Skip to main content

Cool Apps for Rooted Android Devices

Unlike the iOS world, you won’t need to search on undergroundsites or alternative repositories for those tools. In fact, in the official Android Market, you can find interesting and useful applications that can help you enjoy you phone at its fullest potential:
  • Superuser In case the rooting method does not load this app, install it as soon as possible because it is the one that controls which applications can execute commands with root privileges on your device. To allow or deny access, the application displays a pop-up message asking for the permission every time an app requires access to the su binary.

  • ROM Manager In case you want the latestversion of Android on your device by installing a custom ROM, this application is a must-have.It provides all the required management for all the ROMs that you might want to flash in your device (download, delete, install without recovery mode, and update when it is necessary).

  • Market Enabler Many of the applications in the official Android Market are not available globally; some of them are restricted to certain countries, regions, or carriers. Market Enabler is a simple application that changes the SIM issuer code temporarily (it is restored to the original state if the phone is rebooted or set to Airplane mode) to spoof your location and carrier network to the market.

  • ConnectBot This application is the most popular Secure Shell (SSH client) that is also open source. ConnectBot executes shell commands remotely, just as if your device wereconnected to a USB port on your PC and using adb.

  • Screenshot Unlike iOS, Android does not include an easy and fast way to obtain device screenshots. Screenshot offers this functionality; simply shake your device.

  • ES File Manager Now that you have full unrestricted access to the file system, it is time to use an application to copy, paste, cut, create, delete, and rename files, including the ones that belong to the system. ES File Manager is also able to decompress and create encrypted ZIP files and access your PC via Wi-Fi and an SMB or a FTP server, Bluetooth file transfer tool, among other tools.

  • SetCPU This tool customizes CPU settings so you can overclock (improve performance) or underclock (save battery life) the processor under certain configurable circumstances; for example, when the phone is asleep or charging, you can save battery life by underclocking the CPU. But Set CPU is also useful when you need more processing power when executing a resource-intensive application (for instance, a game with graphics that require a great deal of processing). 
CAUTION: Just like any overclocking program, this application could be dangerous because it changes the CPU’s default settings and that could lead to an unbootable kernel. Use it at your own risk.

  •  Juice Defender One of the most importantissues with mobile devices, and especially with Android devices, is battery life. This application helps you save power and extend battery life by managing hardware components like mobile network connectivity, Bluetooth, CPU speed, and Wi-Fi connection.

like us on facebook :-- Grey Hat Hackers

NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.


Popular posts from this blog

Social Engineering Toolkit (SET)

Social Engineering Toolkit  (SET) is an advanced,  multifunctional, and easy-to-use computer-assisted social engineering toolset, created by the founders of  TrustedSec ( It helps you prepare the most effective way to exploit client-side application vulnerabilities and makes a fascinating attempt to capture the target's confidential information (for example, e-mail passwords). Some of the most efficient and useful attack methods employed by SET include targeted phishing e-mails with a malicious file attachment, Java applet attacks, browser-based exploitation, gathering website credentials, creating infectious portable media (USB/ DVD/CD), mass-mailer attacks, and other similar multiattack web vectors. This combination of attack methods provides you with a powerful platform to utilize and select the most persuasive technique that could perform an advanced attack against the human element.

 To start SET, navigate to  Applications  |  Kali Linux  |  Expl…

Cracking Wifi Using :Fern(GUI)


As a part of Kali linux , fern can be directly used from kali linux , i would be recommending the use of kali because while using other linux environments it could be a trouble because while using fern it automatically detects the path of aircrack-ng and python installed , while in other environments it is needed to set it follow the following steps :-->

1.) Download kali linux iso and make a bootable pendrive .....if you dont know how to make bootable pendrive  then follow the steps given in blog of trinity rescue kit

Kali linux iso (amd64) recommended -->here
Link to trinity rescue kit blog --> here

 2.)Open Kali linux Goto Applications-->Wireless Attack--> Fern

3.)Select Interface card wlan0

4.)Double click any where in GUI

5.)Select enable x-terms that you can view that happening ...while through a automated program...

6.)Click on select network

7.)Choose the type of network that is WEP/WPA

8.)I would recommend to add dictonary file .…

Deep Web - Part 1

What is deep web ?

Deep web Aka Invisible web Aka Hidden web are parts of the world wide web whose contents are not indexed by standard search engines.
The surface web also known as Visible web , Clearnet , Indexed web or Lightnet is that portion of the world wide web that is readily available to the general public and searchable with standard web search engines. Level of web where vast majority of internet users are connected to and which is accessible in any nation that does not block internet access.E.g: Social media sites like Facebook, informational websites like Wikipedia, general websites, etc


It is the part of world wide web that is not indexed by search-engines,which is directly accessible and no proxy required. E.g: Google locked results, recently web crawled old content, pirated media, pornography etc
Deep web Aka Invisible web Aka Hidden web are parts of the wo…