SkillAgentSearch skills...

Test

# CPA #### README CPA is is the first tool wich has been released as open source wich can guarantee **100%** that your pin code will be cracked aslong as usb debugging has been enable. CPA adalah alat pertama yang dirilis sebagai open source yang dapat menjamin ** 100% ** bahwa kode pin Anda akan retak selama debugging usb telah diaktifkan. ########################################################## CPA will allways try to bring support for rare protocols, CPA wont contain common stuff like other brute tools cover like facebook, snapchat, instagram and you name it (except a few exceptions, very few) CPA akan selalu mencoba untuk memberikan dukungan untuk protokol langka, wCPA tidak akan berisi hal-hal umum seperti sampul alat kasar lainnya seperti facebook, snapchat, instagram dan sebut saja (kecuali beberapa pengecualian, sangat sedikit) ########################################################## _Many times it's the easiest methods that are the most powerful methods, it's just a matter of using your imagination ;-)_ Sering kali ini adalah metode termudah yang merupakan metode paling kuat, itu hanya masalah menggunakan imajinasi Anda ;-) ########################################################## ## INFO: 2020-07-11: Android and Google, now have set a rule for locksettings via cli as via gui earlier, if you try to many attempts within X seconds you will be blocked for X seconds so wbruter via cli wont work anymore on devices that has been upgraded to latest version Android 10, older version should work fine unless they are upgraded to latest android version. Android dan Google, sekarang telah menetapkan aturan untuk penguncian melalui cli seperti melalui gui sebelumnya, jika Anda mencoba banyak upaya dalam 10 detik Anda akan diblokir selama 10 detik sehingga wbruter melalui cli tidak akan berfungsi lagi pada perangkat yang telah ditingkatkan ke versi terbaru Android 10, versi yang lebih lama seharusnya berfungsi dengan baik kecuali mereka ditingkatkan ke versi android terbaru. ########################################################## ## Enable USB-Debugging via the methods below: #### Via GUI: Go to settings -> about > press on build number 7 times and the developer settings will be enable, go back to settings and press on developer mode and then enable USB DEBUGGING. If you found an android deviceon the street or something and want to break the pin this wont be possible unless you already know the pin so the device must have usb debugging enable for this to work. You wanna try this for fun then you can just enable usb debugging after you unlocked phone) #### Via cli/adb: settings put global development_settings_enabled 1 setprop persist.service.adb.enable 1 #### Via GUI (old layout now use --androidgui 4 instead) ##### Please use cli method instead since many devices has been set to erase the device after "10/15 wrong pin attempts" and this wont happen with the CLI method. (Updated: okt/2020) #### Via CLI: From 0000 to 9999 takes ~83 minutes. In around ~1h you will with 100% _guarantee_ have the pin code #### Notice: Jika Anda akan melihat pesan yang mirip dengan pesan di bawah Anda tidak perlu peduli, biarkan saja berjalan dan itu akan hilang setelah ~ 4-5 upaya gagal: If you will see a message similiar to message under you don't have to care, just let it run and it will be gone after ~4-5 failed attempts: Error while executing command: clear java.lang.RuntimeException: No data directory found for package android at android.app.ContextImpl.getDataDir(ContextImpl.java:2418) at android.app.ContextImpl.getPreferencesDir(ContextImpl.java:533) at android.app.ContextImpl.getSharedPreferencesPath(ContextImpl.java:795) at android.app.ContextImpl.getSharedPreferences(ContextImpl.java:394) at com.android.internal.widget.LockPatternUtils.monitorCheckPassword(LockPatternUtils.java:1814) at com.android.internal.widget.LockPatternUtils.checkCredential(LockPatternUtils.java:398) at com.android.internal.widget.LockPatternUtils.checkPassword(LockPatternUtils.java:548) at com.android.internal.widget.LockPatternUtils.checkPassword(LockPatternUtils.java:509) at com.android.server.LockSettingsShellCommand.checkCredential(LockSettingsShellCommand.java:151) at com.android.server.LockSettingsShellCommand.onCommand(LockSettingsShellCommand.java:57) at android.os.ShellCommand.exec(ShellCommand.java:96) at com.android.server.LockSettingsService.onShellCommand(LockSettingsService.java:1945) at android.os.Binder.shellCommand(Binder.java:574) at android.os.Binder.onTransact(Binder.java:474) at com.android.internal.widget.ILockSettings$Stub.onTransact(ILockSettings.java:419) at com.android.server.HwLockSettingsService.onTransact(HwLockSettingsService.java:179) at android.os.Binder.execTransact(Binder.java:675) #### HOW TO git clone https://github.com/benyaminxploit1/CPA cd CPA; ./CPA --help #### REQUIREMENTS A linux setup would be good ;) #### CONTACT instagram : benyaminploit #### END!

Install / Use

/learn @benyaminxploit1/Test
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

CPA

CPA #### README CPA is is the first tool wich has been released as open source wich can guarantee 100% that your pin code will be cracked aslong as usb debugging has been enable. CPA adalah alat pertama yang dirilis sebagai open source yang dapat menjamin ** 100% ** bahwa kode pin Anda akan retak selama debugging usb telah diaktifkan. ########################################################## CPA will allways try to bring support for rare protocols, CPA wont contain common stuff like other brute tools cover like facebook, snapchat, instagram and you name it (except a few exceptions, very few) CPA akan selalu mencoba untuk memberikan dukungan untuk protokol langka, wCPA tidak akan berisi hal-hal umum seperti sampul alat kasar lainnya seperti facebook, snapchat, instagram dan sebut saja (kecuali beberapa pengecualian, sangat sedikit) ########################################################## Many times it's the easiest methods that are the most powerful methods, it's just a matter of using your imagination ;-) Sering kali ini adalah metode termudah yang merupakan metode paling kuat, itu hanya masalah menggunakan imajinasi Anda ;-) ########################################################## ## INFO: 2020-07-11: Android and Google, now have set a rule for locksettings via cli as via gui earlier, if you try to many attempts within X seconds you will be blocked for X seconds so wbruter via cli wont work anymore on devices that has been upgraded to latest version Android 10, older version should work fine unless they are upgraded to latest android version. Android dan Google, sekarang telah menetapkan aturan untuk penguncian melalui cli seperti melalui gui sebelumnya, jika Anda mencoba banyak upaya dalam 10 detik Anda akan diblokir selama 10 detik sehingga wbruter melalui cli tidak akan berfungsi lagi pada perangkat yang telah ditingkatkan ke versi terbaru Android 10, versi yang lebih lama seharusnya berfungsi dengan baik kecuali mereka ditingkatkan ke versi android terbaru. ########################################################## ## Enable USB-Debugging via the methods below: #### Via GUI: Go to settings -> about > press on build number 7 times and the developer settings will be enable, go back to settings and press on developer mode and then enable USB DEBUGGING. If you found an android deviceon the street or something and want to break the pin this wont be possible unless you already know the pin so the device must have usb debugging enable for this to work. You wanna try this for fun then you can just enable usb debugging after you unlocked phone) #### Via cli/adb: settings put global development_settings_enabled 1 setprop persist.service.adb.enable 1 #### Via GUI (old layout now use --androidgui 4 instead) ##### Please use cli method instead since many devices has been set to erase the device after "10/15 wrong pin attempts" and this wont happen with the CLI method. (Updated: okt/2020) #### Via CLI: From 0000 to 9999 takes ~83 minutes. In around ~1h you will with 100% guarantee have the pin code #### Notice: Jika Anda akan melihat pesan yang mirip dengan pesan di bawah Anda tidak perlu peduli, biarkan saja berjalan dan itu akan hilang setelah ~ 4-5 upaya gagal: If you will see a message similiar to message under you don't have to care, just let it run and it will be gone after ~4-5 failed attempts: Error while executing command: clear java.lang.RuntimeException: No data directory found for package android at android.app.ContextImpl.getDataDir(ContextImpl.java:2418) at android.app.ContextImpl.getPreferencesDir(ContextImpl.java:533) at android.app.ContextImpl.getSharedPreferencesPath(ContextImpl.java:795) at android.app.ContextImpl.getSharedPreferences(ContextImpl.java:394) at com.android.internal.widget.LockPatternUtils.monitorCheckPassword(LockPatternUtils.java:1814) at com.android.internal.widget.LockPatternUtils.checkCredential(LockPatternUtils.java:398) at com.android.internal.widget.LockPatternUtils.checkPassword(LockPatternUtils.java:548) at com.android.internal.widget.LockPatternUtils.checkPassword(LockPatternUtils.java:509) at com.android.server.LockSettingsShellCommand.checkCredential(LockSettingsShellCommand.java:151) at com.android.server.LockSettingsShellCommand.onCommand(LockSettingsShellCommand.java:57) at android.os.ShellCommand.exec(ShellCommand.java:96) at com.android.server.LockSettingsService.onShellCommand(LockSettingsService.java:1945) at android.os.Binder.shellCommand(Binder.java:574) at android.os.Binder.onTransact(Binder.java:474) at com.android.internal.widget.ILockSettings$Stub.onTransact(ILockSettings.java:419) at com.android.server.HwLockSettingsService.onTransact(HwLockSettingsService.java:179) at android.os.Binder.execTransact(Binder.java:675) #### HOW TO git clone https://github.com/benyaminxploit1/CPA cd CPA; ./CPA --help #### REQUIREMENTS A linux setup would be good ;) #### CONTACT instagram : benyaminploit #### END!

View on GitHub
GitHub Stars4
CategoryDevelopment
Updated3mo ago
Forks0

Security Score

82/100

Audited on Jan 5, 2026

No findings