Android Penetration Testing Made Easy with Evil-Droid Framework
Evil Droid: A Framework for Creating and Embedding Android Payloads
If you are interested in hacking or pentesting Android devices, you might have heard of Evil Droid. Evil Droid is a framework that allows you to create and embed malicious APK payloads into legitimate Android applications. In this article, we will explain what Evil Droid is, how it works, why you should use it, and how to protect yourself from it.
What is Evil Droid?
Evil Droid is a framework that creates and generates APK payloads that can penetrate Android platforms. It was developed by Mascerano Bachir and later modified by Evilwox. It is based on the Metasploit Framework, which is a popular tool for exploiting vulnerabilities in various systems. Evil Droid uses Metasploit's msfvenom command to generate the payloads, which can be customized according to the target device and the desired functionality.
evil droid github
Features of Evil Droid
Some of the features of Evil Droid are:
It can create payloads that can run in the background, hide from the launcher, and auto-start after reboot.
It can embed payloads into any APK file, such as games, social media apps, or utility apps.
It can bypass some antivirus and security software by using obfuscation techniques.
It can bind payloads with original app permissions, icons, and signatures.
It can support multiple payloads, such as reverse TCP, reverse HTTP, reverse HTTPS, meterpreter, shell, etc.
How to install and use Evil Droid
To install and use Evil Droid, you need to have the following dependencies:
evil droid framework
evil droid apk payload
evil droid metasploit
evil droid zenity
evil droid aapt
evil droid apktool
evil droid zipalign
evil droid xterm
evil droid mascerano bachir
evil droid dev-labs
evil droid android penetration
evil droid auto-hide
evil droid evilwox
evil droid new version
evil droid rusyan
evil droid master branch
evil droid changelog
evil droid video tutorial
evil droid youtube link
evil droid installation guide
evil droid screenshot
evil droid dependencies
evil droid usage instructions
evil droid legal disclaimer
evil droid educational purpose
evil droid icons folder
evil droid tools folder
evil droid readme file
evil droid git clone command
evil droid chmod command
evil droid script execution permission
evil droid korea institute of fusion energy
evil droid new scientist article
evil droid nuclear fusion reactor
evil droid 100 million degrees celsius
evil droid 30 seconds duration
evil droid net energy gain
evil droid holy grail experiment
evil droid mini sun breakthrough
evil droid seven times hotter than sun core
evil droid 15 million degrees kelvin
evil droid solar core wikipedia page
evil droid montana solar physics page
evil droid cornell university astronomy page
evil doid nasa sun fact sheet
You can download the tool from GitHub using the following commands:
git clone (
chmod +x evil-droid
This will launch the graphical user interface of Evil Droid, where you can choose the options for creating and embedding your payload. You can also watch this video tutorial for more details: (
Why use Evil Droid?
Evil Droid is a powerful and versatile tool for hacking or pentesting Android devices. Here are some reasons why you might want to use it:
Benefits of Evil Droid
It can help you test the security of your own or your client's Android devices by simulating real-world attacks.
It can help you learn more about Android exploitation techniques and improve your skills as a hacker or pentester.
It can help you perform various tasks on the compromised device, such as stealing data, spying on activities, taking screenshots, recording audio or video, etc.
It can help you evade detection by hiding your payload and making it look like a normal app.
Use cases of Evil Droid
Some of the possible use cases of Evil Droid are:
You can create a fake app that looks like a popular game or app and trick your target into installing it. This will give you access to their device and data.
You can embed your payload into an existing app that your target already uses and update it with the malicious version. This will allow you to maintain persistence and stealth on their device.
You can create a custom app that suits your target's interests or needs and offer it to them as a gift or a reward. This will make them more likely to install it and trust it.
How to protect yourself from Evil Droid?
Evil Droid is a dangerous tool that can compromise your Android device and data. Here are some ways to protect yourself from it:
Signs of Evil Droid infection
Some of the signs that your device might be infected by Evil Droid are:
Your device becomes slower or drains battery faster than usual.
Your device shows unexpected pop-ups, ads, or notifications.
Your device sends or receives strange messages, calls, or emails.
Your device displays unusual behavior, such as opening apps, changing settings, or turning on/off by itself.
Your device has apps that you don't recognize or remember installing.
Tips to avoid Evil Droid attacks
Some of the tips to avoid Evil Droid attacks are:
Do not download or install apps from unknown or untrusted sources. Only use official app stores or websites.
Do not click on links or attachments that look suspicious or come from unknown senders. They might lead you to malicious websites or files.
Do not grant unnecessary permissions to apps that you install. Check the app's description, reviews, and ratings before installing it.
Do not update your apps from outside the app store or without verifying the source. Some updates might contain malicious code or payloads.
Do use antivirus or security software on your device and keep it updated. Scan your device regularly for malware and remove any suspicious apps.
Evil Droid is a framework for creating and embedding Android payloads into legitimate apps. It can help you hack or pentest Android devices by exploiting their vulnerabilities and gaining access to their data and functions. However, it can also pose a serious threat to your own device and data if you are not careful. Therefore, you should always be aware of the signs of Evil Droid infection and follow the tips to avoid Evil Droid attacks.
Summary of the main points
In this article, we have covered the following points:
What is Evil Droid and how does it work?
Why use Evil Droid and what are its benefits and use cases?
How to protect yourself from Evil Droid and what are the signs and tips to avoid it?
Call to action
If you want to learn more about Evil Droid and how to use it, you can visit its GitHub page ( or watch this video tutorial ( However, please use this tool responsibly and ethically, and do not harm anyone with it. If you have any questions or feedback, feel free to leave a comment below.
Frequently Asked Questions
Here are some of the frequently asked questions about Evil Droid:
What is the difference between Evil Droid and other Android hacking tools?
Evil Droid is different from other Android hacking tools in that it can create and embed payloads into any APK file, not just specific ones. It can also bypass some antivirus and security software by using obfuscation techniques. It can support multiple payloads, such as reverse TCP, reverse HTTP, reverse HTTPS, meterpreter, shell, etc.
Is Evil Droid legal?
Evil Droid is legal as long as you use it for educational or research purposes only. However, if you use it for malicious purposes, such as hacking someone else's device without their consent, you might be breaking the law and facing legal consequences. Therefore, you should always use this tool responsibly and ethically, and do not harm anyone with it.
How can I detect if my device is infected by Evil Droid?
You can detect if your device is infected by Evil Droid by looking for some signs, such as slow performance, battery drain, pop-ups, ads, notifications, strange messages, calls, emails, unusual behavior, or unknown apps. You can also use antivirus or security software to scan your device for malware and remove any suspicious apps.
How can I prevent Evil Droid from infecting my device?
You can prevent Evil Droid from infecting your device by following some tips, such as not downloading or installing apps from unknown or untrusted sources, not clicking on links or attachments that look suspicious or come from unknown senders, not granting unnecessary permissions to apps that you install, not updating your apps from outside the app store or without verifying the source, and using antivirus or security software on your device and keeping it updated.
Where can I find more information about Evil Droid?
You can find more information about Evil Droid on its GitHub page ( or on this video tutorial ( You can also join the Evil Droid community on Telegram ( or Discord ( to ask questions, share feedback, or report issues.