Skip to content
/ Apepe Public

📲 Enumerate information from an app based on the APK file

License

Notifications You must be signed in to change notification settings

oppsec/Apepe

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

📲 Apepe

📲 Enumerate information from an app based on the APK file



🕵️ What is Apepe?

🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...


⚡ Installing / Getting started

A quick guide of how to install and use Apepe.

1. git clone https://github.com/oppsec/Apepe.git
2. pip install -r requirements.txt --break-system-packages
3. python3 main -f <apk-file.apk>

⚙️ Pre-requisites

  • Python installed on your machine
  • The .apk from the target mobile app
  • Androguard lib on 3.3.5 version

✨ Features

  • Try to detect target app development language
  • List the activies, permissions, services, and libraries used by the app
  • Made in Python

🖼️ Example


📚 To-Do

  • Support to .ipa files (iOS)
  • Detect certificate library used by the app
  • Add argument to return list of possible SSL Pinning scripts
  • Common vulnerabilities check?

🔨 Contributing

A quick guide of how to contribute with the project.

1. Create a fork from Apepe repository
2. Download the project with git clone https://github.com/your/Apepe.git
3. cd Apepe/
4. Make your changes
5. Commit and make a git push
6. Open a pull request

⚠️ Warning

  • The developer is not responsible for any malicious use of this tool.