ADBBrute was written to bruteforce access to any Android device with ADB enabled.
Print the help to get all necessary information
$ python3 ADBBrute.py -h
usage: ADBBrute.py [-h] [--device DEVICE] [--type TYPE]
Android LockScreen Bruteforce
optional arguments:
-h, --help show this help message and exit
--device DEVICE Specify the device to bruteforce
--type TYPE Type of bruteforce (gui / locksettings
Without argument, all connected devices will be displayed:
$ python3 ADBBrute.py
[x] Please specify the device to bruteforce (--device)
- 192.168.57.109:5555
Finally, you need to specify the supported bruteforce methods:
- gui
- locksettings
Once specified, you just have to wait few time to get your Android PIN:
$ python3 ADBBrute.py --device 192.168.57.109:5555 --type gui
[x] Getting information on 192.168.57.109:5555 - vbox86p (Samsung Galaxy S8)
Try 1234
Try 1111
Try 0000
PIN identified: 0000
Go to Settings > About phone and press on build number 7 times to enable developper mode.
Once enabled, go to Settings > Developer options and enable USB debugging
adb shell settings put global development_settings_enabled 1
adb shell setprop persist.service.adb.enable 1
Régis SENET (rsenet)
Bug reports and pull requests are welcome on GitHub.
The project is available as open source under the terms of the GPLv3