Learn Hacking Using Android From Scratch

JAC4L

OF Syndicate
Staff member
Contributor
01 Introduction
02 Weaponizing
03 Installing Kali Linux As Virtual Machine (Optional)
04 Information Gathering
05 Spying
06 Spying _ MITM Method 1 - Bad USB Attack
07 Spying _ MITM Method 2 - ARP Poisoning
08 Spying _ MITM Method 3 - Fake Access Point (Honey Pot)
09 Detection & Protection
10 Exploitation (Gaining Access)
11 Exploitation - Rubber Ducky Scripts
12 Detecting Malicious Files
13 Bonus Section

 

https://mega.nz/folder/sv1SmZJT#ilxDDFoIr4w8V7MCGQ9L6Q