-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
therse a backdoor in this script #17
Comments
Isn't that the point? ADBsploit is an exploitative tool.
…On Tue., Mar. 22, 2022, 8:02 p.m. mrrobotx37, ***@***.***> wrote:
#TODO
def backdoor():
global device
if device != 'none':
if shutil.which("msfvenom") is not None:
try:
d = adbutils.adb.device(device)
print(arrow + ("[{0}+{1}] Specify the payload:
(com.whatsapp)").format(Fore.RED, Fore.WHITE))
table = Table()
table.add_column("Name", style="cyan")
table.add_column("Description", style="magenta")
table.add_row("meterpreter_reverse_http", "Android Meterpreter Reverse
HTTP Stager")
table.add_row("meterpreter_reverse_https", "Android Meterpreter Reverse
HTTPS Stager")
table.add_row("meterpreter_reverse_tcp", "Android Meterpreter Reverse TCP
Stager")
table.add_row("meterpreter_reverse_http_inline", "Android Meterpreter
Reverse HTTP Inline")
table.add_row("meterpreter_reverse_https_inline", "Android Meterpreter
Reverse HTTPS Inline")
table.add_row("meterpreter_reverse_tcp_inline", "Android Meterpreter
Reverse TCP Inline")
table.add_row("shell_reverse_http", "Android Command Shell Reverse HTTP
Stager")
table.add_row("shell_reverse_https", "Android Command Shell Reverse HTTP
Stager")
table.add_row("shell_reverse_tcp", "Android Command Shell Reverse HTTP
Stager")
console = Console()
console.print(table)
print(arrow + ("[{0}+{1}] Specify the payload:
(meterpreter_reverse_http)").format(Fore.RED, Fore.WHITE))
payload = my_input(arrow + " adbsploit" + Fore.RED + "(backdoor) " +
Fore.WHITE + "> ")
if payload == "":
print()
elif payload == "meterpreter_reverse_http":
print()
elif payload == "meterpreter_reverse_https":
print()
elif payload == "meterpreter_reverse_tcp":
print()
elif payload == "meterpreter_reverse_http_inline":
print()
elif payload == "meterpreter_reverse_https_inline":
print()
elif payload == "meterpreter_reverse_tcp_inline":
print()
elif payload == "shell_reverse_http":
print()
elif payload == "shell_reverse_httpS":
print()
elif payload == "shell_reverse_TCP":
print()
else:
print(arrow + ("[{0}+{1}] Select a correct payload...").format(Fore.RED,
Fore.WHITE))
except:
print(arrow + ("[{0}+{1}] An error ocurred generating the
backdoor...").format(Fore.RED, Fore.WHITE))
else:
print(arrow + ("[{0}+{1}] ADBSploit use Metasploit for generating
backdoors, you must install to use this option").format(
Fore.RED, Fore.WHITE))
print(arrow + (
"[{0}+{1}] Install it via
https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers
").format(
Fore.RED, Fore.WHITE))
else:
print(arrow + ("[{0}+{1}] You must select a device
before...").format(Fore.RED, Fore.WHITE))
—
Reply to this email directly, view it on GitHub
<#17>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFZ7SHCOLTF25JOB6OTDD73VBJNQLANCNFSM5RMM7A3Q>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
#TODO
def backdoor():
global device
if device != 'none':
if shutil.which("msfvenom") is not None:
try:
d = adbutils.adb.device(device)
print(arrow + ("[{0}+{1}] Specify the payload: (com.whatsapp)").format(Fore.RED, Fore.WHITE))
table = Table()
table.add_column("Name", style="cyan")
table.add_column("Description", style="magenta")
table.add_row("meterpreter_reverse_http", "Android Meterpreter Reverse HTTP Stager")
table.add_row("meterpreter_reverse_https", "Android Meterpreter Reverse HTTPS Stager")
table.add_row("meterpreter_reverse_tcp", "Android Meterpreter Reverse TCP Stager")
table.add_row("meterpreter_reverse_http_inline", "Android Meterpreter Reverse HTTP Inline")
table.add_row("meterpreter_reverse_https_inline", "Android Meterpreter Reverse HTTPS Inline")
table.add_row("meterpreter_reverse_tcp_inline", "Android Meterpreter Reverse TCP Inline")
table.add_row("shell_reverse_http", "Android Command Shell Reverse HTTP Stager")
table.add_row("shell_reverse_https", "Android Command Shell Reverse HTTP Stager")
table.add_row("shell_reverse_tcp", "Android Command Shell Reverse HTTP Stager")
console = Console()
console.print(table)
print(arrow + ("[{0}+{1}] Specify the payload: (meterpreter_reverse_http)").format(Fore.RED, Fore.WHITE))
payload = my_input(arrow + " adbsploit" + Fore.RED + "(backdoor) " + Fore.WHITE + "> ")
if payload == "":
print()
elif payload == "meterpreter_reverse_http":
print()
elif payload == "meterpreter_reverse_https":
print()
elif payload == "meterpreter_reverse_tcp":
print()
elif payload == "meterpreter_reverse_http_inline":
print()
elif payload == "meterpreter_reverse_https_inline":
print()
elif payload == "meterpreter_reverse_tcp_inline":
print()
elif payload == "shell_reverse_http":
print()
elif payload == "shell_reverse_httpS":
print()
elif payload == "shell_reverse_TCP":
print()
else:
print(arrow + ("[{0}+{1}] Select a correct payload...").format(Fore.RED, Fore.WHITE))
except:
print(arrow + ("[{0}+{1}] An error ocurred generating the backdoor...").format(Fore.RED, Fore.WHITE))
else:
print(arrow + ("[{0}+{1}] ADBSploit use Metasploit for generating backdoors, you must install to use this option").format(
Fore.RED, Fore.WHITE))
print(arrow + (
"[{0}+{1}] Install it via https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers ").format(
Fore.RED, Fore.WHITE))
else:
print(arrow + ("[{0}+{1}] You must select a device before...").format(Fore.RED, Fore.WHITE))
The text was updated successfully, but these errors were encountered: