Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/oppsec/apepe

📲 Enumerate information from an app based on the APK file
https://github.com/oppsec/apepe

android apk mobile mobile-pentest pentest python redteam

Last synced: about 3 hours ago
JSON representation

📲 Enumerate information from an app based on the APK file

Awesome Lists containing this project

README

        

# 📲 Apepe
> 📲 Enumerate information from an app based on the APK file










___

### 🕵️ What is Apepe?
🕵️ **Apepe** is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the content, get app settings, suggest SSL Pinning bypass based on the app detected language, extract deeplinks from AndroidManifest.xml, JSONs and DEX files.


### ⚡ Installing / Getting started

A quick guide of how to install and use Apepe.

```shell
1. git clone https://github.com/oppsec/Apepe.git
2. pip install -r requirements.txt --break-system-packages
3. python3 main -h
```


### ⚙️ Pre-requisites
- [Python](https://www.python.org/downloads/) installed on your machine
- APK file from the targeted app
- Androguard library >= 4.1.2


### ✨ Features
- List the activies, permissions, services, and libraries used by the app
- Identify the app development language based on classes name
- Suggest SSL Pinnings bypass with the `-l` flag
- Find deeplinks in DEX, JSONs files and AndroidManifest.xml with the `-d` flag


### 🖼️ Preview


### 🔨 Contributing

A quick guide of how to contribute with the project.

```shell
1. Create a fork from Apepe repository
2. Download the project with git clone https://github.com/your/Apepe.git
3. cd Apepe/
4. Make your changes
5. Commit and make a git push
6. Open a pull request
```


### ⚠️ Warning
- The developer is not responsible for any malicious use of this tool.