Embed a Metasploit Payload in an Original .Apk File | Part 2 – Do It Manually Hi guys, I'm here again with my second tutorial, as I promised. Metasploit's flagship product, the Meterpreter, is very powerful and an all-purpose payload. Once installed on the victim machine, we can do whatever we want to their system by sending out commands to it. For example, we could grab sensitive data out of the compromised system. The Meterpreter payload also comes as an installable .apk file for Android systems. Great! Now we can use Metasploit to compromise Android phones also. But if you have tried out these payloads you would know that they do not look convincing. No one in their right mind is going to install and run such an app, which apparently does nothing when it is opened. So how are we going to make the victim run the payload app in their phone? One of the solutions is that you can embed the payload inside another legitimate app. The app will look and behave exactly as th...