APKLeaks Logo

APKLeaks

0
Free
Visit Website

Scanning APK file for URIs, endpoints & secrets. Installation: - From PyPi: $ pip3 install apkleaks - From Source: $ git clone https://github.com/dwisiswant0/apkleaks $ cd apkleaks/ $ pip3 install -r requirements.txt - From Docker: $ docker pull dwisiswant0/apkleaks:latest Dependencies: APKLeaks utilizes the jadx disassembler to decompile APK files. If jadx is not present in your system, it will prompt you to download it. Usage: Simply, $ apkleaks -f ~/path/to/file.apk # from Source $ python3 apkleaks.py -f ~/path/to/file.apk # or with Docker $ docker run -it --rm -v /tmp:/tmp dwisiswant0/apkleaks:latest -f /tmp/file.apk Options: Here are all the options it supports. - -f, --file: APK file to scanning - -o, --output: Write to file results (random if not set) - -p, --pattern: Path to custom patterns JSON - -a, --args: Disassembler arguments

FEATURES

ALTERNATIVES

A Burp extension for scanning JavaScript files for endpoint links

Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.

A cloud-based DAST solution that discovers, inventories, and tests web applications and APIs for security vulnerabilities across diverse environments.

A deliberately vulnerable modern day app with lots of DOM related bugs

Protect your Fastify server against CSRF attacks with a series of utilities and recommendations for secure application development.

A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.

ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.

A tool that uses Apache mod_rewrite to redirect invalid URIs to a specified URL