
APKLeaks
#Application Protection#Application Security
Snyk Code is a real-time SAST tool that provides secure code analysis and actionable remediation advice to prevent code delays and ensure secure development.
Examining APK Files for URIs, Endpoints, and Secrets
Examining the APK file for URIs, endpoints, and secrets is crucial for maintaining both security and functionality.
Installation Instructions for APKLeaks
To install APKLeaks, you have three different options available:
- From PyPi: Execute the command $ pip3 install apkleaks
- From Source:
1. Clone the repository using: $ git clone https://github.com/dwisiswant0/apkleaks
2. Change into the directory with: $ cd apkleaks/
3. Install the required packages using: $ pip3 install -r requirements.txt
- From Docker: Pull the latest image with: $ docker pull dwisiswant0/apkleaks:latest
Dependencies:
APKLeaks relies on the jadx disassembler to decompile APK files. If jadx is not already installed on your system, you will receive a prompt to download it.
Usage:
To utilize APKLeaks, execute one of the following commands:
- From Source: $ apkleaks -f ~/path/to/file.apk
- Alternatively, you may use Python directly: $ python3 apkleaks.py -f ~/path/to/file.apk
- Using Docker: $ docker run -it --rm -v /tmp:/tmp dwisiswant0/apkleaks:latest -f /tmp/file.apk
Options:
APKLeaks provides the following options for customization:
- -f, --file: Specify the APK file that you want to scan.
- -o, --output: Save the scan results to a file (a random filename will be generated if not specified).
- -p, --pattern: Provide the path to custom patterns formatted in JSON.
- -a, --args: Define any specific arguments for the disassembler.


