A tool to scan APK files for URIs, endpoints, secrets, and sensitive data patterns.
APKLeaks is a Python-based security tool that scans Android APK files to uncover URIs, endpoints, secrets, and other sensitive data. It decompiles APKs using jadx and applies regex patterns to identify potential security exposures, helping to prevent data leaks in mobile applications.
Security researchers, penetration testers, and mobile app developers who need to audit Android applications for hidden secrets and endpoints.
APKLeaks offers a straightforward, automated way to detect sensitive information in APKs without manual code review, with support for custom patterns and multiple output formats for flexible integration into security workflows.
Scanning APK file for URIs, endpoints & secrets.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports installation via PyPi, source, and Docker, making deployment straightforward across various environments with minimal configuration.
Allows users to define custom regex patterns in JSON format, enabling targeted searches for specific types of sensitive data like API keys or endpoints.
Outputs results in both text and JSON formats, facilitating easy integration into automated security workflows and reporting tools.
Leverages the jadx tool for decompilation and provides control over disassembler arguments, allowing customization for specific analysis needs.
Requires jadx to be installed or downloaded separately, which can lead to installation failures or version compatibility issues, adding setup complexity.
Only performs static code scanning based on decompiled output, missing runtime vulnerabilities and potentially struggling with heavily obfuscated or packed APKs.
Pattern matching can generate numerous false positives due to generic regex patterns, necessitating manual verification and increasing analysis time.
Has experienced issues like OS command injection bugs, as noted in the acknowledgments, raising concerns about the tool's own security robustness.