exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54 RSS Feed

Files

iOS Messaging Tools
Posted Aug 7, 2019
Authored by saelo, Google Security Research, natashenka

This repository contains several tools Project Zero uses to test iPhone messaging. It includes SmsSimulator: an SMS simulator for iPhone, iMessage: tools for sending and dumping iMessage messages, and imapiness: a fuzzer for IMAP clients. See the directory for each tool for further instructions and contact information. This is not an officially supported Google product. These tools were released and presented at BlackHat USA 2019.

tags | tool, telephony, imap, fuzzer
systems | apple, iphone
SHA-256 | fa8f560293640c4759f220069490d2498cf18f75ce1183b3ab8f77dd819585e5
Bitdefender USSD Wipe Stopper
Posted Oct 1, 2012
Authored by Bitdefender | Site bitdefender.com

The operating system your smartphone is running may be vulnerable to USSD commands that could wipe your entire phone. Tapping on a link to a cleverly coded web page could order you phone to reset itself to factory settings and disintegrate all your private data with it. Any Android phone running Phone.apk version 4.1 or lower is at risk and that's the broader base of them. Install Bitdefender's USSD Wipe Stopper to protect against such attacks. Now, once you would tap on a exploiting link, Bitdefender will intercept the wipe command and ask you to decide what to do next. You may, if unsure, dismiss the USSD command.

tags | web, telephony
SHA-256 | 3cd59866b648b42e35402ab278852e5cc8501faa6680e4deda628dc5b5c0a8fc
Defeating The iPhone Passcode
Posted Mar 3, 2009
Authored by Brad Antoniewicz

Whitepaper called Defeating the iPhone Passcode.

tags | telephony
systems | apple, iphone
SHA-256 | 4057ba42acd5baab592ee9f0a9a299e6dee396369e8d1034ae8a86a9271d0b89
iphonedbg-toolkit-1.01.tgz
Posted Jun 17, 2008
Authored by Nicolas A. Economou | Site oss.coresecurity.com

The iPhoneDbg Toolkit is a set of tools that will enable you to delve into iPhone binary reversing. The iPhone Debugger allows you to debug running or newly-created native processes inside iPhone. The Library Loader Patcher will allow to debug iPhone libraries. You can also build a tunnel from your PC to your iPhone through USB.

tags | telephony
systems | apple, iphone
SHA-256 | 0ea5823207e04dbd5830b75e63089a1538555633f849c44b20a82e8b3108af90
alltypes.txt
Posted Aug 24, 2007
Authored by Laurent, Stephane

Text file discussing electronic telecards and GSM.

tags | telephony
SHA-256 | 665bcb4031c8307db3280b95ca54e64a7e4474faf5c0f240288d21a2e5763a73
cuts-0.01.tar.gz
Posted Oct 30, 2002
Site codewar.net

CUTs (cellphone unix terminal) is a procmail hack that allows you to use a normal cellphone's messaging capability as a Unix/Linux terminal from anywhere.

tags | telephony
systems | linux, unix
SHA-256 | 6b97954c1327229ea2592dd4975f3c2479382c79b144dbb644628ef26cc40328
samsung.t300.txt
Posted Sep 25, 2002

How to unlock a Samsung T300 cellphone

tags | telephony
SHA-256 | 95e3fe277638e94a8ff970e63471d9ea5628adfcf47a6652752477cf74c79994
Nfree13A3.zip
Posted Jun 12, 2002
Authored by Svoern | Site u-n-f.com

Alabaster can be used for displaying info and repairing Nokia mobiles. It is also a good start for research purposes. With this tool you can do the following things: - Calculate and list all known EEprom-, MCU-, PPM- and PMM-checksums, Show a lot of information about the mobile, Find and change the security code and calculate valid checksum, Refresh the 5 times wrong entered Security code Counter.

tags | telephony
SHA-256 | a73c46377a6c15d112db7a9ee18ce3ee5b61a2ee10f0279eb7e766955e1c4d94
nextel.auto-answer.txt
Posted May 21, 2002

New nextel phone's auto answer feature is being used as a bug.

tags | telephony
SHA-256 | df8cef0a7972634f7942772a370a80b7759e927d142d8af47d53234858b96e4c
gsm_demystified.txt
Posted May 15, 2002
Authored by Dane-Garrin Balial

GSM Demystified - A basic paper on GSM.

tags | telephony
SHA-256 | 810d243fbbcd7f715eb0c8733a39281b3c365e3cd753bf16017e509e98aa2ddd
intro.cloning.doc
Posted Feb 22, 2001
Authored by Phantom Signal

Cell phone cloning for beginners (microsoft word format) - Covers ESN programming, snarfing, and more.

tags | telephony
SHA-256 | 831de03b395ce65b7e4ca97611198178219d25df9abffacd04c1a8838e4f0228
free-cellcalls.txt
Posted Nov 29, 2000
Authored by Zion | Site fuxx0rs.cjb.net

How to get free cellphone calls in Germany by using a free 800 number.

tags | telephony
SHA-256 | 04f191ab63fa02fc6107a019de5729e2213250b5955684eb3be783e9a9239087
sysid.html
Posted Mar 29, 2000

CellCo system ID listing.

tags | telephony
SHA-256 | 16b4e59f54dab4d17a90b240a231f53ccf261eabc2934acedb7f28d4f67c583a
eric1331.zip
Posted Mar 29, 2000

Ericsson 1331 NAM and Options programming

tags | telephony
SHA-256 | 5565d783a21994ff252552a35c5a41df4a358c2f1d8e4b03a587d9b5c7e49880
eric1341.zip
Posted Mar 29, 2000

Ericsson 1341 NAM and Options programming

tags | telephony
SHA-256 | 5581726504b3518e85d293a9d7644f231d5424da0a2cba812fe198abaf730f88
pana03.txt
Posted Jan 3, 2000

PANASONIC EB 300, EZ542, EZ952 Series NAM programming

tags | telephony
SHA-256 | 7f7b5e312ff19ce6804679cc33fe9ebc7445005bf0c1d7240c89b44fd8914371
pana02.txt
Posted Jan 3, 2000

PANASONIC EB 3500 NAM Programming

tags | telephony
SHA-256 | 99c703e8446705caf7c430f4875f1d128467a317183e564ec19f193661979c1d
p3rom.zip
Posted Jan 3, 2000

P3 rom data

tags | telephony
SHA-256 | 78037cdc1a2cf2d772332dc2d7cc7d4bdf4356b7790d39da13e113847d9658b4
cit-p3.zip
Posted Dec 17, 1999

P3 reprogramming docs and software

tags | telephony
SHA-256 | c049881e4a4b1479977e338d67f8dcb5d99976eb281696258a2099d53acd952b
cmh-333.txt
Posted Dec 17, 1999

Sony CMH-333 NAM Programming docs

tags | telephony
SHA-256 | 8d4c9074e0965a06535e7b53de02b2d066f286017ab773105cfad86f8cc65b2a
cmh333.txt
Posted Dec 17, 1999

CMH333 cable docs

tags | telephony
SHA-256 | 1d5f303205429d222ca2c5b580f93c74549e1f5a38e4c0b96040388c0a19e47c
marsbar.txt
Posted Dec 17, 1999

CMH 333 Mars Bar NAM programming

tags | telephony
SHA-256 | 0e3be6271cd36cfa11d633481929797db7b351d934bacd587dcfe332a4eb39a5
oki-faq.txt
Posted Dec 17, 1999

the oki 900 faq

tags | telephony
SHA-256 | cb6a8f5bb3346bf0c71a401578611e456f74eee354fa12a3686fb6ddd51818ee
oki4712.zip
Posted Dec 17, 1999

4712 modification docs and reprogramming software for the oki900

tags | telephony
SHA-256 | 6844be4a484e481c5257635261daeace197eee88d432b034687184c59f160fc6
oki4715.txt
Posted Dec 17, 1999

more oki 900 docs

tags | telephony
SHA-256 | 19cb40a7c85b7f7dfbc4b2943087e65e20d6527b07ef0b61908fc2ef04360b37
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close