eBooks, Software and Downloads




Proxying Newer Versions Of Android With Genymotion

 I did a quick video last night for someone on proxying the newer version of Android SDK with Genymotion as the changes back in version 7 make it a bit more difficult to proxy https traffic and I get a lot of questions on a regular basis even years later... 

Hopefully this video helps anyone else out that may be running into the same troubles.. This is proxying the latest version of android as of this writing which is version 10 but should work just fine on newer versions unless there is a major change in the future again that specifically restricts this method.. 


Mobile Hacking - Proxying Newer Versions of Android with Burp and Genymotion:




You can follow along with the video but additionally for reference below are the commands used: 



Step 1: Create a Burp Cert for Android

  1. Export the certificate from burp to .DER format via the proxy tab import/export

  2. Change the format from der to pem: 

       openssl x509 -inform DER -in cacert.der -out cacert.pem


  3. Pull the hash of the certificate subject name and rename the cert to the hah.0 format: 

       openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1

       mv cacert.pem <hash>.0


Step 2: Create a new Emulator: 

  1. Create a version 10 Galaxy x10 with bridge mode networking (or whatever newest version required)

  2. Click 3 dots under my installed devices in genymotion --> Edit --> Change to bridged mode


Step 3: Setup certificate on device

  1. Check devices and push the certificate to the SD card: 

     adb devices

     adb push <hash.0> /sdcard/


  2. Connect to the device and install the cert with proper permissions: 

     adb remount

     adb shell

     mv /sdcard/<hash.0> /system/etc/security/cacerts/

     chmod 644 /system/etc/security/cacerts/<hash.0>


  3. Reboot the device: 

     reboot


Step 4: Verify and setup the proxy: 

  1. Settings --> search for Trusted --> Scroll down till you see portswigger

  2. Setup your Burp proxy to the correct IP/Port combo of your external interface IP

  3. In Genymotion click Settings --> wifi  --> Gear -> Pencil Icon -> Add in Proxy info under advanced

  4. Go forth and proxy things

Related posts

  1. Hack And Tools
  2. Nsa Hack Tools
  3. Physical Pentest Tools
  4. Hack Apps
  5. Hacking Tools For Pc
  6. Hacking Tools Pc
  7. Hack Website Online Tool
  8. Growth Hacker Tools
  9. Hackers Toolbox
  10. World No 1 Hacker Software
  11. Pentest Tools Url Fuzzer
  12. Hacking Tools Free Download
  13. World No 1 Hacker Software
  14. Hacker Tool Kit
  15. Hacker Tools For Mac
  16. What Is Hacking Tools
  17. Best Pentesting Tools 2018
  18. Ethical Hacker Tools
  19. Hacking Tools And Software
  20. Pentest Box Tools Download
  21. Hacker Tools Apk
  22. Pentest Tools Android
  23. Pentest Tools For Ubuntu
  24. Tools Used For Hacking
  25. Hacker Tools Linux
  26. Hack Tools 2019
  27. Computer Hacker
  28. Hackrf Tools
  29. Hacking Tools For Games
  30. Growth Hacker Tools
  31. What Are Hacking Tools
  32. Pentest Tools Review
  33. Pentest Tools Nmap
  34. Pentest Tools For Windows
  35. Pentest Tools For Mac
  36. Hacking Tools Online
  37. Hacker Tools List
  38. Hack Tools Github
  39. Hackers Toolbox
  40. Pentest Tools List
  41. Hack Apps
  42. Hacking Tools Name
  43. Hack Rom Tools
  44. Hacker Tools Free Download
  45. Pentest Tools
  46. Pentest Tools Linux
  47. Hacker Tools Windows
  48. Pentest Tools Linux
  49. Pentest Reporting Tools
  50. Hacking Tools Hardware
  51. Hacking Tools For Windows
  52. Pentest Tools
  53. World No 1 Hacker Software
  54. Hack Website Online Tool
  55. Pentest Tools Online
  56. Install Pentest Tools Ubuntu
  57. Hacking Tools 2019
  58. Hacker Tools 2019
  59. Kik Hack Tools
  60. Hacker Tools For Ios
  61. Hack Website Online Tool
  62. Pentest Tools For Ubuntu
  63. Hack Apps
  64. Pentest Tools Nmap
  65. Hacker Security Tools
  66. Hacking Tools Pc
  67. Hacker Tools For Mac
  68. Hacking Tools Software
  69. Pentest Tools For Android
  70. Hacking Tools 2019
  71. Pentest Tools Url Fuzzer
  72. Pentest Tools Port Scanner
  73. Hacker Tools Free
  74. World No 1 Hacker Software
  75. Pentest Tools For Mac
  76. Hacker Tools Software
  77. Hacker Tools Online
  78. Pentest Tools Kali Linux
  79. Pentest Tools For Android
  80. Best Pentesting Tools 2018
  81. Hacker Tools Mac
  82. Pentest Tools Framework
  83. Hacking Tools For Windows Free Download
  84. Pentest Tools Kali Linux
  85. Hack Tools For Pc
  86. Free Pentest Tools For Windows
  87. New Hacker Tools
  88. Pentest Tools Website Vulnerability
  89. Hack Tools For Ubuntu
  90. Hacker Tools For Ios
  91. Hacking Tools 2019
  92. Nsa Hack Tools
  93. Hacking Tools 2019
  94. Kik Hack Tools
  95. Hacking Tools Usb
  96. Pentest Tools Android
  97. Hacker Security Tools
  98. Hacking Tools For Games
  99. Pentest Tools Review
  100. Wifi Hacker Tools For Windows
  101. Hacker Tools For Mac
  102. Termux Hacking Tools 2019
  103. Pentest Tools Linux
  104. Free Pentest Tools For Windows
  105. Hacking Tools
  106. Android Hack Tools Github
  107. Hacking Tools Hardware
  108. Hacker Tools For Ios
  109. Tools Used For Hacking
  110. What Are Hacking Tools
  111. Hack Tools For Windows
  112. Hacking Tools Windows
  113. Pentest Tools Alternative
  114. Ethical Hacker Tools
  115. Hacking Tools Hardware
  116. Pentest Tools Website Vulnerability
  117. Pentest Tools Android
  118. Ethical Hacker Tools
  119. Game Hacking
  120. Pentest Tools For Android
  121. Hack Tools Download
  122. Hacking Tools Name
  123. Free Pentest Tools For Windows
  124. Nsa Hack Tools Download
  125. Hacker Tools Free Download
  126. Nsa Hack Tools Download
  127. Hack Tools For Windows
  128. Hak5 Tools
  129. Hacking App
  130. Hack Tools 2019
  131. Bluetooth Hacking Tools Kali
  132. Hacking Tools For Mac
  133. Hacking Tools Kit
  134. Hacker Tools Github
  135. Hack Tools Download
  136. Hack Website Online Tool

IPHONE PLAYERS Vs POCO X3 PRO GAMEPLAY WHICH DEVICE IS BETTER???

Read more


  1. Hacking Tools Software
  2. Hacking Tools 2020
  3. Pentest Tools Port Scanner
  4. Hacking Tools Github
  5. Hacker Tools For Ios
  6. Hackrf Tools
  7. Pentest Tools Windows
  8. Underground Hacker Sites
  9. Physical Pentest Tools
  10. Hacker Tools 2020
  11. Hacking Tools Hardware
  12. Pentest Tools Framework
  13. Game Hacking
  14. Pentest Automation Tools
  15. Pentest Tools Windows
  16. Hacker Tools For Windows
  17. Underground Hacker Sites
  18. What Are Hacking Tools
  19. Pentest Tools Online
  20. Hacker Tools Hardware
  21. Hacking Tools For Beginners
  22. Free Pentest Tools For Windows
  23. Hack Tools For Ubuntu
  24. Termux Hacking Tools 2019
  25. Hacker Security Tools
  26. Hack Tools Download
  27. Pentest Tools Github
  28. Hacker Hardware Tools
  29. Hack Website Online Tool
  30. Hacking App
  31. Nsa Hack Tools Download
  32. Ethical Hacker Tools
  33. What Are Hacking Tools
  34. Hacking Tools Windows 10
  35. Pentest Tools Alternative
  36. Hacking Tools For Windows Free Download
  37. Pentest Tools Online
  38. Pentest Tools Framework
  39. Hacker Tools Linux
  40. What Is Hacking Tools
  41. Hacker Tools
  42. Hacker Techniques Tools And Incident Handling
  43. Hacker Tools Mac
  44. Pentest Tools For Android
  45. Hacking Tools Usb
  46. Pentest Tools Download
  47. Pentest Reporting Tools
  48. Pentest Tools Alternative
  49. Best Pentesting Tools 2018
  50. Pentest Tools For Android
  51. Pentest Tools For Ubuntu
  52. Hak5 Tools
  53. Hacking Tools Windows 10
  54. Hack Tools For Windows
  55. Hacking Tools And Software
  56. Hacker Techniques Tools And Incident Handling
  57. Tools For Hacker
  58. Hak5 Tools
  59. Hacking Apps
  60. Tools 4 Hack
  61. Pentest Tools Find Subdomains
  62. Nsa Hack Tools
  63. Hacks And Tools
  64. Pentest Recon Tools
  65. Computer Hacker
  66. Pentest Tools Kali Linux
  67. Hacker Tools Free
  68. Hack Tools For Windows
  69. Tools Used For Hacking
  70. Pentest Tools Find Subdomains
  71. Hacking Tools Name
  72. Hacker Tools Free Download
  73. Hacking Tools Download
  74. Hacking Tools For Games
  75. Hacker Tools Github
  76. Pentest Tools Review
  77. Pentest Tools Download
  78. Top Pentest Tools
  79. Hack Tools
  80. Hacking Tools Mac
  81. Hacking Apps
  82. Hacking Tools For Games
  83. Hack Tools For Windows
  84. Hacking Tools For Games
  85. Tools For Hacker
  86. Pentest Tools Subdomain
  87. Pentest Tools Review
  88. Hack App
  89. Hacker Tools For Mac
  90. Hacker Tools For Mac
  91. Hacking Tools
  92. Hacks And Tools
  93. Pentest Tools Port Scanner
  94. Hacker Tools For Pc
  95. Usb Pentest Tools
  96. Hack Tool Apk No Root
  97. Hacking Tools For Windows Free Download
  98. Ethical Hacker Tools
  99. Bluetooth Hacking Tools Kali
  100. Pentest Tools Online
  101. Hacking Tools 2020
  102. Usb Pentest Tools
  103. Pentest Tools Open Source
  104. Hack Tools
  105. Hacking Tools For Mac
  106. How To Hack
  107. Pentest Automation Tools
  108. Hacker Tools For Ios
  109. Pentest Tools Download
  110. Hack Tools
  111. Hacking Tools Mac
  112. Pentest Tools Windows
  113. Termux Hacking Tools 2019
  114. Nsa Hack Tools Download
  115. Nsa Hack Tools
  116. Hacking Tools Windows 10
  117. Tools For Hacker
  118. Hacker Tools 2019
  119. Hack And Tools
  120. Hacking Tools Download
  121. Pentest Tools For Android
  122. Hacking Tools For Mac
  123. Hack Tools For Mac
  124. Hacking Tools For Windows
  125. Pentest Automation Tools
  126. Tools 4 Hack
  127. Ethical Hacker Tools
  128. Hacking Tools Free Download
  129. Tools 4 Hack
  130. Underground Hacker Sites
  131. Hacking Tools For Windows 7
  132. New Hacker Tools
  133. Growth Hacker Tools
  134. Pentest Automation Tools
  135. Hack Rom Tools
  136. Tools Used For Hacking
  137. Pentest Tools Framework

New Consulting Series Financial Statement Workshop

 I added a new video to the consulting series playlist today... This is for creating and managing your personal financial statements,  your budgeting of income/expenses from various sources and how to allocate those automatically to investments to build and track over time.... 

If you learn something.. Like and leave a comment...   Cheers... 




More information


How To Pass Your Online Accounts After Death – 3 Methods

The topic of DEATH is not one that most people care to talk about, but the truth is that we are all going to die at some point and everything that we did online is going to end up in limbo if we don't make sure that someone we trust is going to be able to gain access to this information. This is going to be extremely important in order to close it down, or have your loved one do whatever you want them to do with your information. There are many things to take into consideration for this kind of situation. If you are like the average modern person, you probably have at least one email account, a couple of social media accounts in places like Facebook and Twitter. Perhaps you also have a website that you run or a blog. These are all very common things that people will usually do at some point and if you have anything that you consider valuable, you should have a way to leave it in the hands of someone you trust when you pass away.

Pass Accounts and Passwords After Death
Pass Accounts and Passwords After Death

Maybe you have an online platform that has a lot of content that you find useful and important. Perhaps you have even been able to turn some of that content into monetizable material and you don't want this to end when you pass away. This is more than enough of a reason to make sure that your information can be given to someone when you are no longer around.
There have been many cases when all the information has ended up being impossible to recover when a person has died, at least not without the need for the family members to do all kinds of things in order to prove a person is deceased. So here are some ways, you can passyour online accounts/data after death:

1) Making a Safe 'WILL' (or Locker) containing master password.

  1. Make an inventory of all your online accounts and list them on a piece of paper one by one and give it to your loved one. For eg:– Your primary email address
    – Your Facebook ID/email
    – The Bank account or Internet banking ID
    – etc. To clarify, it will be only a list of the accounts you want your loved one to be able to access after you're dead. Just the list of accounts, nothing else (no passwords).
  2. Set up a brand new e-mail address (Possibly Gmail account). Lets say youraccountsinfo@gmail.com
  3. Now from your usual email account, Send an e-mail to youraccountsinfo@gmail.com, with the following content:– dd349r4yt9dfj
    – sd456pu3t9p4
    – s2398sds4938523540
    – djfsf4p These are, of course, the passwords and account numbers that you want your loved one to have once you're dead.
  4. Tell your loved one that you did these things, and while you're at it, send him/her an e-mail from youraccountsinfo@gmail.com, so he/she will have the address handy in some special folder in his/her inbox.
  5. Put the password for youraccountsinfo@gmail.com in your will or write it down on paper and keep it safe in your bank locker. Don't include the e-mail address as well, just put something like "The password is: loveyourhoney432d".
And its done! Your loved one will only have the password once you're dead, and the info is also secure, since it's split in two places that cannot be easily connected, so if the e-mail address happens to be hacked, the perpetrator won't be able to use it to steal anything that you're going to leave for your loved one.

2) Preparing a Future email (SWITCH) containing login information

This method is very similar to the first one except in this case we will not be using a WILL or Locker. Instead we will be using a Service called "Dead Mans Switch" that creates a switch (Future email) and sends it to your recipients after a particular time interval. Here is how it works.
  1. Create a list of accounts as discussed in the first method and give it to your loved one.
  2. Register on "Dead mans switch" and create a switch containing all the corresponding passwords and enter the recipients email (Your loved one).
  3. Your switch will email you every so often, asking you to show that you are fine by clicking a link. If something happens to you, your switch would then send the email you wrote to the recipient you specified. Sort of an "electronic will", one could say.

3) Using password managers that have emergency access feature

Password managers like LastPass and Dashlane have a feature called as "emergency access".  It functions as a dead man's switch. You just have to add your loved one to your password manager, with emergency access rights. he/She does not see any of your information, nor can he/she log into your accounts normally.
But if the worst happens, your loved one can invoke the emergency access option. Next your password manager sends an email to you and starts a timer. If, after a certain amount of time interval, you have not refused the request, then your loved one gets full access to your password manager.
You can always decide what they can potentially gain access to, and you set the time delay.

Why should i bother about passing my digital legacy?

Of all the major online platforms, only Google and Facebook have provisions for Inactiveaccounts (in case of death). Google lets you plan for the inevitable ahead of time. Using the "Inactive Account Manager", you can designate a beneficiary who will inherit access to any or all of your Google accounts after a specified period of inactivity (the default is 3 months).
Facebook on the other hand will either delete your inactive account or turn it into a memorial page when their family can provide any proof of their death, but there is also a large number of platforms that don't have any specific way for people to be able to verify the death of a loved one in order to gain access to the accounts. In either case, you wouldn't want your family to have to suffer through any hassles and complications after you have passed away.
You should also consider the importance of being able to allow your loved ones to collect all the data you left behind. This means photos and experiences that can be used to show other generations the way that you lived and the kind of things you enjoyed doing.
Those memories are now easier to keep and the best photos can be downloaded for the purpose of printing them for photo albums or frames. Allowing them to have the chance to do this in a practical way is going to be a great gesture and securing any profitable information is going to be essential if you want a business or idea to keep moving forward with the help of those you trust.
This is the reason why you need to be able to pass your online account information after death, but no one wants to give access to this kind of information to their loved ones because it's of a private nature and we would feel uneasy knowing that others can access our private conversations or message.

Continue reading


Enhance Your Financial Intelligence

Enhance Your Financial Intelligence

Sign Up For This Life Changing Report

First Name:
Email address:

FAITH FUEL