Kwetza

LSE toolsLSE toolsKwetza (222)Kwetza (222)

Tool and Usage

Project details

License
GPLv2
Programming language
Python
Author
Chris Le Roy
Latest release
No release found
Latest release date
Unknown

Project health

64
This score is calculated by different factors, like project age, last release date, etc.

Introduction

Kwetza infects an existing Android application with either custom or default payload templates. It does so, to avoid detection by antivirus software. The tool uses using the target application's default permissions or injects additional permissions to gain additional functionality.

Usage and audience

Kwetza is commonly used for penetration testing or security assessment. Target users for this tool are pentesters and security professionals.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + The source code of this software is available

Author and Maintainers

Kwetza is under development by Chris Le Roy and maintained by SensePost.

Installation

Supported operating systems

Kwetza is known to work on Linux.

Kwetza alternatives

Similar tools to Kwetza:

60

uitkyk

Uitkyk is a security framework to identify Android malware by investigation memory. It detects suspicious processes by looking at the so-called memory heap.

All Kwetza alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information

Categories

This tool is categorized as a payload injection tool.

Related topics