Build your own Android backdoor. In this demonstration we have used Victim (Mobile) and Attacker (Kali).

Attacker PC = Kali Linux
Victim = Mobile Redmi Android 7.0

The detailed code analysis of this tool is also the part of ethical hacking classes offered by International Institute of Cyber Security (

Subscribe to see more official content of the cyber security news channel:

Official website:

Follow us on our social networks.



For more installation and usage instruction please refer to the link below:

#evildroid #hacking #Android