dEEpEst Posted June 6, 2019 Share Posted June 6, 2019 AndTroj v2 This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up A tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus Features This is the hidden content, please Sign In or Sign Up Using custom dns for harvester phishing webpages(license Pro Ngrok). This is the hidden content, please Sign In or Sign Up Send Phonelist for sms spoofing(license Pro twilio). This is the hidden content, please Sign In or Sign Up Use Harvesting phishing page and BeEF-XSS Access(Hook js payload). This is the hidden content, please Sign In or Sign Up Bypass 90% Android Antivirus(Obfuscation Method). This is the hidden content, please Sign In or Sign Up Bind metasploit meterpreter payload(android) Original APKs. This is the hidden content, please Sign In or Sign Up Anti Forensic connections in targets(using tor proxys for ngrok connections). This is the hidden content, please Sign In or Sign Up Create Automations persistence and bash backdoor for android phones. This is the hidden content, please Sign In or Sign Up Spoof Mail with smtp2go & Tamplates mails instagram,twitter,gmail,facebook,yahoo. NEW Main Menu... This is the hidden content, please Sign In or Sign Up This tool creates a tune-up of the Metasploit program, unlocks the program and integrates it into the footage. During this operation, the vagaries are mimicking the unpacking Android antivirus and compiling it after the completion of the integration. For the program's service, it's one-on-one and rearwards automatically after getting back access on Android OS Bargas And it runs to allow the service to be activated every hour, all of which is done automatically Social Engineering Menu... This is the hidden content, please Sign In or Sign Up After completing the build-in program that intercepts itself, I will show you the social engineering methods that can be sent to the victim in three ways. A Web SpearPhishing is website and another way through Sending Spoof SMS link download RAT to content sms. How to Run apt-get install -y tor apktool aapt proxychains python-socks zipalign kali-linux-full openjdk-8-jdk git clone https://github.com/unk9vvn/AndTroj.git cd AndTroj && chmod 755 atj.py requirements.txt pip install -r requirements.txt ./atj.py # After Running atj Only support the Kali Linux 2018 operating system This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts