AdbNet: Exploitation Framework for Android devices

AdbNet is an Exploitation-Framework that lets you search for and exploit vulnerable Android devices around the world.

68747470733a2f2f696d6167652e666c617469636f6e2e636f6d2f69636f6e732f706e672f3531322f3136302f3136303133382e706e67

Specifications

-Post-Exploitation modules for its control and regulation to which you are connected.
- Scanners to search for vulnerable Android devices around the world for exploitation.
- Options for managing the connected devices.
- Options to check if the devices you are connected to are connected or offline.
-IP-Search to retrieve information on a specific IP.
- Options to dump the IP addresses of vulnerable Android devices.

Installation

Obtain the required API keys

Create one for free on censys.io and then go to your account page and get the free api_id and api_secret key, open 'adbnet.py' and edit the api id and api key as shown in the image below:

key

Create a shodan.io account and go to your account to get the free api key, once you copy it, open 'adbnet.py' and edit the api key as shown in the image below:

shodan key

sudo apt install pq
sudo apt install adb
pip3 install colorama
pip3 install requests
python3 adbnet.py or python adbnet.py or py adbnet.py

Use

module 768x197

First, run the "dump shodan" or "dump censy" command (dump shodan is recommended) to dump the IP addresses of vulnerable devices.

Then, after finding an IP address you want to test, run the command "” where you will be prompted to enter the destination IP address. Once you've entered the destination IP address, you'll be prompted to enter the port you'll try to connect to. For the port, you can try entering “5555” or “4444” because these are the most common. If you want, you can try to find the specific port, but it may take a little more time.

AdbNet will now try to connect to the vulnerable Android device.
If it fails to connect, try another IP.

If you can connect to a device, you can check if you are actually connected using the "devices" command.

 You can only connect to one device at a time! To kill sessions use the 'killall' command!

To open a shell and execute commands on the vulnerable device, use the command “".

Application Screenshots

124667060 e2f5c280 de7c 11eb 8f69 2443aa7a7bd3 124667104 f30da200 de7c 11eb 9da3 098fa211a910

You can download it from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Android, exploitation framework, exploitation framework tools, exploitation framework github, iguru, iguru.gr

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).