You must log in or register to comment.
- Audio and camera recording
- File manipulation
- Information exfiltration (call logs, contacts, SMS messages, installed app information)
- Device control (volume, Wi-Fi, Bluetooth)
- Keylogging
- Administrative actions (factory reset, lock screen control)
Crazy stuff