/PassiveAPKSniffer

This tool basically decompress APK with using Jadx then read files extension which is supported then try to find secret data and show them.

Primary LanguageC#



PassiveAPKSniffer

PassiveAPKSniffer is a Console Application written in .NET 5.0. It decompiles on the target APK using some parameters it receives from the user, and searches for sensitive data among the source files it obtains. The application working logic is as follows.

  • Gets the path of Jadx, Rule and APK files from the user.
  • Decompiles the target application using Jadx.
  • It tries to find sensitive data by searching the contents of the source files it has obtained, depending on the regex in the Rules file that it has previously received from the user. [The larger the given regex file, the longer the search will take. 2 regex file formats have been shared with you in the related resource Resource.]
  • The result obtained is written in json format.

Details

The available arguments are as follows.

Argument Explain
jadx_path The path to the jadx file to run.
download_jadx Used for Jadx download.
apk_path The APK file path to analyze.
rule_path Specifies the regex rule file path to use for sensitive data search.

Example Usage

PassiveAPKSniffer.exe --download_jadx

PassiveAPKSniffer.exe --jadx_path C:\Users\test\jadx\bin\jadx.bat --rule_path  C:\Users\test\jadx\Rules.json --apk_path C:\Users\test\jadx\test.apk

Contributing

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

License

MIT