GitHub - UltimateHackers/Diggy: Extract enpoints from apk files.

README.md

Diggy can extract endpoints/URLs from apk files. It saves the result into a txt file for further processing.

screenshot

Dependencies

Usage

./diggy.sh /path/to/apk/file.apk

You can also install it for easier access by running install.sh
After that, you will be able to run Diggy as follows:

diggy /path/to/apk/file.apk

Note: In the installed mode, results will be saved in /root/Diggy directory while in normal mode the results will be saved in the directory you ran diggy from.


为您推荐了相关的技术文章:

  1. Injecting Metasploit Payloads into Android Applications – Manually
  2. Droidefense - Advance Android Malware Analysis Framework
  3. GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
  4. GitHub - abhi-r3v0/Adhrit: Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.
  5. Bypassing Android Anti-Emulation, Part (III)

原文链接: github.com