Android Tool
Program to manage control Android devices with Fastboot and ADB
Main Features:
Batch and single app installation (.apk files)
Disable, enable or uninstall system apps
Open, force stop or clear data of your apps
Receive and save logs from your device
Install or boot custom recovery or wipe partitions
Save apps list
Always relevant links to firmware and everything you need
And more
https://github.com/fast-geek/Android-Tool
Download - https://github.com/fast-geek/Android-Tool/releases
Telegram channel - @android_tooI
Telegram chat - @android_tooI_chat
4PDA thread - https://4pda.to/forum/index.php?showtopic=1000362
📡 @NoGoolag 📡 @Libreware
#adb #fastboot
Program to manage control Android devices with Fastboot and ADB
Main Features:
Batch and single app installation (.apk files)
Disable, enable or uninstall system apps
Open, force stop or clear data of your apps
Receive and save logs from your device
Install or boot custom recovery or wipe partitions
Save apps list
Always relevant links to firmware and everything you need
And more
https://github.com/fast-geek/Android-Tool
Download - https://github.com/fast-geek/Android-Tool/releases
Telegram channel - @android_tooI
Telegram chat - @android_tooI_chat
4PDA thread - https://4pda.to/forum/index.php?showtopic=1000362
📡 @NoGoolag 📡 @Libreware
#adb #fastboot
PhoneSploit Pro
https://github.com/AzeemIdrisi/PhoneSploit-Pro
#kali #nethunter #hacking #Metasploit #Android #ADB
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
https://github.com/AzeemIdrisi/PhoneSploit-Pro
#kali #nethunter #hacking #Metasploit #Android #ADB
Forwarded from Pegasus NSO & other spyware
Bypassing the “run-as” debuggability check on Android via newline injection | Meta Red Team X –
#Infosec #Vulnerabilities #CVE #Android #ADB
An attacker with ADB access to an Android device can trick the “run-as” tool into believing any app is debuggable. By doing so, they can read and write private data and invoke system APIs as if they were most apps on the system—including many privileged apps, but not ones that run as the system user. Furthermore, they can achieve persistent code execution as Google Mobile Services (GMS) or as apps that use its SDKs by altering executable code that GMS caches in its data directory.
Google assigned the issue CVE-2024-0044 and fixed it in the March 2024 Android Security Bulletin, which becomes public today. Most device manufacturers received an advance copy of the Bulletin a month ago and have already prepared updates that include its fixes.#Infosec #Vulnerabilities #CVE #Android #ADB
How to run #ADB and #fastboot in #Termux without root to unlock #bootloader, run ADB commands, remove #bloatware, flash ROM, or even root another #Android
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the app’s private storage — including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB — again, even on non-rooted devices.
Android, use termux-adb command instead of adb
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
#debloat
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the app’s private storage — including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB — again, even on non-rooted devices.
Android, use termux-adb command instead of adb
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
#debloat
Mobile Hacker
How to Run ADB and Fastboot on a Non-Rooted Android Smartphone Using Termux
Thanks to Termux and the clever termux-adb project, you can run ADB and Fastboot directly from your phone — no computer needed. This guide breaks down how to install it, how it works, and practical use cases.