2.Modify Source Code
1.Introduction
2.Tools
3.Installation
4.ATTACK
5.mnc-mcc
1.Introduction
2.Modify stub
3.Bypass Google protect
5.Generate Undetectable Pyaload (ANY RATS OR BOTNETS)
4.Generate Undetectable Payloads
6.Bypass AVs For Lifetime
1.Intuduction
2.uninstall backers
3.unistall backer
4.Best vpn
5.Encrypted mails and message service
6.find my device
7.Best Antivirus
8.avoid phishing wifi spoofing
9.Grabbing the geolocation from image
1.Installing Virtualbox
2.Installing Genymotion
3.Binary Protection
4.Installing mobexler
5.Installing mobexler -2
6.santoku configuration
7.Santoku - 2
8.Appuse configuration
9.Appuse -2
10.History of android
11.Android Architecture
12.Amdroid Architecture -2
13.Introduction to ADB
14.Basic ADB Commands
15.Basic ADB Commands -2
16.Android File structure
17.Permissions-1
18.Permission-2
19.Android boot process
20.Android boot process-2
21.Android application build process
22.Static Analysis using JADX
23.Static Analysis using JADX-2
24.Static Analysis using JD-GUI
25.Static Analysis Apktool
26.Static Analysis using Byte code Viewer
27.Static Analysis using Quick-Android Review Kit
28.Diva insecure logging
29.Diva hardcoding issues
30.Diva insecure data storage
31.Diva insecure data storage 2
32.Diva insecure data storage
33.Diva insecure data storage
34.input validation issues part 1
35.input validation issues part 2
36.input validation issues part 3
37.Weak Server side Control
38.Insecure Data Storage
39.Insufficient Transport Layer Protection
41.Poor Authorization and Authentication
42.Broken Cryptography
43.Client Side Injection
44.Security Decisions Via Untrusted Inputs
45.Improper Session Handling
47.Improper Platform Usage
46.Lack of Binary Protections
40.Unintended Data Leakage
48.Insecure Data Storage
49.Insecure Communication
50.Insecure Authentication
51.Insufficient Cryptography, Insecure Authorization,Client Code Quality
52.Code Tampering
53.Reverse Engineering
54.Extraneous Functionality
55.Dynamic analysis - burp suit
56.Dynamic analysis - Burpsuit dashboard and tab
57.Dynamic analysis - Proxy intruder and repeater
58.Dynamic analysis Sequencer Decoder comparer logger
59.Dynamic analysis - Capture Application Traffic
60.Installing mobsf
61.Dynamic analysis using mobsf
62.Dynamic analysis using mobsf
63.Dynamic analysis using Mobsf - 2
64.App testing using drozer
65.App testing using drozer-2
66.Penetesting live apps
67.Pentesting live app-1
68.Pentesting live app
69.Pentesting live app
70.Pentesting live app
71.Pentesting live app
72.Pentesting live app
73.Pentesting live app
74.wait for more advance classes on (Advance pentesting, modding, malware analysis)
practice app.zip
how to download
1.New ANdroid Stealer craxsrat
2.Payload injection process
3.New stealer with same source code
4.PAyload analysis
5.payload Analysis
6.Payload traffic analysis
7.analyze rat traffic
8.Payload strings analysis
9.Reverse Engneering RATS
10.Installing Tools Complete Package to Perform RAT RE
11.Art of Cracking Rats
12.Art of Unpacking Rats
13.Decrypting source code of RATs
14.Cracking Rat 1
15.Cracking Rat 2
16.Future
1.Complete Anonymous while setuping Botnet
2.Setuping Banking Botnet Panel
3.Genetrate Payload for Banking Botnet
4.important points
5.How to Download Tools from Panel
banking.zip
1.Introduction and updates
2.Setting Up Android Stealer
3.Stealing Any social Media or Bank login and Injecting Payload in secure app
4.Monitoring and controlling whole Android Phone
tools
1.Introduction to new botnet section
2.Setting up Botnet Panel
3.Building Botnet apk
4.How attacker steal Credit cards bank accounts ssn email password etc
5.Blackhat methodology-Real World Example
6.Binding Botnet in Complicated apk
7.How to Analyze Payload
8.Analyze Encrypted strings backdoor emails etc
Tools and files
UPDATED TOPICS TOOLS LINK
ALL TOOLS
Anubis 7.0 apk
1.Introduction and requirements
2.setting up Android stealer
3.Injection process
4.Injection Process 2
5,Malware Downloader
6.Bypass AVs and updates
Softwares and tools
1.introduction
2.Hacking 2fa
3.hacking app logins
4.Monitoring
5.important tips
6.New Android stealer
7.Bypass Accessibility settings
8.Apk Encryption
TOOLS
1.introduction
2.seeting banking stealer
3.Generating apk without any errors
4.Generating dropper
5.Banking injections
6.Bypass google play protect
7.Bypass google play protect 2
TOOLS
1.New stealer for android
2.call recording, live screen capture, lock pin and pattern capture
3.How Attacker steals banking credentials such credit cards, email logins, shopping credentials etc
4.How attacker perform Ransomware attack and btc mining attack on victim android
5.importance of Application Manager and adb shell
6.unpacking the rat and removing binded malwares
Tools
1.Introduction to advance banking botnet
2.How to setup hook botnet panel
3.Hook Payload and Auto All Permissions
4.How attacker steal credit cards
5.How attacker steal bank and crypto logins
6.control android using vnc call Forward,keylogger etc
7.Hook builder -1
8.Hook builder -2
9.Hook builder - 3
TOOLS
1.Introduction to this course
2.Why Learning Android Hacking is Important for Everyone_ Especially Ethical Hackers
3.Downloading and Installing VMware Workstation _ Windows ISO for Lab Practice
4.Why Use VMware Workstation for Android Hacking
5.Setting Up a Safe and Isolated Lab
6.Installing Java Jdk and Jre
7.Setting Up an Android Emulator for Practice
8.Installing Metasploit Framework on Windows 10
9.Installing XAMPP for Web-Based Android Testing
1.What is a RAT (Remote Access Trojan) for Android
2.Android Hacking Using Metasploit
3.How Attackers Use RATs to Spy on SMS_ Images_ and Other Data
0.What is an Android Botnet (Web-Based)
1.Setting Up a Botnet to Test _ Simulate Android Hacking
2.Hosting a Botnet on a VPS to Bypass Port Forwarding
3.Building a Botnet Payload for Android Testing
4.Developing Your Own Spyware for Android Security Testing
5.Hands-On Spyware Development for Android
6.Using a VPS as a Hosting Server for Android Botnets
1.What is a Keylogger for Android Hacking
2.Understanding Android Keyloggers and Developing an Android Keylogger to Monitor Keystrokes
Changing the Payload Name _ Icon to Evade Detection
1.What is Binding a Payload in a Real APK
2.How Attackers Bind Malicious APKs with Legitimate Android Apps
3.Binding a Botnet Payload to a Real Application
4.Binding a Metasploit Payload to a Real Application
5.Understanding the Black Hat Approach – How Real-World Attackers Backdoor Applications
1.What is Persistence in Android Hacking
2.How Attackers Maintain Persistent Access to Infected Devices
3.Hiding the Payload from Recent Apps
4.Auto-Starting the Payload via a Fake Calculator App
5.Running the Payload When the Device is Connected to a Charger
6.Executing the Payload When Headphones Are Plugged In
7.Triggering the Payload Through a Secret Dial Code
Extracting Hidden Data from Payload Strings to Trace Attackers and network Analysis
Encrypting APK Payloads to Evade Antivirus Detection
Performing Android Security Tests (Call Logs_ Keyloggers_ SMS Interception_ etc.)
Course resources
Course_File_and_resources-_1
Labs_and_tool_links