📲 Enumerate information from an app based on the APK file
🕵️ Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the content, get app settings, suggest SSL Pinning bypass based on the app detected language, extract deeplinks from AndroidManifest.xml, JSONs and DEX files.
A quick guide of how to install and use Apepe.
1. git clone https://github.com/oppsec/Apepe.git
2. pip install -r requirements.txt --break-system-packages
3. python3 main -h
- Python installed on your machine
- APK file from the targeted app
- Androguard library >= 4.1.2
- List the activies, permissions, services, and libraries used by the app
- Identify the app development language based on classes name
- Suggest SSL Pinnings bypass with the
-l
flag - Find deeplinks in DEX, JSONs files and AndroidManifest.xml with the
-d
flag
A quick guide of how to contribute with the project.
1. Create a fork from Apepe repository
2. Download the project with git clone https://github.com/your/Apepe.git
3. cd Apepe/
4. Make your changes
5. Commit and make a git push
6. Open a pull request
- The developer is not responsible for any malicious use of this tool.