• androidmalware2 Profile Picture

    Mobile Hacker @androidmalware2

    a year ago

    How charging your phone can compromise your data using Juice Jacking attack More info: mobile-hacker.com/2024/04/04/how…

    27 209 904 210K 594
    Download Video
  • androidmalware2 Profile Picture

    Mobile Hacker @androidmalware2

    a year ago

    how not to mix Rubber Ducky mobile payloads 😀 picture courtesy of @JGamblin

    androidmalware2 tweet picture

    0 3 8 2K 0
    Download Image
  • _MG_ Profile Picture

    MG @_MG_

    a year ago

    @androidmalware2 lol

    _MG_ Profile Picture

    MG @_MG_

    4 years ago

    @androidmalware2 lol

    7 106 366 0 86
    Download Video

    0 4 26 5K 1
  • MichK_01 Profile Picture

    Mich01 @MichK_01

    a year ago

    @androidmalware2 Three questions: 1. Is USB debugging enabled? 2. Is the install from unknown sources option enabled? 3. Is the Connect as USB Device option enabled?

    1 0 6 2K 0
  • legyes Profile Picture

    LeGyEs @legyes

    a year ago

    @androidmalware2 Looks like simple USB HID emulation.

    1 0 3 683 0
  • juan_snow1 Profile Picture

    Juan Snow @juan_snow1

    a year ago

    @androidmalware2 Wear protection yall!

    juan_snow1 tweet picture

    0 0 2 196 1
    Download Image
  • X_User_0 Profile Picture

    X User @X_User_0

    a year ago

    @androidmalware2 👀 Always Carry USB Male To USB Female Data Blocker Adaptor

    0 0 1 266 0
  • CryptoGangsta Profile Picture

    Parsia Hakimian @CryptoGangsta

    a year ago

    @androidmalware2 If you hand me an unlocked phone, I can interact with it and install apps on it. I call it the handjacking (oh wait!). Someone pick up that red phone and alert the president!

    1 0 1 86 0
  • Bilalkhan01989 Profile Picture

    Bilal Khan @Bilalkhan01989

    a year ago

    @androidmalware2 Use cable which has only charging option no data transfer option, Moreover it will only work when you unlock the phone. You can charge phone in lock state or switch off with normal cable. As you can see in the video guys unlock his phone then phone start running script.

    1 0 0 220 0
  • itsRohanAgain Profile Picture

    Rohan @itsRohanAgain

    a year ago

    @androidmalware2 In practice will the user not notice their device performing multiple tasks on its own? Or can the flipper run these tasks in background as well?

    0 0 0 53 0
  • MarsTighter Profile Picture

    Mars Tighter @MarsTighter

    a year ago

    @androidmalware2 Yes exactly. no free lunch ;) #CyberSecurityAwareness

    0 0 0 244 0
  • realtime604 Profile Picture

    Martin Zeitler | צייטלר @realtime604

    a year ago

    @androidmalware2 This attack vector is entirely dependent on the user plugging in an already unlocked device ...

    0 0 0 24 0
  • abroncasegura Profile Picture

    _PeLUsA_ @abroncasegura

    a year ago

    @androidmalware2 WTF, how IS posible to install a external APK without the unkown sources option enabled?

    1 0 0 2K 0
  • mymeowmix_ Profile Picture

    me0w @mymeowmix_

    a year ago

    @androidmalware2 Are these payloads/poc's available anywhere for testing and creating awareness?

    0 0 0 146 0
  • DismaltheDevs Profile Picture

    DismaltheDeveloper @DismaltheDevs

    a year ago

    @androidmalware2 If unknown sources were already enabled would the script know to just click install or would it try and enable it if it's already enabled which would disable it. Great work though

    1 0 0 963 0
  • deadstephanietm Profile Picture

    deadstephanie.bsky.social @deadstephanietm

    a year ago

    @androidmalware2 that is an HID attack not juice jacking this is nothing new at all

    1 0 0 67 0
  • dngymng98093442 Profile Picture

    M. Dng @dngymng98093442

    a year ago

    @androidmalware2 @Bot_SaveVideo

    0 0 0 40 0
  • gordon861 Profile Picture

    Gordon Hill 🇬🇧 🇺🇦 #NAFO @gordon861

    a year ago

    @androidmalware2 LTT featured a device to stop this the other day - github.com/cecio/USBvalve Starts at about 8:15 in youtube.com/watch?v=8BxVi6…

    0 0 0 85 0
  • Wedbeforgiven Profile Picture

    ْ @Wedbeforgiven

    a year ago

    @androidmalware2 buy an iphone

    0 0 0 58 0
  • FixTechStuff1 Profile Picture

    FixTechStuff 🛠️ @FixTechStuff1

    a year ago

    @androidmalware2 And of course the flipper zero is not a requirement, a compromised charging station will use another device.

    0 0 0 69 0
  • adhichronique Profile Picture

    CHQ 🦙🔥 @adhichronique

    a year ago

    @androidmalware2 is this working on latest android Os?

    0 0 0 288 0
  • flametwo Profile Picture

    mitcheru @flametwo

    a year ago

    @androidmalware2 i’m not used to mobile hacking but can’t you just like… close the apps while it’s happening?

    1 0 0 718 0
  • Download Image
    • Privacy
    • Term and Conditions
    • About
    • Contact Us
    • TwStalker is not affiliated with X™. All Rights Reserved. 2024 www.instalker.org

    twitter web viewer x profile viewer bayigram.com instagram takipçi satın al instagram takipçi hilesi twitter takipçi satın al tiktok takipçi satın al tiktok beğeni satın al tiktok izlenme satın al beğeni satın al instagram beğeni satın al youtube abone satın al youtube izlenme satın al sosyalgram takipçi satın al instagram ücretsiz takipçi twitter takipçi satın al tiktok takipçi satın al tiktok beğeni satın al tiktok izlenme satın al beğeni satın al instagram beğeni satın al youtube abone satın al youtube izlenme satın al metin2 metin2 wiki metin2 ep metin2 dragon coins metin2 forum metin2 board popigram instagram takipçi satın al takipçi hilesi twitter takipçi satın al tiktok takipçi satın al tiktok beğeni satın al tiktok izlenme satın al beğeni satın al instagram beğeni satın al youtube abone satın al youtube izlenme satın al buyfans buy instagram followers buy instagram likes buy instagram views buy tiktok followers buy tiktok likes buy tiktok views buy twitter followers buy telegram members Buy Youtube Subscribers Buy Youtube Views Buy Youtube Likes forstalk postegro web postegro x profile viewer