Skip to content

Hacking

Creators of emagnet cannot be held responsible for users usage | EMAGNET

Authors and developers cannot be held accountable. Please read license and terms before continue on this website - IT'S A REQUIREMENT

Since 2018, EMAGNET has been a hot topic among "ethical hackers" who have claimed that EMAGNET devs can be held responsible for the actions of its users. However, it is clearly stated in the readme that developers, including "developers" specifically, cannot be held responsible for what users do.

EMAGNET was created for a legal purpose. This has caused ethical hackers to despise the tool, mainly because it encourages users to use "haveibeenpwned," which censors passwords. The developers of EMAGNET believe this is unjust. They think that everyone has the right to access their passwords or no one should have access. The owner of the project works for Microsoft and took up EMAGNET as a hobby project. It is questionable why they would have permission to access users' passwords and be allowed to sell API access for something that the users themselves do not have access to when searching for their own email.

Hacking Android 12 - Motorola Edition (FRP Bypass)

Screenshot

In this guide, we will explore a method to bypass the Factory Reset Protection (FRP) on Motorola devices running Android 12. Specifically, we will focus on devices that have the GBoard app from Google pre-installed as the default keyboard. I have discovered a unique solution for this particular scenario, which has proven successful multiple times before

Please note that I have conducted all the procedures mentioned in this guide using a Motorola G50 device

Now, let's proceed with the method to bypass the factory reset protection on any Motorola device with the Google GBoard app installed as the default keyboard. By exploiting vulnerabilities in the GBoard app, we can crash it and gain access to the device's settings, effectively bypassing the protection. It's important to note that this method is specific to the current Android version (as of 2023-02-09) on the Motorola G50 device.

Tilgin TG275X Router Hacking Guide

Screenshot_20221111_205015

This guide provides step-by-step instructions on hacking the Tilgin TG275X Router from Bredband2. By following these procedures, you will gain access to advanced features and settings of the router. Please note that hacking or unauthorized access to routers without proper authorization is illegal and unethical. This guide is for educational purposes only.

Please note that attempting to hack or gain unauthorized access to any device or network is against the law and can result in severe legal consequences. Always ensure that you have proper authorization and follow ethical guidelines when conducting any security-related activities.

Hacking Inteno XG6846

Screenshot

The Inteno XG6846 is installed in millions of Swedish homes and sits between the router and the switch. With some operators, it's a requirement for watching TV. Now it's time to take control of this device!

In 2022, a new law was introduced in Sweden allowing the government to hack people's devices regardless of whether they are criminals or not. I don't think this is a good thing, so I took on this challenge as a fun project. Here are the results

Taking control of Android 12 with Bixby's intelligent assistance

Works on all Samsung devices until Security Patch: 2022-02-01)

More information about the CVE from Samsung can be found here.

No worries, I've got you covered with a newer version (they are fast but not fast enough, so I decided to share this wiki with the public). This hack works perfectly for all Samsung devices with the latest security patch (2022-02-01). While the wiki was created on February 21, 2022, it still works awesomely. Please note that this method does NOT work on Android 11. If you have an Android 11 FRP locked device, you can upgrade to the latest firmware from Samsung.

I'm sharing this information freely because it's fun and because I can, and because I believe it's enjoyable to share knowledge. I never report exploits or security issues for money. For me, time is more valuable than money.