Skip to content

vighneshdeepweb/AndroidPayloadEmbedder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

AndroidPayloadEmbedder

This script performs the following actions to embed a Metasploit generated APK file into another legitimate APK.

  • decompiles a Metasploit APK file, and any other APK file.
  • locates the main Activity entrypoint in the APK being targeted
  • copies all Metasploit APK staging code to destination APK
  • adjusts the main Activity entrypoint smali file with an invoke-static call to kick off the Metasploit stage.
  • adjusts the final AndroidManifest.xml with appropriate added permissions
  • recompiles, and resigns the final APK file.

All actions are performed within the "~/.ae" directory which is created during runtime. The script requires that keytool, jarsigner, and apktool are installed. A KALI distribution will work well to run this script on.git

Releases

No releases published

Packages

No packages published

Languages