Forum Thread: Persistent Backdoor Payload in an Original .Apk File??

Persistent Backdoor Payload in an Original .Apk File??

Hi all

Persistent backdoor Payload in an Original .Apk File??

Ive i just sucessfully backdoored and apk over the internet and moblie internet. using the guide: Embed a Metasploit Payload in an Original .Apk File

https://null-byte.wonderhowto.com/how-to/embed-metasploit-payload-original-apk-file-0166901/
only thing i had too do was the extra signing part
java -jar signapk.jar certificate.pem key.pk8 yourapkname.apk signedapkname.apk

My question is would it be possible to make this Persistent? ive read How to Create a Persistent Back Door in Android Using Kali Linux:

https://null-byte.wonderhowto.com/how-to/create-persistent-back-door-android-using-kali-linux-0161280/

but thats only for the apk that msfpayload msfvenom makes.

any heads up would be great.

1 Response

i tried a lot of times to edit the original .sh script made for the meta payload but i can't , i am wondering the same if anybody could help here

Share Your Thoughts

  • Hot
  • Active