Posts (Latest 10 updated) : Read all

Link List (Edit):
Contents:
  1. Exploiting Mobile Technology
    1. Interesting projects
  _____            _       _ _   _               __  __       _     _ _
 | ____|_  ___ __ | | ___ (_) |_(_)_ __   __ _  |  \/  | ___ | |__ (_) | ___
 |  _| \ \/ / '_ \| |/ _ \| | __| | '_ \ / _` | | |\/| |/ _ \| '_ \| | |/ _ \
 | |___ >  <| |_) | | (_) | | |_| | | | | (_| | | |  | | (_) | |_) | | |  __/
 |_____/_/\_\ .__/|_|\___/|_|\__|_|_| |_|\__, | |_|  |_|\___/|_.__/|_|_|\___|
            |_|                          |___/

Exploiting Mobile Technology

If you didn’t see the rise in popularity of hacking mobile technology, then you are either blind or stupid. Most of us saw this coming well over a decade years ago, and now it is prominently here. Screw hacking their computer, no one touches that shit anymore, target their phone, and you will get somewhere.

Interesting projects

  • https://github.com/AbyssalArmy/GalleryEye