Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked AndTroj v2


dEEpEst

Recommended Posts

A tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus

Features

  • ✔️ Using custom dns for harvester phishing webpages(license Pro Ngrok).
  • ✔️ Send Phonelist for sms spoofing(license Pro twilio).
  • ✔️ Use Harvesting phishing page and BeEF-XSS Access(Hook js payload).
  • ✔️ Bypass 90% Android Antivirus(Obfuscation Method).
  • ✔️ Bind metasploit meterpreter payload(android) Original APKs.
  • ✔️ Anti Forensic connections in targets(using tor proxys for ngrok connections).
  • ✔️ Create Automations persistence and bash backdoor for android phones.
  • ✔️ Spoof Mail with smtp2go & Tamplates mails instagram,twitter,gmail,facebook,yahoo. NEW

Main Menu...

This is the hidden content, please

This tool creates a tune-up of the Metasploit program, unlocks the program and integrates it into the footage. During this operation, the vagaries are mimicking the unpacking Android antivirus and compiling it after the completion of the integration. For the program's service, it's one-on-one and rearwards automatically after getting back access on Android OS Bargas And it runs to allow the service to be activated every hour, all of which is done automatically

Social Engineering Menu...

This is the hidden content, please

After completing the build-in program that intercepts itself, I will show you the social engineering methods that can be sent to the victim in three ways. A Web SpearPhishing is website and another way through Sending Spoof SMS link download RAT to content sms.

How to Run

apt-get install -y tor apktool aapt proxychains python-socks zipalign kali-linux-full openjdk-8-jdk
git clone https://github.com/unk9vvn/AndTroj.git
cd AndTroj && chmod 755 atj.py requirements.txt
pip install -r requirements.txt
./atj.py

# After Running
atj

Only support the Kali Linux 2018 operating system

D

A tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus

Features

  • ✔️ Using custom dns for harvester phishing webpages(license Pro Ngrok).
  • ✔️ Send Phonelist for sms spoofing(license Pro twilio).
  • ✔️ Use Harvesting phishing page and BeEF-XSS Access(Hook js payload).
  • ✔️ Bypass 90% Android Antivirus(Obfuscation Method).
  • ✔️ Bind metasploit meterpreter payload(android) Original APKs.
  • ✔️ Anti Forensic connections in targets(using tor proxys for ngrok connections).
  • ✔️ Create Automations persistence and bash backdoor for android phones.
  • ✔️ Spoof Mail with smtp2go & Tamplates mails instagram,twitter,gmail,facebook,yahoo. NEW

Main Menu...

This is the hidden content, please

This tool creates a tune-up of the Metasploit program, unlocks the program and integrates it into the footage. During this operation, the vagaries are mimicking the unpacking Android antivirus and compiling it after the completion of the integration. For the program's service, it's one-on-one and rearwards automatically after getting back access on Android OS Bargas And it runs to allow the service to be activated every hour, all of which is done automatically

Social Engineering Menu...

This is the hidden content, please

After completing the build-in program that intercepts itself, I will show you the social engineering methods that can be sent to the victim in three ways. A Web SpearPhishing is website and another way through Sending Spoof SMS link download RAT to content sms.

How to Run

apt-get install -y tor apktool aapt proxychains python-socks zipalign kali-linux-full openjdk-8-jdk
git clone https://github.com/unk9vvn/AndTroj.git
cd AndTroj && chmod 755 atj.py requirements.txt
pip install -r requirements.txt
./atj.py

# After Running
atj

Only support the Kali Linux 2018 operating system

Download: 
This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.