Exploit Android – Kali Linux 2018.1 (full course) (Tutorial)

All information contained in this site and all software provided by it are intended solely for the purpose of helping users to secure their online privacy from eventual cyberattacks. Such information and software do NOT constitute professional advice/services, are indicative and provided for educational use only. The site does not guarantee their accuracy or completeness. The use of such information and software for any purpose other than the abovementioned is strictly forbidden….


  1. Thanks u. Must the victim phone and my pc should have the same internet connection? Please tell me

  2. 31:42 Where does the File Manager.apk come from does it come from installing that kwetza file or did u create the payload yourself name it that and then mix it with that file appreciate a response๐Ÿ˜

  3. Can some give me the link of trojan.apk file.
    Tere are n number of trojan.apk file

  4. ๐ˆ ๐ ๐จ๐ญ ๐ฌ๐œ๐š๐ฆ๐ฆ๐ž๐ ๐ญ๐จ๐จ ๐ฆ๐š๐ง๐ฒ ๐ญ๐ข๐ฆ๐ž๐ฌ ๐›๐ž๐Ÿ๐จ๐ซ๐ž ๐ˆ ๐ฐ๐š๐ฌ ๐ซ๐ž๐Ÿ๐ž๐ซ๐ซ๐ž๐ ๐ญ๐จ ๏ผ‹๐Ÿญ ๏ผˆ๐Ÿด๐Ÿณ๐Ÿฎ๏ผ‰ ๐Ÿฑ๐Ÿฎ๐Ÿต๏ผ๐Ÿฒ๐Ÿต๐Ÿญ๐Ÿฑ ๐จ๐ง ๐–๐ก๐š๐ญ๐ฌ๐€๐ฉ๐ฉ. ๐ˆ ๐ฐ๐š๐ฌ๐ง'๐ญ ๐ฌ๐ฎ๐ซ๐ž ๐š๐›๐จ๐ฎ๐ญ ๐ก๐ข๐ฆ ๐š๐ญ ๐Ÿ๐ข๐ซ๐ฌ๐ญ ๐›๐ž๐œ๐š๐ฎ๐ฌ๐ž ๐ˆ ๐ฐ๐š๐ฌ ๐ฌ๐œ๐š๐ซ๐ž๐ ๐จ๐Ÿ ๐›๐ž๐ข๐ง๐  ๐ฌ๐œ๐š๐ฆ๐ฆ๐ž๐ ๐š๐ ๐š๐ข๐ง ๐›๐ฎ๐ญ ๐ก๐ž ๐๐ž๐ฅ๐ข๐ฏ๐ž๐ซ๐ž๐ ๐š๐ฌ ๐ฉ๐ซ๐จ๐ฆ๐ข๐ฌ๐ž๐. ๐‡๐ž ๐๐จ๐ž๐ฌ ๐š๐ฅ๐ฅ ๐ฌ๐จ๐ซ๐ญ๐ฌ ๐จ๐Ÿ ๐ฌ๐จ๐œ๐ข๐š๐ฅ ๐ฆ๐ž๐๐ข๐š ๐‡๐€๐‚๐Š๐ˆ๐๐† ๐ˆ ๐ฉ๐ซ๐จ๐ฆ๐ข๐ฌ๐ž๐ ๐ญ๐จ ๐ ๐ข๐ฏ๐ž ๐ก๐ข๐ฆ ๐š ๐ฌ๐ก๐จ๐ฎ๐ญ ๐จ๐ฎ๐ญ ๐ญ๐ก๐š๐ญ'๐ฌ ๐ฐ๐ก๐ฒ ๐ˆ'๐ฆ ๐ซ๐ž๐œ๐จ๐ฆ๐ฆ๐ž๐ง๐๐ข๐ง๐  ๐ก๐ข๐ฆ ๐ญ๐จ ๐ฒ๐จ๐ฎ.

  5. hire a hacker ๐’—๐’Š๐’๐’•๐’‚๐’ˆ๐’†๐’‰๐’‚๐’„๐’Œ๐’†๐’“๐’› ๐’„๐’๐’Ž

  6. your mothed:
    internal ip (PC) connected to internal ip (phone)

    how to connect a external ip PC connect to phone?

  7. the persistent script
    while true
    do am start –user 0 -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity
    sleep 20

  8. is it actually working or not…?? not a single comment that say yes im done it…..everyone hav some error or problem…….

  9. hello
    ย can you help me when the load occurs 0 bytes apk output

  10. Bonjour les gens, je dois vous dire cela. J'ai perdu des milliers de tous ces faux hackers, s'il vous plaรฎt, ne soyez pas une victime pour qui que ce soit, il m'a fallu des mois pour trouver un vรฉritable hacker. CYBERSUREHACKER4HELP … Merci cybersurehacker4help@gmail.com ou par tรฉlรฉphone + 1404-963-0619. Vous et votre รฉquipe รชtes la bombe, le travail que vous avez fait sur les comptes de ma femme รฉtait tout simplement phรฉnomรฉnal! et je ne parle pas seulement de Whatsapp et de Facebook.

Leave a Reply

Your email address will not be published. Required fields are marked *