📲 Enumerate information from an app based on the APK file

oppsec oppsec Last update: Feb 21, 2024

📲 Apepe

📲 Enumerate information from an app based on the APK file



🕵️ What is Apepe?

🕵️ Apepe is a Python tool developed to help pentesters and red teamers to easily get information from the target app. This tool will extract basic informations as the package name, if the app is signed and the development language...


⚡ Installing / Getting started

A quick guide of how to install and use Apepe.

1. git clone https://github.com/oppsec/Apepe.git
2. pip install -r requirements.txt
3. python3 main -f <apk-file.apk>

⚙️ Pre-requisites

  • Python installed on your machine
  • The .apk from the target mobile app

✨ Features

  • Detect mobile app development lanague
  • Information gathering
  • Extremely fast
  • Low RAM and CPU usage
  • Made in Python

🖼️ Example


📚 To-Do

  • Support to .ipa files (iOS)
  • Detect certificate library used by the app
  • Add argument to return list of possible SSL Pinning scripts
  • Common vulnerabilities check?

🔨 Contributing

A quick guide of how to contribute with the project.

1. Create a fork from Apepe repository
2. Download the project with git clone https://github.com/your/Apepe.git
3. cd Apepe/
4. Make your changes
5. Commit and make a git push
6. Open a pull request

⚠️ Warning

  • The developer is not responsible for any malicious use of this tool.

Subscribe to our newsletter