Skip to content
/ apk2url Public

apk2url easily extracts URL and IP endpoints from an APK file to a .txt output. This is suitable for information gathering by red team, penetration testers and developers to quickly identify endpoints associated with an application.

License

Notifications You must be signed in to change notification settings

drerx/apk2url

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

apk2url

apk2url easily extracts URL and IP endpoints from an APK file to a .txt output. This is suitable for information gathering by red team, penetration testers and developers to quickly identify endpoints associated with an application.

Note: apk2url disassembles to Smali and performs Java decompilation to identify URLs and IPs.

Inspired by diggy, apk2url is rewritten and upgraded with IP support, stronger regex, filtering and Jadx decompilation.

Usage

./apk2url.sh /path/to/apk/file.apk

You can also install directly for easy access by running ./install.sh.
After that you can run apk2url anywhere:

apk2url /path/to/apk/file.apk

By default there are 2 output files in the "endpoints" directory:

  • <apkname>_endpoints.txt - Contains endpoints with url paths, has duplicates
  • <apkname>_uniqurls.txt - Contains unique endpoints

By default, the program does not log the path where endpoints are discovered.
To enable logging, run as follows:

apk2url /path/to/apk/file.apk log

*Tested on Kali 2023.2 and Ubuntu 22.04

Dependencies

Use apt for easy installation of these tools:

  • Apktool
  • Jadx

Demo Run

image

Disclaimer

This tool is for educational and testing purposes only. Do not use it to exploit the vulnerability on any system that you do not own or have permission to test. The authors of this script are not responsible for any misuse or damage caused by its use.

About

apk2url easily extracts URL and IP endpoints from an APK file to a .txt output. This is suitable for information gathering by red team, penetration testers and developers to quickly identify endpoints associated with an application.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages