Sponsor Links   | 
        
         
          | Soft Name | 
           | 
        
         
            
            thc-nokia-rom-images.tar.gz  | 
           | 
        
 This archive holds mobile phone ROM images for the Nokia 6630, Nokia n70, Nokia N-GAGE, and the S... Soft Directory:mobile phones   | 
  | 
        
         
            
            bluediving-0.2.tgz  | 
           | 
        
 Bluetooth pentesting suite. Implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack an... Soft Directory:mobile phones   | 
  | 
        
         
            
            greenplaque-affix-2.2.tar.gz  | 
           | 
        
 Greenplaque is an application that finds discoverable bluetooth devices. Greenplaque is inspired ... Soft Directory:mobile phones   | 
  | 
        
         
            
            helomoto.tgz  | 
           | 
        
 The HeloMoto attack takes advantage of moto mobile. Soft Directory:mobile phones   | 
  | 
        
         
            
            PA168.pl.txt  | 
           | 
        
  can be used to "break" into PA168  Soft Directory:mobile phones   | 
  | 
        
         
            
            undeletesms.exe  | 
           | 
        
 UndeleteSMS can recover deleted SMS messages from a GSM SIM card. Download the exe file and run i... Soft Directory:mobile phones   | 
  | 
        
         
            
            phreak_2k.doc  | 
           | 
        
 An overview of the CURRENT phreaking methods, setups and systems. Soft Directory:mobile phones   | 
  | 
        
         
            
            bluetooth_demystified.doc  | 
           | 
        
 This manual aims at guiding all Symbian and BT enabled phone users to know how a intruder step by... Soft Directory:mobile phones   | 
  | 
        
         
            
            otpgen1.0.zip  | 
           | 
        
 One-Time Password Generator for Java-enabled mobile phones. The interface has been designed to mi... Soft Directory:mobile phones   | 
  | 
        
         
            
            threats.to.wap.devices.pdf  | 
           | 
        
 This paper will review WAP, WAP Push, WML, and WMLScript and their ability to host malicious soft... Soft Directory:mobile phones   | 
  |