Ghost : Android Debug Bridge To Remotely Access An Android Device

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. It Framework gives you the power and convenience of remote Android device administration.

Installation

cd ghost
chmod +x install.sh
./install.sh

Un-installation

cd ghost
chmod +x uninstall.sh
./uninstall.sh

Execution

To execute the Framework you should execute the following command.

ghost

Also Read – BadBlood : Microsoft Active Directory Domain With A Structure

Why?

  • It has a simple and clear UX/UI. It is easy to understand and it will be easier for you to master the it.
  • It can be used to remove the remote Android device password if it was forgotten.
  • It can be used to access the remote Android device shell without using OpenSSH or other protocols.

Disclaimer

Usage of the this Framework for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state, federal, and international laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

R K

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

1 day ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

1 day ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

1 day ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

2 days ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

2 days ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

2 days ago