mesquidar / adbsploit

A python based tool for exploiting and managing Android devices via ADB
751 stars 111 forks source link

therse a backdoor in this script #17

Open mrrobotx37 opened 2 years ago

mrrobotx37 commented 2 years ago

TODO

def backdoor(): global device if device != 'none': if shutil.which("msfvenom") is not None: try: d = adbutils.adb.device(device) print(arrow + ("[{0}+{1}] Specify the payload: (com.whatsapp)").format(Fore.RED, Fore.WHITE)) table = Table() table.add_column("Name", style="cyan") table.add_column("Description", style="magenta") table.add_row("meterpreter_reverse_http", "Android Meterpreter Reverse HTTP Stager") table.add_row("meterpreter_reverse_https", "Android Meterpreter Reverse HTTPS Stager") table.add_row("meterpreter_reverse_tcp", "Android Meterpreter Reverse TCP Stager") table.add_row("meterpreter_reverse_http_inline", "Android Meterpreter Reverse HTTP Inline") table.add_row("meterpreter_reverse_https_inline", "Android Meterpreter Reverse HTTPS Inline") table.add_row("meterpreter_reverse_tcp_inline", "Android Meterpreter Reverse TCP Inline") table.add_row("shell_reverse_http", "Android Command Shell Reverse HTTP Stager") table.add_row("shell_reverse_https", "Android Command Shell Reverse HTTP Stager") table.add_row("shell_reverse_tcp", "Android Command Shell Reverse HTTP Stager") console = Console() console.print(table) print(arrow + ("[{0}+{1}] Specify the payload: (meterpreter_reverse_http)").format(Fore.RED, Fore.WHITE)) payload = my_input(arrow + " adbsploit" + Fore.RED + "(backdoor) " + Fore.WHITE + "> ") if payload == "": print() elif payload == "meterpreter_reverse_http": print() elif payload == "meterpreter_reverse_https": print() elif payload == "meterpreter_reverse_tcp": print() elif payload == "meterpreter_reverse_http_inline": print() elif payload == "meterpreter_reverse_https_inline": print() elif payload == "meterpreter_reverse_tcp_inline": print() elif payload == "shell_reverse_http": print() elif payload == "shell_reverse_httpS": print() elif payload == "shell_reverse_TCP": print() else: print(arrow + ("[{0}+{1}] Select a correct payload...").format(Fore.RED, Fore.WHITE)) except: print(arrow + ("[{0}+{1}] An error ocurred generating the backdoor...").format(Fore.RED, Fore.WHITE)) else: print(arrow + ("[{0}+{1}] ADBSploit use Metasploit for generating backdoors, you must install to use this option").format( Fore.RED, Fore.WHITE)) print(arrow + ( "[{0}+{1}] Install it via https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers ").format( Fore.RED, Fore.WHITE)) else: print(arrow + ("[{0}+{1}] You must select a device before...").format(Fore.RED, Fore.WHITE))

chris-nicholas commented 2 years ago

Isn't that the point? ADBsploit is an exploitative tool.

On Tue., Mar. 22, 2022, 8:02 p.m. mrrobotx37, @.***> wrote:

TODO

def backdoor(): global device if device != 'none': if shutil.which("msfvenom") is not None: try: d = adbutils.adb.device(device) print(arrow + ("[{0}+{1}] Specify the payload: (com.whatsapp)").format(Fore.RED, Fore.WHITE)) table = Table() table.add_column("Name", style="cyan") table.add_column("Description", style="magenta") table.add_row("meterpreter_reverse_http", "Android Meterpreter Reverse HTTP Stager") table.add_row("meterpreter_reverse_https", "Android Meterpreter Reverse HTTPS Stager") table.add_row("meterpreter_reverse_tcp", "Android Meterpreter Reverse TCP Stager") table.add_row("meterpreter_reverse_http_inline", "Android Meterpreter Reverse HTTP Inline") table.add_row("meterpreter_reverse_https_inline", "Android Meterpreter Reverse HTTPS Inline") table.add_row("meterpreter_reverse_tcp_inline", "Android Meterpreter Reverse TCP Inline") table.add_row("shell_reverse_http", "Android Command Shell Reverse HTTP Stager") table.add_row("shell_reverse_https", "Android Command Shell Reverse HTTP Stager") table.add_row("shell_reverse_tcp", "Android Command Shell Reverse HTTP Stager") console = Console() console.print(table) print(arrow + ("[{0}+{1}] Specify the payload: (meterpreter_reverse_http)").format(Fore.RED, Fore.WHITE)) payload = my_input(arrow + " adbsploit" + Fore.RED + "(backdoor) " + Fore.WHITE + "> ") if payload == "": print() elif payload == "meterpreter_reverse_http": print() elif payload == "meterpreter_reverse_https": print() elif payload == "meterpreter_reverse_tcp": print() elif payload == "meterpreter_reverse_http_inline": print() elif payload == "meterpreter_reverse_https_inline": print() elif payload == "meterpreter_reverse_tcp_inline": print() elif payload == "shell_reverse_http": print() elif payload == "shell_reverse_httpS": print() elif payload == "shell_reverse_TCP": print() else: print(arrow + ("[{0}+{1}] Select a correct payload...").format(Fore.RED, Fore.WHITE)) except: print(arrow + ("[{0}+{1}] An error ocurred generating the backdoor...").format(Fore.RED, Fore.WHITE)) else: print(arrow + ("[{0}+{1}] ADBSploit use Metasploit for generating backdoors, you must install to use this option").format( Fore.RED, Fore.WHITE)) print(arrow + ( "[{0}+{1}] Install it via https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers ").format( Fore.RED, Fore.WHITE)) else: print(arrow + ("[{0}+{1}] You must select a device before...").format(Fore.RED, Fore.WHITE))

— Reply to this email directly, view it on GitHub https://github.com/mesquidar/adbsploit/issues/17, or unsubscribe https://github.com/notifications/unsubscribe-auth/AFZ7SHCOLTF25JOB6OTDD73VBJNQLANCNFSM5RMM7A3Q . You are receiving this because you are subscribed to this thread.Message ID: @.***>