I understand that the vid is about identifying hacks within a android phone but wouldnt it be better to actually have a video where you show how to remove those suspicious activities.
@@trueneutral3092 not nessessarly.....if I know what to look for, and have the time to constantly monitor your phone, think outside the box alil..... U might get lucky because they do slip up, and expose themselves. It's best to stay quite tho. If anybody around you has anything to do with your accounts or devices being hacked. THEY ARE NOT GOING TO TELL U FLAT OUT. HOWEVER THEIR BODY LANGUAGE, REPSPONSES, QUESTIONS OR NOT QUESTIONING MOST DEFINITELY WILL WHENEVER U BRING UP THE TOPIC OF HACKED, OR HACKING.....
I dont fully understand this, because I follow this tutorial and had android running in an emulator and I saw the same thing in terms of the user(hacker) does that mean I have been hacked?
Thank you so much for all. What is the procedure to do penetration tests of an API secured by OAuth the latest version in the security side. (Laravel, Spring boot, Nodejs...).
My laptop my Samsung LG, Huawei all have been hacked since the MicrosoftZero Day hack...my website went live on Sept 21.., weirdness happening before but once I used the command prompt to kick them off my laptop they aggressively took over my google email and over write all my apps....after factory reset I have Lazada as a essential app and it says that an unauthorized user has factory reset my phone(I did it?!?!)0 so does someone have a clone of my devices? When I look in google to see if I recognize them all there are my devices names plus the long form of my devices names registering as different devices....it says WebChrome View and Chromecast (I don't have chrome cast) I have been fighting control of my and husband's emails for over a week....I have dropped all my money into trying to get something going online for e-commerce so now I can't afford to have my devices looked at...I'm an average user, I only was able to get them off my laptop from a tutorial adding a new admin. That pissed them off and now I am being barrages...
Can u tell mi how to Make my Android Termux Ask for Permission to Allow or Deny after Typing (termux-setup-storage) its not Asking me so I can't perform any Process using my Phone ,,,, It's also not Generating the Phishing Link to send to a Victim
Great video! But what if I dont have access to a computer to run the terminal? Is there any way that I can detect the hackers using only my android? Some app I can download? Please someone let me know, thanks!
Thanks again... only found you today and have sub + bell. would love to join but $$ for me. I noticed that you used a similar method as you demonstrated way back in 2018 on the pdf exploit. Great to see consistent methods being used. I think you mentioned you had a back end running too so not exactly like the pdf process :) IPhone would be interesting to see. Cheers.
Hello sir, can you hack someone's phone but there is some condition that they do not have to send anything and hack it and see its screen on your phone or laptop, if you can do it then you are a hacker or not.
Bro plz create an video of creating ransomware with Kali Linux with reverse connection with random key for each PC I believe that u will make that video