You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With a few tweak to my system and the kwetza script I was able to get this to decompile, modify, and recompile an apk successfully.
My question is, does this do something different that the msfvenom module that exists in Metasploit Framework? I'm not trying to be a dick, I just legitimately want to know if there is a benefit of one tool over the other?
My bigger interest, rather than hijacking an existing activity in the APK, would be to create a secondary, more hidden activity that could then be called in a transparent way by a persistence script.
The text was updated successfully, but these errors were encountered:
With a few tweak to my system and the kwetza script I was able to get this to decompile, modify, and recompile an apk successfully.
My question is, does this do something different that the msfvenom module that exists in Metasploit Framework? I'm not trying to be a dick, I just legitimately want to know if there is a benefit of one tool over the other?
My bigger interest, rather than hijacking an existing activity in the APK, would be to create a secondary, more hidden activity that could then be called in a transparent way by a persistence script.
The text was updated successfully, but these errors were encountered: