NoGoolag
4.54K subscribers
13.2K photos
6.89K videos
587 files
14.1K links
Download Telegram
Android Tool

Program to manage control Android devices with Fastboot and ADB

Main Features:
Batch and single app installation (.apk files)
Disable, enable or uninstall system apps
Open, force stop or clear data of your apps
Receive and save logs from your device
Install or boot custom recovery or wipe partitions
Save apps list
Always relevant links to firmware and everything you need
And more

https://github.com/fast-geek/Android-Tool

Download - https://github.com/fast-geek/Android-Tool/releases

Telegram channel - @android_tooI

Telegram chat - @android_tooI_chat

4PDA thread - https://4pda.to/forum/index.php?showtopic=1000362


📡 @NoGoolag 📡 @Libreware
#adb #fastboot
PhoneSploit Pro

An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.

https://github.com/AzeemIdrisi/PhoneSploit-Pro

#kali #nethunter #hacking #Metasploit #Android #ADB
Bypassing the “run-as” debuggability check on Android via newline injection | Meta Red Team X –

An attacker with ADB access to an Android device can trick the “run-as” tool into believing any app is debuggable. By doing so, they can read and write private data and invoke system APIs as if they were most apps on the system—including many privileged apps, but not ones that run as the system user. Furthermore, they can achieve persistent code execution as Google Mobile Services (GMS) or as apps that use its SDKs by altering executable code that GMS caches in its data directory.

Google assigned the issue CVE-2024-0044 and fixed it in the March 2024 Android Security Bulletin, which becomes public today. Most device manufacturers received an advance copy of the Bulletin a month ago and have already prepared updates that include its fixes.


#Infosec #Vulnerabilities #CVE #Android #ADB