

Wow! It happened so Fast that 3 sessions got opened one after another. Now you should be in the ROOT directory, you can check by typing: To do this, navigate to the directory using the following commands: You need to upload the shell script to etc/init.d/ so that it is persistent even after Reboot! (So a total of 5 lines) Step 3: Upload It to the Hacked Android System: There is a 'space' between 'while' and ':'

(Don't ask me why.)ĭo am start -user 0 -a -n /.MainActivity

I guess, you will have to write it on your own. Updated Script v3 (Compatible with any android version)ĬRITICAL: DO NOT COPY/PASTE THE SCRIPT DIRECTLY, OR IT (may) WON'T WORK /!\ Move/Copy this to the Home/Root folder of KALI.
