Checkout our premium app "HiddenEye Plus", which has a host of new features
* Enable screen security lock on your phone.
* Install and launch the app "HiddenEye"
* Set the Security Status to ON.
* Activate the device admin for Hidden Eye and that's it. You are now ready for the action.
HOW TO UNINSTALL ?
* Set the Security Status to "OFF"
* Uninstall the app now.
Sync with Dropbox
All the images that are captured is stored in "HiddenEye" folder within the DCIM folder on your phone. If you have configured Dropbox to sync your Photos folder, then Hiddeneye pictures will also be synced with your dropbox account.
Android detects failed attempts ONLY if passcode has atleast 4 letters or points, so as HiddenEye
This app may not work on all devices, you will need to just try it out and see if it works for your device. Email me if it doesn't work on your device. Does not take pictures on Nexus devices
PLEASE DO NOT LEAVE YOUR ISSUES ON THE COMMENT SECTION AS I CANNOT REACH YOU FOR ANY CLARIFICATIONS. EMAIL YOUR ISSUES TO "email@example.com" BEFORE LEAVING IT ON THE COMMENT SECTION.
Like our Facebook page to stay connected to updates on HiddenEye and other exciting products that we are working on.
Worried that your phone does not have front camera. With HiddenEye, now you can know the someone has tried to snoop into your phone. You can also trigger sound if someone is trying to unlock your phone with wrong password thrice. You will see a place holder image instead of a real picture. If you have a front camera, then you will see the real picture of the intruder.
Once you unlock your phone, you will be shown the photographs of the people who tried unlocking your phone in your absence. Sounds interesting ! Try it and let us know if you have any suggestion to improve it further.
CAMERA = Uses the front camera to picture the intruder.
VIBRATE = Notification Alert generated when wrong password is entered.
INTERNET, ACCESS_NETWORK_STATE = Needs to display Ads on the app.
WRITE_EXTERNAL_STORAGE:Store captured images on the phone, so that its available for you to sync to Dropbox.
• The only VPN that gives you simple direct access to your favorite censored or blocked websites
• Unblocks applications and websites from around the world
• Hide your IP address to browse the web privately & anonymously
• 100% Free
• Switch countries with ease
• Speeds up web browsing
• Reduces data plan costs
Welcome to a Better Internet!
** Hola works by sharing the idle resources of its users for the benefit of all **
• Access sites blocked by your country through an innovative peer to peer network
• Accelerates browsing by choosing the closest and fastest sources
• Reduces data costs
• Lower devise radiation
More info at https://hola.org/faq
If you have any questions and suggestions, feel free and send them to firstname.lastname@example.org
We love to hear from you :-)
Hola Free VPN contains Lightning Browser and is used under Lightning Browser Mozilla Public Licence, Version 2.0. A copy of this license is available at: https://github.com/anthonycr/Lightning-Browser
1. Quick Login via QR Code Scan, available on specific DVR/NVR Models
2. Enabled full frame rate decoding on specific DVR models
3. Support DVR, NVR, IP CAM and VSS
4. Bookmark for devices management
5. Live / playback / event / audio / snapshot
6. 1 / 4 split viewing mode
7. Up to 4 sites viewing
8. Support dual stream
This Application is also a part of HaXdroiD suite which aims to empower the Android handset for Penetration Testing purposes.
Root required for this application!
The fastest, most trusted, and #1 BusyBox installer and uninstaller!
Over 10 million installs and over 50,000 5 Star ratings!
Support for arm and intel based devices, mips support coming soon. (I need a mips device)
Mentioned in the new XDA-Developers book "XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming"
Winner of best Utility Software award for Android via Handster.
This is the only installer that is ad free and requires no internet permission!
The source for this application can be found here: https://code.google.com/p/busybox-android/
Featured on the BusyBox website at: http://busybox.net/products.html
The BusyBox source code can be found here: http://git.busybox.net/busybox/
A must have for any rooted phone! Almost EVERY rooted applications needs BusyBox to perform their magic, if you have a rooted phone then you need BusyBox.
Pro version contains Backup feature (for safer installs), uninstall feature, Advance Smart install feature, the ability to hand pick the applets you want, safety check for missing applets on start, and better overall support. The pro version will receive more frequent updates than the free version will.
Please note I did not write BusyBox! I wrote this installer and cross compiled BusyBox for Android. Please see the about menu option for more details or here: www.BusyBox.net
BusyBox is a software application that provides many standard Unix tools, much like the larger (but more capable) GNU Core Utilities. BusyBox is designed to be a small executable for use with the Linux kernel, which makes it ideal for use with embedded devices. It has been self-dubbed "The Swiss Army Knife of Embedded Linux".
Leave this installed if you always want to get the latest version of busybox!
Have a product question? Ask almost anything using Fixya's mobile app for Android.
Helpful Fixya community members will try their best to provide a solution. As part of the Fixya community, you can help other members with their questions too. It’s fun and helpful!
It’s free and easy to join the Fixya community right from the app!
Recently a new vulnerability was discovered called “Shellshock,” that targets BASH, a popular software widely used to control the command prompt on many *nix computers. Shellshock has the potential to wreak havoc on websites, web servers, PCs, routers and more because it enables hackers to gain complete control of an infected machine, which is bad news for consumers and enterprises everywhere. With this power impacted organizations can suffer from web site attacks, network shutdowns, lost data – not to mention lost customers and the cost of operational down-time spent patching such a vulnerability.
Is my Android mobile device vulnerable to ShellShock?
If you want to find out if your Android device is vulnerable, check out the Zimperium Shellshock Vulnerability Scanner. This app will determine if your mobile device is running vulnerable version of BASH or apps that includes BASH process, which exposes your mobile device to the ShellShock vulnerability.
There are two features of this app:
1) Shellshock Device Vulnerability Scanner: Determines if the device is running BASH.
2) Shellshock App Vulnerability Scanner: Determines if you have any mobile apps on your device that include BASH process.
Zimperium is the leader in advanced mobile threat defense. The Zimperium Mobile Threat Defense Suite delivers enterprise-class protection for Android and iOS devices against the next generation of advanced mobile threats. Developed for mobile devices, Zimperium uses patented, behavior-based analytics that sit on the device to protect mobile devices against network- and host-based threats wherever business takes them. For more information on Zimperium please go to www.zimperium.com.
This application requires that a MOBILedit Forensic must be installed on the PC. It is available for download or online purchase at www.mobiledit.com
In order to start data extraction from an Android phone follow these steps:
1. Install this app which allows a PC to communicate with your phone.
2. Check Enable Wi-Fi Connection
3. Download and run the PC software on your PC from www.mobiledit.com
4. Follow connection instructions in the PC software.
We spent years developing a universal product with the ability to manage thousands of models from all manufacturers including Nokia, Samsung, Motorola, Sony Ericsson, LG, HTC, Blackberry, Apple iPhone and many more.
This extensive project and unique know-how is used by millions of mobile phone users as well as large corporations. It is the gold standard in the world of digital forensics investigation with customers including the FBI, MI5, and U.S. Military.
• IP scan, port scan, Bonjour and UPnP network discovery.
• Support both WiFi and Ethernet scanning on Android device.
• Easy approach of camera default username & password, snapshot, webpage, RTSP stream, etc.
• UPnP port forwarding.
• Fast access to router/network information.
• Add camera to Evercam with one click.
Enable GPS and download Wefi to get hotspots out of range too!
*Directions may not lead exactly to a hotspot - but it will lead to better signal
It also helps you identify all the Permissions used in an app and the Certificate used to sign the app.
'App Scanner' will help you figure out all such components which are exposed to such attacks.
Please find below features of App Scanner.
1. App Scanner has a very simple and nice interface to do component security analysis, permission analysis and certificate analysis of your application.
2. Launch App Scanner and select the application to analyze from list of installed application.
3. Once you select an application, App Scanner scans the application to give the results. Slide the screen towards right or press upper left icon present in App Scanner application to see the results for every Component.
4. App Scanner gives you details of all the Components of an application namely, Activities, Broadcast Receivers, Content Providers and Services, Permissions and Release Info.
5. App Scanner creates a Pie Chart and Bar chart for you to show the Safe components and the vulnerable components.
6. App Scanner gives you Analysis of the scan component wise clearly showing the vulnerable components.
Developers should scan their application by App Scanner before publishing and fix the vulnerabilities to make their application safe and secure.
Security Experts can use App Scanner the best. They can highlight vulnerabilities w.r.t. Intent Spoofing, Eavesdropping, Man in middle attack present in an application, analyze permissions and the sign certificate, prepare reports and give fix recommendations.
Please e-mail, email@example.com for any further clarification. Please give your reviews and ratings for further enhancement/improvement.
Basis des ganzen ist ein Artikel der im Print Magazin Android-User.de unter meiner Mitwirkung entstanden ist und Apps ins Visir nimmt, die mit nahezu krimineler Energie den Play-Store und andere App Stores überschwemmen. Klares und einziges Ziel dabei, BernutzerInnen mit Werbeeinblendungen und PushWerbung zu überschütten.
Die meisten der direkt in diesem Artikel angeführten Apps sind bereits aus dem Google Store entfernt worden, jedoch leben diese Apps in sekundären Appstores weiter und verbreiten sich ungewollt schnell auf unseren Smartphones.
Um Euch eine gewisse Sicherheit zumindest gegen die zur Zeit entdeckten, schädlichen Apps zu bieten, wurde die Idee zu dieser App geboren. Im Grunde eine einfache Sache, von einer vertrauenswürdigen Seite wird eine Liste mit App-Packagenamen geladen und das Smartphone wird danach dahingehend überprüft ob eine der in dieser Liste angeführten Apps installiert ist. Nicht mehr und nicht weniger.
Ihr könnt selber entscheiden, ob ihr die App dann deinstallieren wollt oder nicht.
Internet: Benötigt um die Liste der bekannten Packages herunter zu laden.
Access_Network_State: Notwendig um eine funktionierende Internetverbindung abzufragen.
Link zum Artikel bei Android-User.de:
Link zur Entstehung dieser App:
Mein Dank richtet sich an Marcel Hilzinger vom Magazin Android-User sowie an den Forensic Experten Marko Rogge. Erst diese fruchtbare Zusammenarbeit ermöglichte diese App!
Generally a secure password is hard to remember so users tend to opt for easy to remember passwords. These passwords are also easy to crack. This app aims to address that by allowing the user to use hashes in place of their passwords on various sites.
Example: a user may have a password such as "computer" (a bad one) that would be easily cracked in a dictionary attack.
Where as the md5 hash generated from computer is
df53ca268240ca76670c8566ee54568a which is not easy to guess or dictionary attack.
There are currently four algorithms available in the app. MD5 , SHA1 , SHA256 & SHA512.
This allows the user to use the same password for four different sites and a different hash for each.
For your banking or email you could use the SHA512 hash of your chosen password . In the computer example the hash is
The hashes are automatically copied to the clipboard for convenience. This allows you to easily paste it into an app.
If a database is compromised which is insecurely storing the passwords and your passwords (your generated hash) was obtained . The other three sites (with different hashing algorithms) would be safe.
Using hashes as passwords also makes an attack more computationally expensive as each string (sequence of characters) has to be hashed first before submitting it as the password. Also that factor is multiplied by 4 as the attacker does not know which algorithm you may have chosen.
You could also paste the output of the initial hash as the input with different functions for more options. Just remember the algorithms and the order you chose if you do.
This app respects users privacy and no data is recorded about the user. The permissions are required to serve the ads.
Ein Portscanner zur Prüfung ob gesuchte Ports offen und vom Web aus erreichbar sind.
Gedacht zum Test selbst eingerichteter Webserver, um zu überprüfen ob Router o.ä. die Ports richtig weiter routen.
Achtung pro Port ca. 0,5 Sekunden, d.h. 120 Ports/Minute.
!!! Nur auf eigene Server oder auf Dienste anwenden die zur öffentlichen Nutzung stehen. !!!
Protection against any network attacks, beginning with ARP spoofing'a. You can test the program using any ARP spoofer'om.
-Ability Flexible settings, allowing to optimize the ratio of the detection time / on system resources.
-Auto Off Wifi when it detects an attack carried out on you (configurable in the program).
-Preduprezhdenie The attack (vibration, notification in statusbar'e).
Functions available for unlocking:
Function of "run-and-forget", allows you to add program to startup, as well as to prohibit the system to upload the program from memory. Once running the program, you can no longer worry about personal information.
-Full Off advertising in the application.