Skip to content

shahidshaik786/Android_APK_ReverseShell

Repository files navigation

Android APK Reverse Shell

This project demonstrates a basic reverse shell implemented in an Android APK that connects back to a Python-based listener running on a remote server. It's intended strictly for educational and research purposes, such as:

  • Understanding Android internals
  • Exploring penetration testing techniques
  • Learning about Android reverse engineering
  • Practicing ethical hacking in lab environments

📁 Contents

  • AndroidClient/: Android Studio project generating the reverse shell APK
  • PythonServer/: Simple Python-based HTTP listener to receive commands and output

⚠️ Disclaimer

🚨 Disclaimer:
This project is published for educational and research purposes only.
The author does not support or encourage any illegal activities, unauthorized access, or unethical use of this tool.

By using this code, you agree that:

  • You are responsible for complying with all applicable local, state, and federal laws.
  • The author assumes no liability for any misuse or damage caused by this code.
  • You will only use it in controlled lab environments or systems you have explicit permission to test.

💡 Recommended Use

  • Run the Python server on your machine or lab environment
  • Install the generated APK on your test Android device/emulator
  • Observe communication between client and server for security learning

🧪 Educational Use Only

This repository is ideal for:

  • Cybersecurity students
  • Ethical hackers
  • Android security researchers
  • Red team simulation labs

📜 License

This project is released under the MIT License. See the LICENSE file for details.

About

Android_APK_ReverseShell

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors