A Python-based hacking tool for remotely exploiting Android devices via ADB and Metasploit to gain Meterpreter sessions.
PhoneSploit Pro is a Python-based security tool that remotely exploits Android devices using ADB and Metasploit-Framework. It automates the process of gaining Meterpreter sessions, allowing for comprehensive device control and security testing. The tool also functions as a full ADB toolkit for managing Android devices over Wi-Fi or USB.
Security researchers, ethical hackers, and penetration testers focused on Android device security assessments and vulnerability testing.
It simplifies Android penetration testing by automating complex Metasploit and ADB workflows into a single tool, reducing manual effort and providing an all-in-one solution for remote exploitation and device management.
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Integrates a wide range of ADB operations, from file transfer to app management, streamlining device control without memorizing commands, as shown in the extensive features list.
Automates payload creation, installation, and execution to gain Meterpreter sessions in one click, simplifying exploitation workflows for security assessments.
Includes LAN scanning to discover hosts and probe for open ADB ports, aiding in target identification during security tests, as detailed in the features.
Provides clear setup tutorials and emphasizes responsible use in the disclaimer, making it accessible for learning Android security concepts.
Requires installation of multiple external tools like ADB, Metasploit, scrcpy, and Nmap, which can be time-consuming and error-prone, as noted in the requirements section.
The README explicitly states that some features might not work properly on Windows, reducing reliability and making Linux the recommended platform.
While educational, its remote exploitation capabilities could be abused if used without authorization, and the disclaimer places full responsibility on the user, raising ethical concerns.
Focuses on automation, which might restrict advanced users who prefer fine-grained control over Metasploit or ADB parameters, as it abstracts complex commands.