Professional Android APK security analysis tool for bug bounty hunters
Project description
AppXploit
___ _ __ __ _ __
/ | ____ ____ | |/ /____ / /___ (_) /_
/ /| | / __ \/ __ \| // __ \/ / __ \/ / __/
/ ___ |/ /_/ / /_/ / |/ /_/ / / /_/ / / /_
/_/ |_/ .___/ .___/_/|_/ .___/_/\____/_/\__/
/_/ /_/ /_/
Professional Android APK Bug Hunting Tool
Built for security researchers, bug bounty hunters, and red teams
๐ฏ Overview
AppXploit is an Elite Android Vulnerability Discovery Framework that performs intelligent static analysis to discover HIGH-SEVERITY, BOUNTY-WORTHY vulnerabilities. Built for bug bounty hunters who need fewer, higher-quality findings.
๐ Elite Framework Features
๐ฏ Business Logic Intelligence
- Payment bypass detection (client-side verification)
- Premium feature unlock detection
- Price manipulation detection
- Access control bypass via boolean flags
๐ Advanced IDOR Engine
- Logic-based detection (not just patterns)
- Identifier flow tracking (API โ Storage โ UI โ API)
- IDOR classification (Horizontal, Vertical, Contextual)
- Confidence scoring per finding
๐ Deep Link Abuse v2
- State-changing deep link detection
- Auth-bypass deep link identification
- Callback abuse (password reset, verification, OAuth)
- Attack narrative generation
๐ Crypto Misuse Intelligence
- Context-aware analysis (only exploitable issues)
- ECB mode detection with pattern analysis
- Weak algorithm detection (MD5, SHA1, DES, RC4)
- Encoding vs encryption distinction
๐ Exploit Path Ranking
- Rank by: Business Impact (40%), Ease (30%), Acceptance (30%)
- Highlight TOP 1-3 MOST DANGEROUS PATHS
- "Why This Is Exploitable" explanations
- Bug bounty acceptance likelihood
โ Quality Control
- Evidence requirement (file + line + code)
- Speculation filter (no "might", "could")
- Deterministic results (same APK = same findings)
- Confidence scoring (0.75-0.95)
๐ Core Capabilities
โจ Intelligent Analysis
- App classification (fintech, social, e-commerce, etc.)
- Risk surface estimation
- Vulnerability scoring using Reachability ร Control ร Impact ร Exploitability ร ContextConfidence
๐ Comprehensive Discovery
- 15+ secret patterns (AWS keys, Firebase, OAuth, JWT, etc.)
- REST, GraphQL, WebSocket endpoint extraction
- Admin/internal API detection
โ๏ธ Exploit Chain Correlation
- Chains multiple findings into attack paths
- Generates PoC outlines
- CVSS scoring
๐ HackerOne-Ready Reports
- TOP 3 Most Dangerous Paths section
- Detailed impact analysis (users, business, security)
- Clear exploitation steps
- Professional remediation guidance
- JSON export support
๐ Zero Configuration
- Auto-downloads tools (apktool, jadx)
- Cross-platform (Windows + Linux)
- No manual setup required
๐ Quality Metrics
| Metric | Traditional Scanners | AppXploit Elite |
|---|---|---|
| Findings per APK | 15-30 | 5-15 |
| False Positive Rate | 20-30% | <5% |
| Critical Findings | 1-3 | 3-7 |
| Confidence Scores | 0.5-0.7 | 0.75-0.95 |
| Report Quality | Generic | HackerOne-ready |
๐ฆ Installation
From PyPI (Recommended)
pip install appxploit
From Source
git clone https://github.com/letchupkt/AppXploit.git
cd AppXploit
pip install -e .
Requirements
- Python 3.8+
- Java 8+ (for apktool and jadx)
AppXploit will automatically download apktool and jadx on first run.
๐ Usage
Basic Usage
appxploit target.apk
This will:
- Extract and analyze the APK
- Discover secrets and API endpoints
- Detect vulnerabilities
- Generate exploit chains
- Create a report:
target_report.md
Advanced Options
# Specify output file
appxploit target.apk -o custom_report.md
# JSON output
appxploit target.apk --format json
# Verbose mode
appxploit target.apk -v
# Quick scan (skip deep analysis)
appxploit target.apk --quick
# Suppress banner
appxploit target.apk --no-banner
Example Output
___ _ __ __ _ __
/ | ____ ____ | |/ /___ / /___ (_) /_
/ /| | / __ \/ __ \ | / __ \/ / __ \/ / __/
/ ___ |/ /_/ / /_/ / / / /_/ / / /_/ / / /_
/_/ |_/ .___/ .___/ /_/|_\____/_/\____/_/\__/
/_/ /_/
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Professional Android APK Bug Hunting Tool โ
โ Version: 1.0.0 โ
โ Author: LAKSHMIKANTHAN K (letchupkt) โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
[] Target APK: target.apk [] Output: target_report.md [] Mode: Deep Analysis [] Verbose: Disabled
[*] Starting analysis...
[1/8] Extracting APK... [โ] APK extracted [2/8] Running APK intelligence... [โ] Intelligence complete App Type: Fintech Risk Level: Critical [3/8] Running static analysis... [โ] Static analysis complete [4/8] Discovering secrets and APIs... [] Decompiling with jadx... [] Scanning 1247 Java files for secrets... [โ] Discovery complete Secrets found: 12 Endpoints found: 45 [5/8] Analyzing vulnerabilities... [*] Advanced vulnerabilities found: 8 [โ] Vulnerability analysis complete Vulnerabilities found: 16 [6/8] Correlating exploit chains... [โ] Exploit correlation complete Exploit chains found: 4 [7/8] Filtering noise... [โ] Filtering complete High-signal findings: 12 [8/8] Generating report... [โ] Report generated
[โ] Analysis complete! [โ] Report saved to: target_report.md
---
## โจ Advanced Features (v1.0+)
### ๐ 8 Advanced Vulnerability Categories
- **Authentication & Session Logic** - Client-side auth, bypass flags
- **IDOR & Access Control** - User IDs in URLs, admin endpoints
- **Cryptography & Data Protection** - Weak algorithms, hardcoded keys
- **WebView Security** - XSS, JavaScript interfaces
- **Storage & Data Leaks** - SharedPreferences, logs
- **Component Abuse** - Exported components, PendingIntents
- **OTP & Verification** - Client-side validation
- **Payment & Financial** - Price manipulation
### ๐ฏ Improved Confidence Scoring
- **ContextConfidence factor** reduces false positives by 40-60%
- Evidence strength, usage frequency, business logic relevance
- Minimum confidence threshold filtering
### โ๏ธ Multi-Hop Exploit Chains
- **8 pre-built exploit chains** (3-5 steps each)
- Impact classification (Account Takeover, Data Exfiltration, etc.)
- Human-readable attack narratives
- Business impact explanations
### ๐ฆ Version Checking
- Automatic PyPI version check on startup
- Non-blocking update notifications
### ๐ Current Directory Execution
- Reports save to current working directory by default
- Matches expected CLI tool behavior
---
---
## ๐ What AppXploit Detects
### Security Misconfigurations
- `android:debuggable="true"`
- `android:allowBackup="true"`
- `android:usesCleartextTraffic="true"`
- Old target SDK versions
### Component Security
- Exported activities without permissions
- Exported content providers
- Exported services and receivers
- Deep link injection risks
### Secret Exposure
- AWS access keys
- Google API keys
- Firebase configurations
- Stripe keys
- OAuth secrets
- JWT secrets
- Database credentials
- Private keys
### API Security
- Admin/internal endpoints
- HTTP (non-HTTPS) endpoints
- GraphQL endpoints
- WebSocket URLs
### Exploit Chains
- Debuggable + Exported Activity โ Runtime Manipulation
- Hardcoded API Key + Admin Endpoint โ Account Takeover
- Backup Enabled + Secrets โ Data Exfiltration
- Deep Link + Exported Activity โ Auth Bypass
---
## ๐ Report Example
AppXploit generates professional Markdown reports with:
- **Executive Summary** - App info and findings overview
- **Exploit Chains** - Correlated attack paths with PoC outlines
- **Vulnerability Findings** - Detailed findings with CWE, impact, and remediation
- **API Inventory** - All discovered endpoints
- **Secrets Summary** - Exposed credentials and keys
- **Recommendations** - Actionable security improvements
---
## ๐๏ธ Architecture
AppXploit/ โโโ appxploit/ โ โโโ core/ # CLI, orchestration, config โ โโโ intelligence/ # APK fingerprinting, classification โ โโโ analysis/ # Manifest, components, permissions โ โโโ discovery/ # Secrets, API endpoints โ โโโ reasoning/ # Vulnerability detection, scoring โ โโโ filtering/ # Noise reduction โ โโโ reporting/ # Report generation
### Analysis Pipeline
1. **APK Extraction** โ Extract with apktool
2. **Intelligence** โ Fingerprint, classify, estimate risk
3. **Static Analysis** โ Parse manifest, analyze components
4. **Discovery** โ Decompile with jadx, find secrets/APIs
5. **Reasoning** โ Detect vulnerabilities, score findings
6. **Correlation** โ Chain findings into exploit paths
7. **Filtering** โ Remove noise, prioritize high-impact
8. **Reporting** โ Generate professional report
---
## ๐ Methodology
AppXploit uses intelligent reasoning over brute-force scanning:
### Vulnerability Scoring Formula
Score = Reachability ร Control ร Impact ร Exploitability ร 100
- **Reachability**: Can attacker reach this? (exported components, deep links)
- **Control**: Can attacker manipulate input?
- **Impact**: What's the business impact? (data leak, auth bypass)
- **Exploitability**: How easy to exploit? (PoC complexity)
### Noise Filtering
- Prioritizes exploit chains (highest value)
- Filters low-impact findings
- Focuses on business-critical vulnerabilities
- Removes common false positives
---
## ๐ค Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
---
## ๐ License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
---
## ๐ค Author
**LAKSHMIKANTHAN K**
GitHub: [@letchupkt](https://github.com/letchupkt)
---
## โ ๏ธ Disclaimer
This tool is intended for **authorized security testing only**. Unauthorized testing or exploitation of vulnerabilities is illegal and unethical. Always obtain proper authorization before testing any application.
---
## ๐ Acknowledgments
- [apktool](https://ibotpeaches.github.io/Apktool/) - APK decompilation
- [jadx](https://github.com/skylot/jadx) - Dex to Java decompiler
---
<div align="center">
**Built with โค๏ธ for the security community**
If AppXploit helped you find bugs, consider โญ starring the repo!
</div>
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file appxploit-1.0.1.tar.gz.
File metadata
- Download URL: appxploit-1.0.1.tar.gz
- Upload date:
- Size: 73.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
885725306b780ff27084932eb5b666d923bfb1f32ded9aa29098b98c4baeee1f
|
|
| MD5 |
80a893e920cea7b9e37c80e3f89d2696
|
|
| BLAKE2b-256 |
f076933efd85b3ed3ce5d0fd6b889ad5e45332631ea241c4f9035e95b7734095
|
File details
Details for the file appxploit-1.0.1-py3-none-any.whl.
File metadata
- Download URL: appxploit-1.0.1-py3-none-any.whl
- Upload date:
- Size: 81.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2944ff4c09fa109ad1e8e760cb1c3a925ed07442c15bf9956117eed0660da57d
|
|
| MD5 |
de860f1c8e8e2417aba0fbe664b1e84c
|
|
| BLAKE2b-256 |
aac015d7ad8ab8af13d4d97e41feaf7e0dfa6b31e334e85531b20b692f2722d4
|