Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb) (by urbanadventurer)

Android-PIN-Bruteforce Alternatives

Similar projects and alternatives to Android-PIN-Bruteforce

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better Android-PIN-Bruteforce alternative or higher similarity.

Android-PIN-Bruteforce reviews and mentions

Posts with mentions or reviews of Android-PIN-Bruteforce. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-11-16.
  • How to brute Force an app lock?
    2 projects | | 16 Nov 2021
    This seems to be the most popular one. I haven't used any before so I can't tell you which is good or not.
  • Can't enable HID interface on Galaxy S8
    2 projects | | 4 Mar 2021
    I found this project on GitHub and it sounds very promising - Using a Galaxy S8, I've rooted it and installed Nethunter, but when I try to run the bruteforce script, it tells me "HID device /dev/hidg0) not found", and sure enough, there are no hid entries in /dev.
    2 projects | | 4 Mar 2021
    S8 it's not supporting HID officially by Nethunter; only if you found someone who patched they're own kernel. Now regarding your friend you can clone this repository on a kali machine or a Linux machine with a usb cable and modify this to suite your needs. Nethunter is a portable version of Kali Linux after all.
  • PLEASE HELP - I have $700k+ worth of doge coin stuck on an android wallet...
    2 projects | | 1 Feb 2021
    10 possible digits on 12 positions is 10^12 = 1 000 000 000 000 combinations. 10 possible digits on up to 12 positions is 10^12 + 10^11 + 10^10 ... 10^2 + 10^1 = 1 111 111 111 110 combinations. Bruteforcing 4 digit PIN with simple tools takes over 16 hours which is why this man needs a 0day for this app or a faster, more low-level bruteforce method. It would make the most sense to extract just the encrypted file and the part of code responsible for wallet decryption. Having that enables you to build a lightweight tool that just runs that part of code against the wallet file over and over for different combinations. You could run 96 instances of that for like $90/24h on a virtual machine at any given cloud provider. You could also figure out what kind of encryption is used and optimise your code even further to make the process faster/cheaper. Plus, make the tool serverless - make a tiny package that a cloud provider will keep running parallel copies of until one finds the right PIN.
  • A note from our sponsor - SonarLint | 3 Feb 2023
    Up your coding game and discover issues early. SonarLint is a free plugin that helps you find & fix bugs and security issues from the moment you start writing code. Install from your favorite IDE marketplace today. Learn more →