http://xcq24s7nwcnkdfpvqj7n6euz2n7d6fbu5ru7jyrgjjtm7zeb2m6ik2ad.onion/index.php
It is the ultimate tool for mobile surveillance, to take over
remote devices easily and undetected; the software creates an automated 100% FUD (Fully Undetectable) persistent backdoor designed to take full control of the devices
through adding code to the legitimate apps. The backdoor, acting as a
masked malicious software, gives attackers full access to perform a different actions on the target device.