How to turn your Android phone into Spy phone

Now days almost everyone has a  Smartphone and  most of us choose Android and are eager to get  some extra ordinary features in our mobile.Ever imagined yourself as a character in a James Bond movie where the bad guys are lurking around corners waiting for the right opportunity to grab you and take you to their secret hideout? Okay, maybe not. But if you did, you’d probably have a lot of fun with today’s post, where we look into some apps made for spying with your Android Phone.

How to turn your Android phone into Spy phone

How to turn your Android phone into Spy phone
How to turn your Android phone into Spy phone

In this article i am going to share some Apps through which your Smartphone can also act as a Spy phone 😀

When you need to secretly monitor room without exactly being in that room this situation is generally called a Hidden spyr camera and You can also use this app for ip webcam, wireless camera, spy cam, video streaming, broadcasting, ip camera, wifi camera, audio streaming, nanny cam, security camera, ipcam etc .

You can use an app called SpyPhone to take photos, record videos and audio without any interface. Good if you don’t want people to know that you are capturing.

This app is suitable for you when you need to record phone calls. Unlike most Call Recorders that simply record the call audio from your Microphone (at low volumes) Android Call Recorder is designed for REAL CALL RECORDING, which results in audio from both sides of the call on compatible devices.

Everyone wants to track bad guy , its a common feature in smartphone to show your GPS location and what if you want to use your phone to track someone else GPS location. So here is an App for you which remotedly controls your Android phone from the internet or by SMS.

Also Planting a bug in someone’s room to hear his conversation , its an important tool and make your phone as Remote recording Device


Everyone needs the ability to call anonymously where the phone number is hidden and the voice is  changed as well. Its features like spoofing, voice changing, and background noises is sufficient to make your Smartphone as Spy phone.



List of operating systems used in mobile phones

While i searching about some operating system used for hacking then i got a idea to write a post about list of operating used in mobiles. Many of us having vast knowledge about Mobile phones and their features. But very few know about the operating system used in mobiles

So here is the list of some Operating system used in mobile phones

  • Android


Android is the name of the Linux based operating system that is backed by Google and the other members of the Open Handset Alliance. Because of Android’s open source nature, Android based smartphones should be cheaper to produce than those that use operating systems.

And there are various mobile which used this operating system And some top smartphone which use the same platform like Sony xperia , HTC Desite , LG optimus etc

  • Apple iOS

apple symbol

Apple released the iOS operating system which is used in iPhone was launched on 29th June 2007 when the iPhone was developed. Since then there were many updates of iOS and the latest one is the iOS 6. Apple iOS is unique and is only for Apple iPhone & iPad and no other manufacturer can use this operating system platform.

Some of the latest Windows Phones are iPhone, iPhone 2G, iPhone 3G,  iPhone 4, iPhone 4S, iPad, iPad2, iPad3.


  • BlackBerry OS

blackberry symbol

Blackberry OS developed by Research In Motion (RIM) and was released in 1999. BlackBerry Os is running on every smartphone which is designed by RIM and the strange part is that Blackberry OS is totally dissimilar from other operating systems.

Some of the latest Phones are Blackberry Bold, Blackberry Curve, Blackberry Torch.


  • Windows OS

windows-icon-window operating system mobile

Windows OS is widely known OS as this is used in our desktop and Laptop computers but not everyone knows about Windows OS in detail because it is used in computers all over the world, but Windows OS running on Computer and mobile phone are totally different things.

Some of the latest Windows Phones are Nokia Lumia 800, Nokia Lumia 900, Samsung Focus, HTC Titan 2.




Symbian OS is formally the possessions of Nokia. If any company wants to work on this OS will have to take consent from Nokia. Nokia was a leader in the mobile market, so after Java symbian was ultimately widely used mobile phone some time ago when iOS and Android were not in the picture.

Some of the latest Phones are which using above operating system is Nokia E6, Nokia 808 , Nokia 701,  Nokia C 6.




Exactly like Nokia Samsung also has own operating system named as BADA. It was intended for high and Low end smartphones. Bada is a user friendly, effective & efficient operating system, Strange thing is that Samsung do not use Bada OS on a big scale for its handsets instead Samsung too uses Android on a immense scale for some unidentified reasons.

Some of the latest Phones are which using above operating system is Samsung Wave, Samsung Wave2, Samsung Wave3.


Palm OS (Garnet OS)


Palm OS was created by Palm Inc in the year 1996 in particular for PDAs (Personal Digital Assistance) and is used my many huge companies like Lenovo and IBM. Palm OS was originally intended to work on touchscreen Graphic User Interface. It was updated few years later and was able to work with and sustain smartphones. Unluckily Palm OS was not able to do well in the market & due to that it is not being used in any of the latest top devices.

Open WebOS

Open WebOS -logo

Open WebOS or Hp WebOS or just WebOS which was originally created and promoted by Palm Inc in the year 2009 but years later this OS was acquired by Hewlett Packard. At that time this OS was used in several Smartphones & tablets.



Nokia & Maemo both companies came together to create an operating system for smartphones & internet tablets, named as Maemo. Similar to other devices the user interface of Maemo also contains a menu which provides user an access from which the user can go to any location.



MeeGo was fundamentally called as a mobile platform but it was in reality intended to run several electronic devices which includes handhelds, in car devices,

television sets & in even net books. All the devices on which MeeGo OS can operate although have the similar core but difference lies entirely in the interface according to the device.

There are more Mobile Operating systems and if rumors are to be believed then we we’ll be lucky enough to see Firefox Mobile. Android has emerged as an undisputed winner, nevertheless, if we compare in terms of profits & expansion, Apple iOS has emerged as the biggest Tech company which leaves Google Android far behind.

How to Change Dynamic IP Address to Static Address or How to get Free static IP Address

Wish you all a very Happy New year !!
Most people have a dynamic IP-address that changes every time they restart the computer or connects to the Internet. there are plenty of reasons why we need static IP like  Creating a remote IP address is a safe way to host internet games and servers without the hassle of possibly being hacked , Static IP is used for Trojans , Creating website etc .
Static IP which is really very expensive for a normal person to have. Here we will discus how we can counter this problem.

How to Change Dynamic IP Address  to Static Address or How to get Free static IP Address

How to Change Dynamic IP Address  to Static Address or How to get Free static IP Address
For this we will use DNS redirect service from

First of all register with by clicking on “No-IP Free” on home page. After you complete registration form They will send you an confirmation e-mail, once confirmed, then you can log in to your account.
Now click on “Hosts/Redirect”, then type the host redirect name you want to which Dynamic DNS will redirect traffic after associating your IP. Let other options remain as it is if you don’t know what they do.
Now create your host name. Now download “Download Client”. After installing DUC client type your e-mail address and password.
To check its working or not, type and check your IP address now ping the host name you created both will have same IP address.
How Its work ??

A dynamic DNS host name is linked up to the user’s dynamic IP address. Whenever the IP changes a dynamic DNS client will send an update to No-IP with the current IP address and then No-IP propagates the DNS change to the Internet within seconds

Alternative of

Keep visiting 🙂

Android Games Hack

Todays Tutorial is on Android games hack, Here i am going to tell you some tips and tricks using  which you can skip some processes , regain life  , get infinite points , bonus , power etc.It totally depends on  the game, the hacked app and how the tools react to the  gaming apps.Good luck for your games guys. !!

Android Games Hack

The following are the best OS android games hacking tools which I have found till now, If any wise chap out there knows anything else regarding the same, please do share with us. And the topic of this post can be  Android game hack Gun strike,Android game hack temple run, Android game hack jet pack joyride, and Android game hack subway surfers

1. SBGameHacker – Download Link
2. Game Guardian – Download Link
3. GameCIH – Download Link
4. Game Killer – Download Link

Video tutorials on how to use the game hacking tool can be found in this – Youtube Channel

Some features you can edit through these can be

  • Game Cheat/Memory Editor/Crack/Hack Tool
  • Change Game Speed


Its applicable only for ROOTED devices

You will become a TOP  ranker in any game! You could modify the game state(score, money, HP, …) to allow for infinite lives, invulnerability etc.

These App allow you to change the values of your  game coins/money. It works great, I’ve used it with gun strike, temple run, jet pack joyride, and subway surfers. Just make sure that if it’s a game that can be  played online, turn your data and wifi off or it will not work!!

If that’s a sever sided game you’re most likely out of luck

Android Wifi Hacking App

I am gonna tell you about some  Android Wifi Hacking App . That’s right, you can hack stuff right from your phone… if you know how. And you thought hacking could only be done on computers, Silly! The world is changing and now you can bring some of your hack ninja skills wherever you go. Of course, this list is provided for purposes of education, awareness, and knowing your enemy’s arsenal. Earlier we posted some Hacking Apps for Android so check that post too.

Android Wifi Hacking App

Earlier i shared some  hacking apps for android so today i share some Android Wifi Hacking App which is can be used for checking the security of your own router, Since most EasyBox routers have a vulnerability, it is possible to calculate the default password.

Android Wifi Hacking App

  • Wifi kill

Well, with this app you can disable internet connection for a device on the same network. So if someone (anyone) is abusing the internet wasting precious bandwidth for a Justin Bieber videoclips you could just kill their connection and stay happy with a full bandwidth just for yourself. Although this has the potential to be a dangerous tool in the wrong hands (re: any hands that aren’t your own).

here downlink for Wifi Kill

  • Wifi unlocker 2.0

Its a noteworthy Android Wifi Hacking App , the app is easy to use and you have want to be a tech geek to unlock or crack the wifi networks around you. its a tool which can be used in any circumstances to crack wifi network and let you surf the web for free.

here downlink for Wifi Unlocker 2.0

  • Router keygen app

Its works with almost all Router/Wifi. His dictionary a 66Mb single file, which efficient than anything else available market. T should be downloaded SD card, though select the folder where menu. Alternatively use connection instead dictionary. T can be activated settings menu. natively the key although take about 2 minutes powerful phones and about 10 seconds Samsung Galaxy S

here downlink for Router Keygen

  • WiFi Keygen

It calculates  the default passwords, WiFi keygens shows you the WiFi router from your environment and the respective signal strength. Its also shows you immediately the compatible routers. This can be seen in a color-coded tick

here downlink for Wifi Keygen

  • Penetrate Pro

Penetrate Pro is an excellent Android app for WiFi decoding. its is an excellent Android app that calculates WEP / WPA keys for some wireless routers. Also, no advertising and 3G routers searchbased on Thomson.

here Download Penetrate Pro 2.11 (APK)

  • Wifi Leaks

Wifi Leaks is an applicattion similar to Router Keygen that allows to decipher any WiFi router that is within our reach protected with the WPA protocol.

Download Wifi Leaks

I hope you enjoy this little overview of some Android Wifi Hacking App. Obviously this list is far from comprehensive … hey but may be you want to drop some other Android Wifi Hacking App so plz you are most welcome in comment section. Read our other post on Hacking Apps for Android.


Hacking Apps for Android

Now a days beside a Computer , Mobile is used for accessing Social networking site , mail , watching videos , etc. Most of the users are noobs as security point of view. So mobiles users become soft target for Hackers.The risk of hacking by using mobile devices is very common and people are developing and using different apps (application) for their hacking attack. This give me idea to give you concise list of Hacking Apps for Android. I try to cover all Apps with their download source link.


Hacking Apps for Android

List of Hacking Apps for Android

  • AnDOSid

The DOS tool for Android Phones , its fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.

here are the download Andosid apk link

  • Faceniff

FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.

It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK). It’s kind of like Firesheep for android. its simply a Session hijacker for Android
  • The Android Network Toolkit

In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

here are download link for Android Network Toolkit

  • SSHDroid- Android Secure Shell
Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like “terminal” and “adb shell”).
Here download link for SSHDroid- Android Secure Shell
  • dSploit

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device. Once dSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing

Ported Tools

OpenSSH 5.1p (
Nmap 6.01 ( )
Ncrack 0.4ALPHA ( )
ccrypt 1.10 (
curl 7.29.0 (
RTMPDump (
John The Ripper (

File Type: 7z ssh.7z – [Click for QR Code] (786.8 KB, 887 views)
File Type: 7z nmap.7z – [Click for QR Code] (1.31 MB, 944 views)
File Type: 7z ncrack.7z – [Click for QR Code] (471.3 KB, 1016 views)
File Type: 7z rtmpdump.7z – [Click for QR Code] (47.9 KB, 655 views)
File Type: 7z ccrypt.7z – [Click for QR Code] (55.5 KB, 644 views)
File Type: 7z curl.7z – [Click for QR Code] (190.5 KB, 606 views)
File Type: bz2 john-1.7.8-android-1.tar.bz2 – [Click for QR Code] (785.2 KB, 998 views)

Earlier i was share about Android Wifi Hacking Apps

Hacking Apps for Android

Hacking Apps for Android

The open source nature of Google’s OS means there are plenty of fantastic apps for Android to be found. And most of the good stuff on Android is free, thanks to the work of developers who do it for love alone. Out of 10 people , 7 people are using so its really a challenging for android user to have something different in his/her mobile.


Hacking Apps for Android

Many people searching for Hacking Apps for Android , many of you thinks besides rooting its also a other way to have something diffrent from other android users. We’ve been pruning and trying to  give you some Hacking Apps for Android.

Hacking Apps for Android

  • APK Tool

It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.

here link for all version: APK Tool

  • WanamLite Rom

This Application let you customize your Samsung Android 4.2+ Roms Odexed and Deodexed, it brings to you many useful features: Call Recording 4 Ways Reboot (Reboot, Recovery, Hotboot, Download) Full Color/Transparency customization for Status bar etc,

here direct link : WanamLite Rom

  • APK Manager

Apk Manager is one of the easiest tool to hack & modify any Android application.

Whether you’re doing basic image editing or editing the smali or xml files, on average u have to use (Brut.all or JF’s smali/baksmali) awesome tool to extract the apk, edit it, then sign the apk and then adb push/install it. This process is quite tiresome if you are testing a method that needs fine tweaking.

here direct link: APKManager

These are the apps which mostly used for hack or modify other apps. check our other post on Android Wifi Hacking App

How to access blocked sites ? Best solution.

In this article i am gonna show you how you can access blocked sites.

The current trend in Universities and Organizations is that they block our internet access .They do so so that we don’t access unsuitable content, by mistake or intentionally.They can save their precious bandwidth behind this mask.But all of us have a right to access and enjoy internet to its fullest.Who are they to decide what we should access and what shouldn’t.We have download limits,torrents are blocked and so on.Most of us have probably used or some other proxy to access blocked sites.But what about a file download or torrent?. Now here is the solution to access blocked sites.

To access blocked sites first you have to download a software which is called vidalia.

To get this software

access blocked sites

Alexa Traffic Rank for 8,405

Download linux version of this software if you have linux type operating system on your machine.

To access blocked sites Install the software on your machine

How to access blocked sites ? Best solution.
How to access blocked sites ? Best solution.

Run the software, go to start->all programs->vidalia bundle->vidalia.

You will see a onion like icon in quick launch bar on your windows bottom right corner.Click on that icon.You will see a window similar to the above one.

Click on start tor on tor window.Be sure that you are connected to the network of your organization or institute.Wait until the message on tor window changes to connected to the tor network.Now you are done.All you have to do is to change the connection settings of the program which has been blocked to the settings given below..



Example to use bit torrent

go to start ->all programs ->bit torrent->options ->preferences->connection

in right window under proxy server enter for proxy and enter 9050 for port.

Now download any file through torrent protocol.

we can use messengers if they are blocked

for Eg to configure gtalk go to start ->all programs-> google talk->google talk.

click on settings on gtalk window.Go to connection and in the right window that displayed

click on use the following proxy.Enter for host and enter 9050 for port.Click ok.

Now sign in in gtalk using your id and password and start chatting with your friends or relatives.

We can use our browser to access any blocked website.for firefox vidalia automatically installs a addon.To access blocked sites using firefox click on the bottom right corner of the firefox window where it is written tor will see it changing to tor enabled when you click also changes its color from red(disabled state) to green(enabled state) .Now you can freely access blocked sites.

Youtube Commands – Hacking Tricks or Youtube Hacking

Many people got shocked when they heard the term Youtube hacking and many newbies search for this term to finding a youtube tricks.
Exactly Youtube Hacking is just like Google Hacking. For desired result we use appropriate or specific command on Google and using of these keyword is Known as Google hacking. Similar to Google Hacking  there are also some command which used on youtube and such command called Youtube hacking.
Youtube Commands - Hacking Tricks or Youtube Hacking
Youtube Hacking

So here are 10 you tube Commands

1. channel – This Searches only YouTube channels

2. this week | today | this month – Searches videos uploaded in the given time frame.

3. partner – Searches for video uploaded by YouTube partners only.

4. movie – Searches for full length movies available on YouTube.

5. hd – Limits only HD quality videos.

6. 3d – Limits only 3D videos.

7. playlist – returns only videos in playlists.

8. long – Returns videos that are 20 minutes or longer.

9.Do you want to view the adult videos withour loggin in?- Add NSFW before the word Youtube in your URL. eg –

Now the last but not the least trick, through this way you can easily find YouTube videos related to your nearby areas.A new web app ‘Videos Near Me’ has been introduced,by which you can find the videos.Actually this app takes help of YouTube geo-tagging and shows the videos of location that you choose on Google map(in a range of 2 miles).

How to get ‘Videos Near Me’
  • For this first of all go to the link given below:
  • Now you will see Google map on the top.
  • Here select your location by dragging the red marker.
  • After that all the videos in the range of 2 miles of the location that you have chosen will be shown.

Keep visiting 🙂

This information is just for educational purpose. If someone use in malicious activity then only he is responsible for it.

What is Enumeration ??

Enumeration is the next process/steps after scanning and it is the process of gathering and compiling username, machine names, network resources, shares, and services and it also involves in active connections to systems and directed queries.

Why Enumeration is needed – We can get the answer of this question in System Hacking Cycle

system-hacking-cycleSo firstly we have to enumerate users ,crack the password and gain access to the system , Escalate to the level of administrator ,execute application like spywares, rootskit etc then hide hacking tools and source code and finally erase your tracks so that you will not be caught.

Technique For Enumeration

  • Extract user names using win2k Enumeration
  • Extract user names using SNMP
  • Extract user names using Email IDs
  • Extract information using default passwords
  • Brute force Active Directory

Tools Used for Enumeration

  1. Superscan
  2. ENUM
  3. PS Tools
  4. PsFile
  5. Ps Info
  6. Ps Kill
  7. Ps List

SNMP Enumeration – SNMP stand for Simple Network Managemnet Protocol.Managers send request to agents and the agents send back replies, the request and replies refer to a variable accesible to the agent softwares and manager can also sends requests to set values for certain variables.

Trap make the manager aware that something significant is  happened at the agent’s end of the things:

  1. A reboot
  2. An interface failure
  3. or something else that is potentially bad happened
what is enumeration

Management Information Base provides a standard represenattion of the SNMP agent’s avaliable information and where it is is the most basic element of network management. It adds new syntax types and add more manageable object of the MIB tree


Solarwinds – IT is a set of network management tools , the tools set of consist of are Discovery , Cisco tools , ping tools , MIB browser etc.

SNScan – Its a window based SNMP scanner that can effectively detect SNMP – devices on the network.


NTP Enumeration – Network Time protocol is designed to synchronized clocks of network computer. NTP uses UDP port 123 as its primary means of communication.


SMTP Enumeration – Simple Mail Transfer Protocol is used to send email messages as opposed to POP3 or IMAP which can be used to both send and receive message. Its generally relies on using Mail Exchange servers to direct the mail via Domain Name Server.

SMTP Scan – it is used to identify which mail server is used on a remote server especially when banner  obfuscation is taking place.

Web Enumeration – Hyper Text Transfer Protocol is used to World Wide Web to display and distribute the information.

Hope you are enjoying our Tutorials on Learn ABC of Hacking Keep Visiting !!