Search the Community
Showing results for tags 'meterpreter linux android shell reverse_tcp'.
NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE. I'm working with metasploit on TERMUX. So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again . So , I su
hey guys ive been exploiting my OWN !!! tablet and phone recently my phone is running marshmellow 6.0.1 the tablet uhmm ...kit kat ? something lol 4.4 i think lol ok ive created a payload with msfvenom and made the .apk payload and u have to accept the permisions and install and open the payload to run the binary right ?? ok what i want to know is just like in windows u can create shellcode and drop it into the cmd or drop it into a jpg file and it just runs your binary no questions asked lol is there any way to run somekind of shellcode "like" payload on android