In this post, I’m going to talk about my new library for using NMAP in any Android project. I’ve released the library in my GitHub and Bintray. Using the library, you can use NMAP on non rooted Android device.
Continue reading NMAP in AndroidTOR Android Library
In previous post, I’ve talked about compiling TOR from source in Android and added some helper libraries for starting and configuring TOR. In this post, I’ve created a library based on Tor Binary (version 0.4.4.0) and published in GitHub, JFrog and JitPack.
Continue reading TOR Android LibraryBroadcast Yourself Through Android
I previously created a “HiddenLiveCamera” library for Android. In Github, I’ve received an issue by geminird indicating that phone no responded. I described the reason and geminird asked for live audio stream.
In another post, I’ve wrote about broadcasting media files (such as mp3) using Mixxx and IceCast. In this post, I’ve write about my library and how to use it in Android projects in order to publish stream from Android. The code of the library is grabbed from CoolMic.
Continue reading Broadcast Yourself Through AndroidAndroid Spy Camera
I was researching about Android Malware and their features, compare them. I’ve found that most of them (actually all) do not support live video stream from Android camera, aka Spy Camera, and one that supports live camera, needs an activity. Therefore, I’ve started a hidden spy camera project to live stream video from Android camera to an Rtmp server without activity, named Live Hidden Camera.

Connecting to Hidden Mail Server using Android
My Contribution in K9 Android Mail Client
K-9 is an attractive, open-source email client for Android with support of IMAP, POP3, SMTP, and exchange protocols. Hence, this client does not support proxy feature. This problem is referenced in #704 #980 #2619. In this post I will talk about my contribution in K-9 project by adding SOCKs proxy feature, which can be used for connecting hidden mail services.
In previous post, I described about connecting Thunderbird, an open source email client for PC, to a hidden mail service. In this post I will talk about modifying K-9 mail and connecting Android client to the hidden mail service.
Continue reading Connecting to Hidden Mail Server using AndroidIlam CTF: Android Reverse WriteUp
Ilam CTF has been hold on 23rd Nov 2018. Unfortunately I’ve planned other things for 22-23 Nov 2018 and because of the delay in holding the CTF, I couldn’t attend this CTF.
However, I could download the Android Reverse question for future analysis. And the flag is here:
ilam_ctf_0a095194dbcf4f798751aaafdfb_1db6b2ed339f4698b6b38b5e7ae
But the WriteUP!
T-REX: Playing with Dino!
I hardly play the dino game which is created by Google and is available in Chrome browser for playing while there is no Internet connection. But the game itself is popular and can be found in different platforms. Recently I’ve changed two of them and now cacti and birds are ineffective.
Simple JavaScript Running T-Rex Version
There are lots of free versions of the game. Take Running T-Rex for example. The java script code is pretty formatted and ready to be deactivated!
Medium Android Running T-Rex Version
I’ve faced with an Android version of the game. So started to find where the game finishes. Based on JADX decompiler, the following code was the main part of detecting game over.
Based on Smali Code Injection techniques, I’ve deactivated the functions. Now the Dino can run freely both in JavaScript and Android!
Dino JavaScript (Click to see the animated GIF version):
Dino Android (Click to see the animated GIF version):
ASIS2014: NUMDROID WRITE-UP
I’ve playing with Android CTF questions recently and found this jewelry box. One of the questions was about a numeric one way hash question named NUMDROID. The question was presented in ASIS2014 and here, I write the write-up!
8st SharifCTF Android WriteUps: Vol II
This the second and final writeup of Android challenges which was given in 8st Sharif CTF. I’ve wrote about the team and place in the 8st SharifCTF Android WriteUps: Vol I. The writeup begins …
Onion Harvester: First step to TOR Search Engines
Knowing all possible web paths in the world is the initial step for making a search engine (SE). By means of SE one can analyze the web for the material he/she likes. In normal Domain Name System, each TLD provider (Top Level Domain) can sell or release list of all its domains. As an example .com TLD can sell or release all the domains which are end with “.com“. But the problem is more complicated in TOR (or other hidden service providers). In this post I will talk about my tool named Onion Harvester and how to find initial points for finding hidden services to be crawled.
Continue reading Onion Harvester: First step to TOR Search Engines