Latest posts

10/recent/ticker-posts

Setting System for Hacking

Setting up System for Hacking


Hi guys, In this Blog we are going to setup our Computer System. We are not going to perform any of the operations on our real mobile phone because of Safety and Privacy issue.
So, instead of Real phone we are using Android Emulator for safety. At same time we are going to install other items 

Tools to Setup System:

  1. Android Emulator
  2. Java
  3. APK easy Tool
  4. Virtual Box
  5. Kali Operating System

Android Emulator:


The Android Emulator creates an Android Virtual Device with almost functionality that a real Android can Provide us. It creates a Virtual Representation of Android or any device. You can also download and use Android applications on Computer System using Android Emulator.

Link :
  1. (BlueStack) https://www.bluestacks.com/ms/index.html
  2. (noxplayer) https://www.bignox.com/
After opening this link click on download Button and start to download

Java :

We also need to setup the JAVA in our Computer System Because, When we start to create our own app or use any tool such like APK easy at that time JAVA is must needed.


After opening this link click on download Button and start to download

APK easy tool :

Simply we use this tool to Decompile and again Compile the application. So you think “ why we need to Decompile and Compile application again ? ”, When we want to bind the virus with application so simply we Decompile that original application and fit our malicious string OR payload in that application and Compile that app again for this operation we need APK easy tool.


After opening this link click on download Button and start to download.

Virtual Box :

It is a software allows us to install and run Operating system virtually.
After opening this link click on download Button and start to download.

Kali Linux Operating System :

We are using Kali Linux. It is completely Open Source Operating System and free that means you can also customize it. You can also contribute in it’s Development, It is maintained by Offensive Security. Kali Linux is specially designed for analyze network and Perform penetration testing in more simple word’s it is for cybersecurity and hacking. Kali linux has 600+ inbuilt tools for Network Security and Penetration testing.


After opening this link click on download Button and start to download.



Also Visit


Post a Comment

0 Comments