{"id":11972,"date":"2020-12-22T11:59:53","date_gmt":"2020-12-22T06:29:53","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=11972"},"modified":"2020-12-22T11:59:53","modified_gmt":"2020-12-22T06:29:53","slug":"ghost-2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/ghost-2\/","title":{"rendered":"Ghost : An Android Post-Exploitation Framework"},"content":{"rendered":"\n<p><strong>Ghost Framework<\/strong> is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Getting Started<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ghost installation<\/li><li>Ghost uninstallation<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Execution<\/strong><\/p>\n\n\n\n<p>To run Ghost Framework you should execute the following command.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>ghost<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Why Ghost Framework?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Simple and clear UX\/UI.<\/li><\/ul>\n\n\n\n<p>Ghost Framework has a simple and clear UX\/UI. It is easy to understand and it will be easier for you to master the Ghost Framework.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Device shell access.<\/li><\/ul>\n\n\n\n<p>Ghost Framework has the ability to access the remote Android device shell without using OpenSSH or other protocols.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Controlling device screen<\/li><\/ul>\n\n\n\n<p>Ghost Framework has the ability to access device screen and control it remotely using mouse and keyboard.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p>Usage of the Ghost Framework for attacking targets without prior mutual consent is illegal. It is the end user&#8217;s responsibility to obey all applicable local, state, federal, and international laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/EntySec\/ghost\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration. Getting Started Ghost installation Ghost uninstallation Execution To run Ghost Framework you should execute the following command. ghost Why Ghost Framework? Simple and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16630,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","fifu_image_alt":"Ghost : An Android Post-Exploitation Framework","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[156,1321],"class_list":["post-11972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-android","tag-ghost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ghost : An Android Post-Exploitation Framework!!!!<\/title>\n<meta name=\"description\" content=\"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ghost : An Android Post-Exploitation Framework!!!!\" \/>\n<meta property=\"og:description\" content=\"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-22T06:29:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Ghost : An Android Post-Exploitation Framework\",\"datePublished\":\"2020-12-22T06:29:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\"},\"wordCount\":180,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png\",\"keywords\":[\"android\",\"Ghost\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\",\"name\":\"Ghost : An Android Post-Exploitation Framework!!!!\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png\",\"datePublished\":\"2020-12-22T06:29:53+00:00\",\"description\":\"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ghost-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ghost : An Android Post-Exploitation Framework!!!!","description":"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/ghost-2\/","og_locale":"en_US","og_type":"article","og_title":"Ghost : An Android Post-Exploitation Framework!!!!","og_description":"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device","og_url":"https:\/\/kalilinuxtutorials.com\/ghost-2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-12-22T06:29:53+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Ghost : An Android Post-Exploitation Framework","datePublished":"2020-12-22T06:29:53+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/"},"wordCount":180,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","keywords":["android","Ghost"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/","url":"https:\/\/kalilinuxtutorials.com\/ghost-2\/","name":"Ghost : An Android Post-Exploitation Framework!!!!","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","datePublished":"2020-12-22T06:29:53+00:00","description":"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/ghost-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/ghost-2\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-wYNNMSboEuY\/X9vvS5d2tzI\/AAAAAAAAILI\/mQctHD8-8cIaCCUGeT79Xfsaq3rMTnstQCLcBGAsYHQ\/s728\/Ghost%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":9629,"url":"https:\/\/kalilinuxtutorials.com\/ghost\/","url_meta":{"origin":11972,"position":0},"title":"Ghost : Android Debug Bridge To Remotely Access An Android Device","author":"R K","date":"March 10, 2020","format":false,"excerpt":"Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. It Framework gives you the power and convenience of remote Android device administration. Installation cd ghostchmod +x install.sh.\/install.sh Un-installation cd ghostchmod +x uninstall.sh.\/uninstall.sh Execution To execute the Framework you should execute\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11749,"url":"https:\/\/kalilinuxtutorials.com\/awesome-android-security\/","url_meta":{"origin":11972,"position":1},"title":"Awesome Android Security","author":"R K","date":"November 4, 2020","format":false,"excerpt":"A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG - Android application penetration testing guideTikTok: three persistent arbitrary code executions and one theft of arbitrary filesPersistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913Android: Access\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2863,"url":"https:\/\/kalilinuxtutorials.com\/drozer-2-4-4-android\/","url_meta":{"origin":11972,"position":2},"title":"Drozer v2.4.4 &#8211; The Leading Security Assessment Framework For Android","author":"R K","date":"October 1, 2018","format":false,"excerpt":"Drozer 2.4.4\u00a0 is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS. Drozer provides tools to help you use,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1693,"url":"https:\/\/kalilinuxtutorials.com\/ghost-phisher-wireless-attack\/","url_meta":{"origin":11972,"position":3},"title":"Ghost Phisher &#8211; Wireless  &#038; Ethernet Attack Software Application","author":"R K","date":"June 21, 2018","format":false,"excerpt":"Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy various internal networking servers for networking, penetration testing and phishing attacks. Supported OS Ghost Phisher\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9012,"url":"https:\/\/kalilinuxtutorials.com\/injuredandroid\/","url_meta":{"origin":11972,"position":4},"title":"InjuredAndroid : A Vulnerable Android Application","author":"R K","date":"February 13, 2020","format":false,"excerpt":"InjuredAndroid is a vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for a physical device Download injuredandroid.apk from Github Enable USB debugging on your Android test phone. Connect your phone and your pc with a usb cable. Install via adb. adb\u2026","rel":"","context":"In &quot;Android Security&quot;","block_context":{"text":"Android Security","link":"https:\/\/kalilinuxtutorials.com\/category\/android-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11064,"url":"https:\/\/kalilinuxtutorials.com\/hackingtool\/","url_meta":{"origin":11972,"position":5},"title":"HackingTool : All In One Hacking Tool For Hackers","author":"R K","date":"July 26, 2020","format":false,"excerpt":"HackingTool is a all in one hacking tool for hackers. Update Available V1.1.0 Added New ToolsReverse EngineeringRAT ToolsWeb CrawlingPayload InjectorMultitor Tools updateAdded Tool in wifijamming Hackingtool Menu AnonSurfInformation GatheringPassword AttackWireless AttackSQL Injection ToolsPhishing AttackWeb Attack ToolPost exploitationForensic ToolsPayload CreatorRouter ExploitWifi JammingXSS Attack ToolReverse EngineeringSocialMedia FinderDDos Attack ToolsSteganography ToolsIDN Homograph AttackHash\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=11972"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11972\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16630"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=11972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=11972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=11972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}