none/Spy Toolkit
-
Security: Spy Toolkit has an optional passcode security system that can be enabled. To use the security system enter your desired 4 digit pin and click save, however be warned if you forget your pin you will have to uninstall and reinstall the Spy Toolkit App. To log off press the log off button in security or the key icon on the home screen.
Security: Spy Toolkit has an optional passcode security system that can be enabled. To use the security system enter your desired 4 digit pin and click save, however be warned if you forget your pin you will have to uninstall and reinstall the Spy Toolkit App. To log off press the log off button in security or the key icon on the home screen.
Sécurité: Spy Toolkit a une sécurité par mot de passe facultative qui peut être activée. Pour utiliser le système de sécurité, entrez les 4 caractères que vous souhaitez et cliquez pour sauvegarder. Cependant, soyez averti que si vous oubliez votre code pin, vous devrez désinstaller et réinstaller l'application Spy Toolkit. Pour vous déconnecter, appuyez sur le bouton de déconnection dans sécurité ou sur l'icône clé sur l'accueil de l'application. -
Flashlight: To use the Flashlight tap the screen to toggle your phone's included flashlight on and off. In addition the screen is white for extra light.
Flashlight: To use the Flashlight tap the screen to toggle your phone's included flashlight on and off. In addition the screen is white for extra light.
Lampe torche: Pour utiliser la lampe torche, tapez l'écran pour activer/désactiver la lampe torche de votre téléphone. En plus, l'écran est blanc pour plus de lumière. -
Code Name Generator: The Code Name Creator makes code names to be used to protect your identity in communications.
Code Name Generator: The Code Name Creator makes code names to be used to protect your identity in communications.
Générateur de Nom de Code: Le Générateur de Nom de Code génère des noms de code pour protéger votre identité dans les communications. -
Diversion: To use the Diversion creator enter a time in minutes and seconds into their respective fields and chose which sound(s) you would like to play after the delay you entered then tap Go. Once you hit Go the screen will blank to keep your phone hidden from sight and then play your sound after the set delay. To stop or cancel the sound tap the screen or the back button on your phone.
Diversion: To use the Diversion creator enter a time in minutes and seconds into their respective fields and chose which sound(s) you would like to play after the delay you entered then tap Go. Once you hit Go the screen will blank to keep your phone hidden from sight and then play your sound after the set delay. To stop or cancel the sound tap the screen or the back button on your phone.
-
Cipher Maker: The Cipher Maker allows you to quickly encode and decode messages based on a seed. To use the Cipher Maker give the cipher seed to the person you need to send encoded messages too, both of you then need to enter the seed in the settings portion of the app. For added security you can change between subcodes modes 1-5 periodically to prevent your code from being cracked. This should be done at an interval pre-specified with the person you will be exchanging messages with. For example every 15 minutes.
Cipher Maker: The Cipher Maker allows you to quickly encode and decode messages based on a seed. To use the Cipher Maker give the cipher seed to the person you need to send encoded messages too, both of you then need to enter the seed in the settings portion of the app. For added security you can change between subcodes modes 1-5 periodically to prevent your code from being cracked. This should be done at an interval pre-specified with the person you will be exchanging messages with. For example every 15 minutes.
-
Bug: The bug allows you to use your phone as a bug to record audio. To record open up the bug and press Start Recording then when you are finished recording press stop. To listen to the recorded audio press Start Playing. Recordings will be saved in your music library under the name Spy Toolkit In addition you also have the option to toggle the screen brightness by pressing Dim Screen for improved hiding abilities. You can also exit the app and use another app while the bug continues recording.
Bug: The bug allows you to use your phone as a bug to record audio. To record open up the bug and press Start Recording then when you are finished recording press stop. To listen to the recorded audio press Start Playing. Recordings will be saved in your music library under the name Spy Toolkit In addition you also have the option to toggle the screen brightness by pressing Dim Screen for improved hiding abilities. You can also exit the app and use another app while the bug continues recording.
-
Camera: Since a camera is crucial to every spy the Spy Toolkit includes easy and quick access to your devices built in camera. Simply tap the camera icon. All photos you take will be saved to the gallery.
Camera: Since a camera is crucial to every spy the Spy Toolkit includes easy and quick access to your devices built in camera. Simply tap the camera icon. All photos you take will be saved to the gallery.
-
Morse Code: Morse Code is a method of turning text messages into a series of dots and dashes. Morse Code is best known for its use with the telegram but can be used for radio communications with poor reception or to send messages using light signals, which you can do in a dark environments using the Flashlight in the Spy Toolkit. The Spy Toolkit has three tools for using Morse Code. It has a manual transmit mode where you can manually use your phones speakers to send messages. Secondly it has an automatic mode which takes a text input and outputs it through the speakers in your phone. Finally there is a Morse Code conversion table included for decoding. In settings you can decide if you want to use your phones vibrator while transmitting.
Morse Code: Morse Code is a method of turning text messages into a series of dots and dashes. Morse Code is best known for its use with the telegram but can be used for radio communications with poor reception or to send messages using light signals, which you can do in a dark environments using the Flashlight in the Spy Toolkit. The Spy Toolkit has three tools for using Morse Code. It has a manual transmit mode where you can manually use your phones speakers to send messages. Secondly it has an automatic mode which takes a text input and outputs it through the speakers in your phone. Finally there is a Morse Code conversion table included for decoding. In settings you can decide if you want to use your phones vibrator while transmitting.
-
Code Breaker: The Code Breaker is a computer program that breaks Cesarian Ciphers, which are the type of code used by the Cipher Maker. To break a code enter it into the text field and press go.
Code Breaker: The Code Breaker is a computer program that breaks Cesarian Ciphers, which are the type of code used by the Cipher Maker. To break a code enter it into the text field and press go.
-
Intruder Alert: Before Activating the Intruder Alert select which noises you want to play when the Intruder Alert is activated.Then put your phone in a place where it will be moved by someone entering the room, such as on a door.Once your phone is in place press to activate the intruder alert and the screen will automatically dim.
Intruder Alert: Before Activating the Intruder Alert select which noises you want to play when the Intruder Alert is activated.Then put your phone in a place where it will be moved by someone entering the room, such as on a door.Once your phone is in place press to activate the intruder alert and the screen will automatically dim.
-
Code Creation Manual: The Cipher Maker allows you to create Cesarian Ciphers, the type of cipher used by Cesear to encode messages. Cesarian Ciphers use a set shift to encode messages. For example if you were to use a +3 shift /"abc/" would become /"cde/".The Code Breaker is a program designed to break Cesarian Ciphers. As you can tell by the ease of cracking Cesarian Ciphers with the Code Breaker Cesarian Ciphers are not very secure.This is because there are only 26 possible Cesarian Ciphers (26 letters in the alphabet). Below are several much more secure encoding techniques are described for your use.
Code Creation Manual: The Cipher Maker allows you to create Cesarian Ciphers, the type of cipher used by Cesear to encode messages. Cesarian Ciphers use a set shift to encode messages. For example if you were to use a +3 shift /"abc/" would become /"cde/".The Code Breaker is a program designed to break Cesarian Ciphers. As you can tell by the ease of cracking Cesarian Ciphers with the Code Breaker Cesarian Ciphers are not very secure.This is because there are only 26 possible Cesarian Ciphers (26 letters in the alphabet). Below are several much more secure encoding techniques are described for your use.
-
Book Cipher: The book cipher requires that both the sender and the recipient have acess to the exact same book or newspaper. The more obscure the book the more secure the code.For the Book Cipher you give the position of each word in your message, and to decode it the recipient finds each word in the predetermined book. The easiest way to describe positions in books is page number/line number/word number. So for example 258/5/4 would mean the 4th word on the fifth line of the 258th page of the book.
Book Cipher: The book cipher requires that both the sender and the recipient have acess to the exact same book or newspaper. The more obscure the book the more secure the code.For the Book Cipher you give the position of each word in your message, and to decode it the recipient finds each word in the predetermined book. The easiest way to describe positions in books is page number/line number/word number. So for example 258/5/4 would mean the 4th word on the fifth line of the 258th page of the book.
-
Substitution Cipher: For the substitution cipher create two copies of a key where each letter in the alphabet is replaced by a different random letter.This works in the same way as the Cesarian Cipher however instead of having each letter shifted a uniform number of spaces, it is shifted a random number of spaces.This code is much more secure then the Cesarian Cipher.
Substitution Cipher: For the substitution cipher create two copies of a key where each letter in the alphabet is replaced by a different random letter.This works in the same way as the Cesarian Cipher however instead of having each letter shifted a uniform number of spaces, it is shifted a random number of spaces.This code is much more secure then the Cesarian Cipher.
-
Find
Find