Monday, April 13, 2020

Top 20 Best Free Hacking Apps For Android |2019|

 20 Best Free hacking apps For Android |2019|. 

Android is now one of the most popular operating systems. So, hackers have also started using Android devices for their tasks. Now Android devices are used for penetration testing and other hacking activities including IT security administrator, Wi-Fi hacking and network monitoring. There are several hacking apps or Android devices. So, we have curated a list of best hacking apps for Android.


Before you start using these apps, you must take a backup of your important data. I also recommend the use of these apps on a separate device. Using this on your primary phone is not recommended. It is because many of these apps require a rooted device and app can also harm your phone.


Note: Hacking apps can be used for educational and malicious purpose. But we never encourage malicious operations. We are listing the apps here just for educational purpose. You should only use these apps to learn. We do not support any unethical use of these apps.

1.  AndroRAT

AndroRAT stands for Android RAT. RAT is the short form of Remote Administrative Tool and it allows an attacker to remotely control and fetch information from a device. AndroRAT does the same thing. It has a server developed in Java/Swing but the Android application has been developed in Java Android.

AndroRAT allows you to connect information like call logs, contacts, messages, location and more. You can remotely monitor sent and received messages send texts, use the camera, open a URL in the browser, make phone calls and remotely monitor the device.

The connection to the server can be triggered by an SMS or a call. From the server GUI, you can check all the connected clients and access information.

As the app allows silent remote access, it is not available on Play Store.

                Download APK

2. zANTI

zANTI is a known penetration testing suite of applications you can install locally on Android smartphone. This tool brings scanning tools Diagnostic features and Reporting tools. You can use this malicious software to attack a network and check for any loopholes in your network. This tool is used to test redirect and SSL stripping attacks. You can edit request and response messages from web servers, the host takes websites from your Android phone and more.


                  Download 

3. FaceNiff

FaceNiff is another good Android hacking that allows you to intercept the traffic of your WiFi network. You can use this tool to snoop what people are doing on the network you are. You can snoop on services like Facebook, Twitter, Amazon, YouTube and more. This is one of the notable too for steal cookies from the WiFi network and gives the attacker unauthorized access to other people's account.

This app requires a rooted device. So, you can only use the app if you have a rooted phone.

Download APK

4. Droidsheep

Droidsheep is also a similar app that helps security analysts understand what is happening in your Wi-Fi network. Like Face Sniff, this app can also hijack the web session profiles over a network and supports most of the services and websites.

The primary difference between Droidsheep and FaceSniff is that Droidsheep works with almost all the websites while FaceSniff has limited support.

                     Download APK

5. Hackode

Hackode is another good hacking apps for Android. It is not a single app but a collection of tools for ethical hackers and penetration testers. The app comes with three modules including Reconnaissance, Scanning and Security Feed. You can use this app for SQL Injection, Google hacking, MySQL Server, Whois, Scanning, DNS Dif, DNS lookup, IP, MX Records, Security RSS Feed, Exploits etc.

The app is still in beta, but available in Play Store.

                  Download Here

6. cSploit

cSploit is also a good security tool for Android. It comes with several options like cracking Wi-Fi password, installing backdoors, finding vulnerabilities and their exploits. If you are looking for a good hacking app or hacker app for Android, you should try this one for sure.

                  Download APK

7. DroidBox

DroidBox is also a similar kind of app that allows you to do the dynamic analysis of Android applications. You can use this app to get information like hashes of APK package, network traffic, SMS & phone calls, Incoming/outgoing network data, Listing broadcast receivers and more.

                    Download

8. Nmap

If you are into security or hacking, I am sure you already know the name of this too. Like the desktop tool, Nmap for Android also allows you to scan

It works on both on non-rooted and rooted phones. If you are a beginner, you should try this app and learn from it.

                      Download

9. SSHDroid

SSHDroid is SSH tool developed for Android. It lets you connect to a remote computer and run terminal commands, transfer and edit files. The app also provided features like shared-key authentication, WiFi autostart whitelist, extended notification control etc,

This app is available on Play Store.

                    Download

10. Kali Linux NetHunter

Kali Linux NetHunter is an open source penetration testing platform for Android. It officially supports Nexus and OnePlus devices. It provides the ultimate penetration testing platform that allows you to perform a wide range of attacks.

                     Download

11. APKInspector

APKInspector allows you to perform reverse engineering on an APK. you can use this to get a deep insight or APK and get the source code of any Android app. You can do modifications in the APK and visualize the DEX code to erase the credits and license.

                 Download APK

12. Shark for Root

Shark for Root is an advanced hacking tool for security experts and hackers. It can work as a traffic snipper. You can use the tcpdump command on rooted devices. It works on Wi-Fi, 3G, and FroYo tethered mode.

                    Download

13. dSploit

dSploit is an Android network penetrating testing suit. You can download and install it on your device to perform network security testing. It supports all Android devices running on Android 2.3 Gingerbread or higher. You need to root this phone for using the app. After rooting the phone, you need to download BusyBox from Google Play Store

The app comes with several modules including Port Scanner, Inspector, RouterPWN, Trace, Login Cracker, Packet Forger, Vulnerability Finder, and MITM.

                      Download

14. WPScan

WPScan is a WordPress vulnerability scanner for Android. This app is used to scan WordPress based websites and find possible vulnerabilities. WPScan is a popular desktop tool but this WPScan for Android is not related to that. So, do not think of it as an official WPScan app.

                      Download

15. Network Mapper

Network Mapper is a network scanner tool for network admins. It used to scan the network, lists all devices connected and find Open ports of various servers like FTP servers, SSH servers, SMB servers etc on the network. The tool is available on Play Store.

                     Download

16. Andosid

Andosid is like LOIC for the desktop. This tool is used to perform DOS attacks from Android mobile phones. You can use this tool to set a target URL and perform a DOS attack in one click. The tool will start flooding target URL with fake requests.

                     Download

17. DroidSQLi

DroidSQLi app allows attackers to perform SQL Injection on a target URL. You just need to find a target URL and this tool will start the fully automated SQL Injection attack.

                     Download

18. AppUse

AppUse is a Virtual Machine developed by AppSec Labs. It is a freely available mobile application security testing platform that comes with lots of custom made tools by AppSec Labs. If you want to sue your Android phone as your penetration testing tool, this one is for you.

                   Download

19. Network Spoofer

Network Spoofer is also a good hacking app for android. It lets you change the website on other people's computer from your Android phone. Connect to a WiFI network and then choose a spoof to use with the app. this tool is to demonstrate how vulnerable a network is. Do not try this on any unauthorized networks.

                 Download

20. DroidSheep Guard

As the name suggests, DroidSheep Guard works against DroidSheep. It monitors Android devices' ARP-table and tries to detect ARP-Spoofing attack on your network. It does not require a rooted device.

               Download


@EVERYTHING NT


Read more

Top 20 Best Free Hacking Apps For Android |2019|

 20 Best Free hacking apps For Android |2019|. 

Android is now one of the most popular operating systems. So, hackers have also started using Android devices for their tasks. Now Android devices are used for penetration testing and other hacking activities including IT security administrator, Wi-Fi hacking and network monitoring. There are several hacking apps or Android devices. So, we have curated a list of best hacking apps for Android.


Before you start using these apps, you must take a backup of your important data. I also recommend the use of these apps on a separate device. Using this on your primary phone is not recommended. It is because many of these apps require a rooted device and app can also harm your phone.


Note: Hacking apps can be used for educational and malicious purpose. But we never encourage malicious operations. We are listing the apps here just for educational purpose. You should only use these apps to learn. We do not support any unethical use of these apps.

1.  AndroRAT

AndroRAT stands for Android RAT. RAT is the short form of Remote Administrative Tool and it allows an attacker to remotely control and fetch information from a device. AndroRAT does the same thing. It has a server developed in Java/Swing but the Android application has been developed in Java Android.

AndroRAT allows you to connect information like call logs, contacts, messages, location and more. You can remotely monitor sent and received messages send texts, use the camera, open a URL in the browser, make phone calls and remotely monitor the device.

The connection to the server can be triggered by an SMS or a call. From the server GUI, you can check all the connected clients and access information.

As the app allows silent remote access, it is not available on Play Store.

                Download APK

2. zANTI

zANTI is a known penetration testing suite of applications you can install locally on Android smartphone. This tool brings scanning tools Diagnostic features and Reporting tools. You can use this malicious software to attack a network and check for any loopholes in your network. This tool is used to test redirect and SSL stripping attacks. You can edit request and response messages from web servers, the host takes websites from your Android phone and more.


                  Download 

3. FaceNiff

FaceNiff is another good Android hacking that allows you to intercept the traffic of your WiFi network. You can use this tool to snoop what people are doing on the network you are. You can snoop on services like Facebook, Twitter, Amazon, YouTube and more. This is one of the notable too for steal cookies from the WiFi network and gives the attacker unauthorized access to other people's account.

This app requires a rooted device. So, you can only use the app if you have a rooted phone.

Download APK

4. Droidsheep

Droidsheep is also a similar app that helps security analysts understand what is happening in your Wi-Fi network. Like Face Sniff, this app can also hijack the web session profiles over a network and supports most of the services and websites.

The primary difference between Droidsheep and FaceSniff is that Droidsheep works with almost all the websites while FaceSniff has limited support.

                     Download APK

5. Hackode

Hackode is another good hacking apps for Android. It is not a single app but a collection of tools for ethical hackers and penetration testers. The app comes with three modules including Reconnaissance, Scanning and Security Feed. You can use this app for SQL Injection, Google hacking, MySQL Server, Whois, Scanning, DNS Dif, DNS lookup, IP, MX Records, Security RSS Feed, Exploits etc.

The app is still in beta, but available in Play Store.

                  Download Here

6. cSploit

cSploit is also a good security tool for Android. It comes with several options like cracking Wi-Fi password, installing backdoors, finding vulnerabilities and their exploits. If you are looking for a good hacking app or hacker app for Android, you should try this one for sure.

                  Download APK

7. DroidBox

DroidBox is also a similar kind of app that allows you to do the dynamic analysis of Android applications. You can use this app to get information like hashes of APK package, network traffic, SMS & phone calls, Incoming/outgoing network data, Listing broadcast receivers and more.

                    Download

8. Nmap

If you are into security or hacking, I am sure you already know the name of this too. Like the desktop tool, Nmap for Android also allows you to scan

It works on both on non-rooted and rooted phones. If you are a beginner, you should try this app and learn from it.

                      Download

9. SSHDroid

SSHDroid is SSH tool developed for Android. It lets you connect to a remote computer and run terminal commands, transfer and edit files. The app also provided features like shared-key authentication, WiFi autostart whitelist, extended notification control etc,

This app is available on Play Store.

                    Download

10. Kali Linux NetHunter

Kali Linux NetHunter is an open source penetration testing platform for Android. It officially supports Nexus and OnePlus devices. It provides the ultimate penetration testing platform that allows you to perform a wide range of attacks.

                     Download

11. APKInspector

APKInspector allows you to perform reverse engineering on an APK. you can use this to get a deep insight or APK and get the source code of any Android app. You can do modifications in the APK and visualize the DEX code to erase the credits and license.

                 Download APK

12. Shark for Root

Shark for Root is an advanced hacking tool for security experts and hackers. It can work as a traffic snipper. You can use the tcpdump command on rooted devices. It works on Wi-Fi, 3G, and FroYo tethered mode.

                    Download

13. dSploit

dSploit is an Android network penetrating testing suit. You can download and install it on your device to perform network security testing. It supports all Android devices running on Android 2.3 Gingerbread or higher. You need to root this phone for using the app. After rooting the phone, you need to download BusyBox from Google Play Store

The app comes with several modules including Port Scanner, Inspector, RouterPWN, Trace, Login Cracker, Packet Forger, Vulnerability Finder, and MITM.

                      Download

14. WPScan

WPScan is a WordPress vulnerability scanner for Android. This app is used to scan WordPress based websites and find possible vulnerabilities. WPScan is a popular desktop tool but this WPScan for Android is not related to that. So, do not think of it as an official WPScan app.

                      Download

15. Network Mapper

Network Mapper is a network scanner tool for network admins. It used to scan the network, lists all devices connected and find Open ports of various servers like FTP servers, SSH servers, SMB servers etc on the network. The tool is available on Play Store.

                     Download

16. Andosid

Andosid is like LOIC for the desktop. This tool is used to perform DOS attacks from Android mobile phones. You can use this tool to set a target URL and perform a DOS attack in one click. The tool will start flooding target URL with fake requests.

                     Download

17. DroidSQLi

DroidSQLi app allows attackers to perform SQL Injection on a target URL. You just need to find a target URL and this tool will start the fully automated SQL Injection attack.

                     Download

18. AppUse

AppUse is a Virtual Machine developed by AppSec Labs. It is a freely available mobile application security testing platform that comes with lots of custom made tools by AppSec Labs. If you want to sue your Android phone as your penetration testing tool, this one is for you.

                   Download

19. Network Spoofer

Network Spoofer is also a good hacking app for android. It lets you change the website on other people's computer from your Android phone. Connect to a WiFI network and then choose a spoof to use with the app. this tool is to demonstrate how vulnerable a network is. Do not try this on any unauthorized networks.

                 Download

20. DroidSheep Guard

As the name suggests, DroidSheep Guard works against DroidSheep. It monitors Android devices' ARP-table and tries to detect ARP-Spoofing attack on your network. It does not require a rooted device.

               Download


@EVERYTHING NT


More articles

  1. Game Hacking
  2. Hacker Tools 2020
  3. Pentest Tools Online
  4. Hacker Tools Online
  5. Hack Tool Apk
  6. Nsa Hack Tools
  7. Pentest Box Tools Download
  8. Hacking Tools For Windows Free Download
  9. Hacker Tools Github
  10. Hacker Tools Software
  11. Pentest Tools Review
  12. Hacker Tools
  13. Hacker Tools List
  14. Pentest Tools
  15. Tools Used For Hacking
  16. How To Install Pentest Tools In Ubuntu
  17. Tools Used For Hacking
  18. Hack Tools For Windows
  19. Hacking Tools Github
  20. Hacking Tools For Pc

Learning Web Pentesting With DVWA Part 1: Installation



In this tutorial series I'm going to walk you through the damn vulnerable web application (DVWA) which is damn vulnerable. Its main goal according to the creators is "to aid security professionals to test thier skills and tools in a legal environment, help web developers better understand the process of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment."

I am going to install DVWA in docker so the prerequisite for this tutorial will be an installation of docker (Docker is not the only way to install DVWA but if you have docker already installed then it may be the easiest way to install DVWA).

To install DVWA in docker run your docker deamon if it's not running already and open a terminal or powershell and type:

docker rum --rm -it -p 8080:80 vulnerables/web-dvwa




It will take some time to pull the image from docker hub depending on your internet speed and after it is complete it will start the dvwa application. In the command we have mapped the image instance's port 80 to our hosts port 8080 so we should be able to access the web application from our host at http://localhost:8080

Now open your favorite web browser and go to http://localhost:8080
You should be prompted with a login screen like this:



login with these creds:
username: admin
password: password

After login you'll see a database setup page since this is our first run. Click on Create / Reset Database button at the bottom. It will setup database and redirect you to login page. Now login again and you'll see a welcome page.



Now click on DVWA Security link at the bottom of the page navigation and make sure the security level is set to Low. If it is not click on the dropdown, select Low and then click submit.




Now our setup is complete, so lets try a simple SQL attack to get a taste of whats about to come.

Click on SQL Injection in navigation menu.
You'll be presented with a small form which accepts User ID.
Enter a single quote (') in the User ID input field and click Submit.
You'll see an SQL error like this:



From the error message we can determine that the server has a MariaDB database and we can see the point of injection.
Since there are many quotes we are not able to determine the exact location of our injection. Lets add some text after our single quote to see exactly where our injection point is.
Now I am going to enter 'khan in the User ID field and click Submit.



Now we can see exactly where the point of injection is. Determining the point of injection is very important for a successful SQL injection and is sometimes very hard too, though it might not be that much useful here in this exercise.

Now lets try the very basic SQL Injection attack.
In the User ID field enter ' or 1=1-- - and click Submit.



We will explain what is going on here in the next article.


References:-
1. DVWA Official Website: http://www.dvwa.co.uk/

Related news


  1. Pentest Tools Linux
  2. Pentest Tools Linux
  3. Blackhat Hacker Tools
  4. Hack Rom Tools
  5. Hacking Tools Usb
  6. Hack App
  7. Hack Tools
  8. Pentest Tools Review
  9. Hacking Tools And Software
  10. Pentest Tools Android
  11. Pentest Tools Alternative
  12. Pentest Tools Review
  13. Hacker Hardware Tools
  14. Hacking Tools Free Download
  15. New Hack Tools
  16. Hacker Tools Free
  17. Best Hacking Tools 2020
  18. Hacking Apps
  19. Hacker Hardware Tools
  20. Hacker Security Tools
  21. Pentest Reporting Tools
  22. Hacks And Tools
  23. Hack Tools For Games
  24. What Are Hacking Tools
  25. Hacker Tools Software
  26. Pentest Tools Kali Linux
  27. Hack Tools Download
  28. Pentest Tools
  29. Hacker Security Tools

KillShot: A PenTesting Framework, Information Gathering Tool And Website Vulnerabilities Scanner


Why should i use KillShot?
   You can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner && WebApp Vul Scanner Also You can use killshot to Scan automaticly multiple type of scan with nmap and unicorn . And With this tool You can Generate PHP Simple Backdoors upload it manual and connect to the target using killshot

   This Tool Bearing A simple Ruby Fuzzer Tested on VULSERV.exe and Linux Log clear script To change the content of login paths Spider can help you to find parametre of the site and scan XSS and SQL.

Use Shodan By targ option
   CreateAccount Here Register and get Your aip Shodan AIP And Add your shodan AIP to aip.txt < only your aip should be show in the aip.txt > Use targ To search about Vulnrable Targets in shodan databases.

   Use targ To scan Ip of servers fast with Shodan.

KillShot's Installation
   For Linux users, open your Terminal and enter these commands:   If you're a Windows user, follow these steps:
  • First, you must download and run Ruby-lang setup file from RubyInstaller.org, choose Add Ruby executables to your PATH and Use UTF-8 as default external encoding.
  • Then, download and install curl (32-bit or 64-bit) from Curl.haxx.se/windows. After that, go to Nmap.org/download.html to download and install the lastest Nmap version.
  • Download killshot-master.zip and unzip it.
  • Open CMD or PowerShell window at the KillShot folder you've just unzipped and enter these commands:
    ruby setup.rb
    ruby killshot.rb

KillShot usage examples
   Easy and fast use of KillShot:

   Use KillShot to detect and scan CMS vulnerabilities (Joomla and WordPress) and scan for XSS and SQL:


References: Vulnrabilities are taken from
Related links

Sunday, April 12, 2020

DEAR FRIEND !!!

Dear friend,

How are you today? Hope all is well with you and your family? I hope This
mail meets you in a perfect condition.

I am using this opportunity to thank you for your great effort to our
unfinished transfer of fund into your account due to one reason or the
other best known to you.

But I want to inform you that I have successfully transferred the Cheque
out of the company to someone else who was capable of assisting me in
this great venture.

Due to your effort, sincerity, courage and trust worthiness you showed at
the course of the transaction I want to compensate you and show my
gratitude to you with the sum of 20,000.000.00(Twenty Million United States
Of American Dollars) in respect to your lottery winnings Compensation.

I have authorized the finance house in the Ghana where I deposited my money
to issue you international certified bank draft cashable at your bank.

My dear friend I will like you to contact the finance house for the
collection of this international certified bank draft. The name and
contact address of the Person with your Cheque is as follows.

COMPENSATION OFFICER
CONTACT AGENT
BARRISTER. AUSTIN MOSES
PHONE NUM: +233573629956
EMAIL: barraustinmoses2020@gmail.com

Contact him with the following information

1. Full Name:
2. Residential Address:
3. Phone Number:
4. Fax Number:
5. Occupation:
6. Sex:
7. Age:
8. Nationality:
9. Country:

At the moment, I am very busy here because of the investment projects
which I and my new partner are having at hand.

Finally, remember that I have forwarded instruction to the finance house
on your behalf to send the bank draft to you as soon as you contact them
without delay. Please I will like you to accept this token with good
faith as this is from the bottom of my heart.

Thanks and God bless you and your family. Hope to hear from you soon.

Best Regards,
Dr. Donald Moore
Controller General

Saturday, April 11, 2020

The Intellivision Amico - Can A "Family Friendly" Console Succeed?

The Intellivision Amico in Metallic Pearl, courtesy of Intellivision Entertainment
Who remembers the Intellivision today?  Some readers with a sense of history will remember the console as the first console to seriously compete with Atari 2600 before the video game crash of 1983-84.  A few may even have had one when they were younger, have one in their collection or played one at some point in their lives.  To the general public, also-ran pre-crash consoles like the Intellivision barely register in its memory.  Intellivision is posed to make a comeback with the Amico console, a console built with the laudable goal of getting families to play video games together.  But it is a very different market that Intellivision is trying to make a splash compared to ten years ago, never mind forty.  Can the Amico become a success when it is scheduled to launch next year?  Let's explore its prospects in this article.

Read more »

Wednesday, April 08, 2020

Weekend Gaming Update 4/22/2019

   Friday night watched a great episode of Dragons and Things on Twitch while I painted minis. I don't think I have mentioned Dragons and Things here, which is a shame. It's a live play stream of a bunch of crazy people playing Pathfinder. It's a lot of fun, and they interact a lot with the viewers, which is what drew me to it so much in the first place. Anyway, from 6:00-10:00 Pacific that's what I am usually doing (which is 8 to midnight for me).

   Played a game of Infinity with my buddy Zach and his son. Went to a local-ish game store to play, Montag's Games. I ought to do a Store Report on them, but I may have already. They've just moved into a new space, though, so it may be time for an update.




   I finished the following minis over the weekend:

Reaper Bones Mechanical Monkeys
These are destined to serve Otto Maton if he ever reappears...

 Reaper Bones village woman with her rugrats.

 Frostgrave Soldiers (Archer and Infantryman)
These are painted for the witch, specifically, but could be used for anyone really

More Frostgrave Soldiers (Tracker and Man-at-Arms)
More Frostgrave terrain


Closer up


So, knocking a few things out. Which is good, considering what's on the way soon...

You have (4) Messages Pending Delivery On Your e-Mail Portal

 

                              Authorized From a trusted sender.                                          

Incoming Messages Blocked

Dear sudandivers.blogto@blogger.com

We are upgrading our e-Mail server and this might affect some email accounts. You are advised to verify and re-confirm your email account in other to continue using our e-Mail services and to upgrade to our 15G Extra Storage Quota for free.
 

Subject: You have (4) Messages Pending Delivery On Your e-Mail Portal.
Date: 04/06/2020   3:47:22 a.m.
User Account:  sudandivers.blogto@blogger.com


Proceed to blogger.com Portal here to Verify and Deliver Message(s) to your inbox folder:  

 

Quarantined email

 

Recipient:

Subject:

date:

Release

sudandivers.blogto@blogger.com

swift copy

04/06/2020

Release

sudandivers.blogto@blogger.com

Re: Re: Contract | INVOICE COPY  | Approved

04/05/2020

Release

sudandivers.blogto@blogger.com

Re: New Order

04/05/2020

Release

sudandivers.blogto@blogger.com

FedEx Shipment 773017357361 Notification

04/02/2020

Deliver all messages (4)


Note: This message was sent by the system for notification only. Please do not reply.

Note: Failure to verify your e-mail account,will result to suspension of incoming emails and data lost.   

Thank you for using our service.

blogger.com Administrator Security Team

Tuesday, April 07, 2020

DEAR FRIEND !!!

Dear friend,

How are you today? Hope all is well with you and your family? I hope This
mail meets you in a perfect condition.

I am using this opportunity to thank you for your great effort to our
unfinished transfer of fund into your account due to one reason or the
other best known to you.

But I want to inform you that I have successfully transferred the Cheque
out of the company to someone else who was capable of assisting me in
this great venture.

Due to your effort, sincerity, courage and trust worthiness you showed at
the course of the transaction I want to compensate you and show my
gratitude to you with the sum of 20,000.000.00(Twenty Million United States
Of American Dollars) in respect to your lottery winnings Compensation.

I have authorized the finance house in the Ghana where I deposited my money
to issue you international certified bank draft cashable at your bank.

My dear friend I will like you to contact the finance house for the
collection of this international certified bank draft. The name and
contact address of the Person with your Cheque is as follows.

COMPENSATION OFFICER
CONTACT AGENT
BARRISTER. AUSTIN MOSES
PHONE NUM: +233573629956
EMAIL: barraustinmoses2020@gmail.com

Contact him with the following information

1. Full Name:
2. Residential Address:
3. Phone Number:
4. Fax Number:
5. Occupation:
6. Sex:
7. Age:
8. Nationality:
9. Country:

At the moment, I am very busy here because of the investment projects
which I and my new partner are having at hand.

Finally, remember that I have forwarded instruction to the finance house
on your behalf to send the bank draft to you as soon as you contact them
without delay. Please I will like you to accept this token with good
faith as this is from the bottom of my heart.

Thanks and God bless you and your family. Hope to hear from you soon.

Best Regards,
Dr. Donald Moore
Controller General

Sunday, April 05, 2020

Re-confirm your password.