LSE toolsLSE toolsKwetza (290)Kwetza (290)

Tool and Usage

Project details
Programming languagePython
AuthorChris Le Roy
Latest releaseNo release found

Project health

This score is calculated by different factors, like project age, last release date, etc.


Kwetza infects an existing Android application with either custom or default payload templates. It does so, to avoid detection by antivirus software. The tool uses using the target application's default permissions or injects additional permissions to gain additional functionality.

Usage and audience

Kwetza is commonly used for penetration testing or security assessment. Target users for this tool are pentesters and security professionals.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:


  • + The source code of this software is available

Author and Maintainers

Kwetza is under development by Chris Le Roy and maintained by SensePost.


Supported operating systems

Kwetza is known to work on Linux.

Kwetza alternatives

Similar tools to Kwetza:



Uitkyk is a security framework to identify Android malware by investigation memory. It detects suspicious processes by looking at the so-called memory heap.

All Kwetza alternatives

Found an improvement? Help the community by submitting an update.

Related tool information


This tool is categorized as a payload injection tool.

Related terms