• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

Hackode Android penetration tester

Last Updated on May 20, 2021 by Walid Salame 1 Comment

hackode

With the right tools and basic knowledge, anyone can become a hacker on their Android smartphone. With these tools, you don’t have to wear a hoodie or sit in a dark corner, pressing keys like crazy, you can hack wherever you are, waiting for the subway or standing in line at the supermarket.

And this is exactly what Hackode, which contains the perfect set of hacking tools from your Android phone with several utilities designed for cybersecurity experts and network administrators but adapted for ordinary users like you and me.

Ethical hackers and cybersecurity professionals. Hackode contains various modules including Reconnaissance, Scanning, Exploits and Security Feed
This Application contains different tools like:

  • Reconnaissance
    • Google Hacking
    • Whois Lookup
  • Scanning
    • Ping
    • Traceroute
    • MX Records
    • DNS Dig
  • Exploit
    • Tools to be added Soon
  • Security Feed
    • Security news

With some of the modules like Reconnaissance you are able to do some tasks like Google Hacking, allowing you to find the vulnerability from sites using the google dorks.

Options Available In Reconnaissance Module
Google Hacking
Whois Lookup

Google Hacking
This module allows you to find the vulnerable sites using Google dorks

  • PhpMyAdmin
    Tap on the “PhpMyAdmin” button… It will open up a Google search result containing vulnerable sites. This Google dork allows you bypass the admin username and password. You can get information schema tables of vulnerable websites by using this Google query.
  • PhpConfig
    The “PhpConfig” button is to get a Google search result containing vulnerable sites that a may allow attackers to include malicious remote files (php remote file include vulnerability).
  • SQL Injection
    The “SQL Injection” button allows you to get a search result containing sites vulnerable to SQL injection attacks.
  • MySQL Server
    It allows you to get a search result that may help you to get sensitive information of the target MySQL server, uid and password in web.config through ftp.
  • Login Portals
    It allows you to get a search result that contains simple SAMLphp login pages.
  • Passwords
    It allows you to get files containing SQL instructions where the administrator set a password for a database user.
  • Google hacking part is over

Who Is Lookup
Who Is Lookup – This module allows you to gather information about a domain name. Who Is LookUp will provide you the information about the owner of the site, created date, IP addresses, email etc.

Tools available in Scanning
This module helps you to find basic information about the target. It contains the following options for information gathering.

  • Ping:
    It allows you to test the reachability of a host and to measure the round trip time for messages sent from the originating host to a destination device.
  • TraceRoute:
    It allows you to identify the intermediate devices and the connection speed.
  • Mx Record:
    It allows you to get information about the target’s mail server responsible for accepting email messages on behalf of a recipient’s domain.
  • DNS Dig:
    It can be used to find Information about the target website’s DNS server.

you can download Hackode from github page Hackode download

Make sure to Check  Intercepter-NG v2.0 for Android

Filed Under: Android pentesting tools Tagged With: hackode

Comments

  1. Arif says

    January 22, 2023 at 12:07 pm

    Hecker ATM

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023