Skip to content

rsenet/adbbrute

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

About ADBBrute

ADBBrute was written to bruteforce access to any Android device with ADB enabled.

Usage

Print the help to get all necessary information

$ python3 ADBBrute.py -h
usage: ADBBrute.py [-h] [--device DEVICE] [--type TYPE]

Android LockScreen Bruteforce

optional arguments:
  -h, --help       show this help message and exit
  --device DEVICE  Specify the device to bruteforce
  --type TYPE      Type of bruteforce (gui / locksettings

Without argument, all connected devices will be displayed:

$ python3 ADBBrute.py
[x] Please specify the device to bruteforce (--device)
 - 192.168.57.109:5555

Finally, you need to specify the supported bruteforce methods:

  • gui
  • locksettings

Once specified, you just have to wait few time to get your Android PIN:

$ python3 ADBBrute.py --device 192.168.57.109:5555 --type gui
[x] Getting information on 192.168.57.109:5555 - vbox86p (Samsung Galaxy S8)
Try 1234
Try 1111
Try 0000
PIN identified: 0000

Enable USB-Debugging

Via GUI:

Go to Settings > About phone and press on build number 7 times to enable developper mode.

Once enabled, go to Settings > Developer options and enable USB debugging

Via ADB:

adb shell settings put global development_settings_enabled 1
adb shell setprop persist.service.adb.enable 1

Author

Régis SENET (rsenet)

Contributing

Bug reports and pull requests are welcome on GitHub.

License

The project is available as open source under the terms of the GPLv3

About

ADBBrute allows bruteforcing Android LockScreen

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages