Build your own Android backdoor. In this demonstration we have used Victim (Mobile) and Attacker (Kali).

Attacker PC = Kali Linux
Victim = Mobile Redmi Android 7.0

The detailed code analysis of this tool is also the part of ethical hacking classes offered by International Institute of Cyber Security (http://www.iicybersecurity.com/ethical-hacking.html)

Subscribe to see more official content of the cyber security news channel:

https://www.youtube.com/channel/UCkSS40hQHvq7_QvevJuME_g

Official website: https://www.securitynewspaper.com/

Follow us on our social networks.

Twitter: https://twitter.com/Webimprints

Facebook: https://www.facebook.com/webimprint/

For more installation and usage instruction please refer to the link below:
https://www.securitynewspaper.com/2019/03/04/generate-android-app-in-2-mins-and-hack-any-android-mobile/

#evildroid #hacking #Android

source