oppsec / Apepe

📲 Enumerate information from an app based on the APK file

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

📲 Apepe

📲 Enumerate information from an app based on the APK file



🕵️ What is Apepe?

🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...


⚡ Installing / Getting started

A quick guide of how to install and use Apepe.

1. git clone https://github.com/oppsec/Apepe.git
2. pip install -r requirements.txt --break-system-packages
3. python3 main -f <apk-file.apk>

⚙️ Pre-requisites

  • Python installed on your machine
  • The .apk from the target mobile app
  • Androguard lib on 3.3.5 version

✨ Features

  • Try to detect target app development language
  • List the activies, permissions, services, and libraries used by the app
  • Made in Python

🖼️ Example


📚 To-Do

  • Support to .ipa files (iOS)
  • Detect certificate library used by the app
  • Add argument to return list of possible SSL Pinning scripts
  • Common vulnerabilities check?

🔨 Contributing

A quick guide of how to contribute with the project.

1. Create a fork from Apepe repository
2. Download the project with git clone https://github.com/your/Apepe.git
3. cd Apepe/
4. Make your changes
5. Commit and make a git push
6. Open a pull request

⚠️ Warning

  • The developer is not responsible for any malicious use of this tool.

About

📲 Enumerate information from an app based on the APK file

License:MIT License


Languages

Language:Python 100.0%