Skip to main content

Professional Android APK security analysis tool for bug bounty hunters

Project description

AppXploit

    ___               _  __       __      _ __ 
   /   |  ____  ____ | |/ /____  / /___  (_) /_
  / /| | / __ \/ __ \|   // __ \/ / __ \/ / __/
 / ___ |/ /_/ / /_/ /   |/ /_/ / / /_/ / / /_  
/_/  |_/ .___/ .___/_/|_/ .___/_/\____/_/\__/  
      /_/   /_/        /_/                     

Professional Android APK Bug Hunting Tool

Python License Platform

Built for security researchers, bug bounty hunters, and red teams


๐ŸŽฏ Overview

AppXploit is an Elite Android Vulnerability Discovery Framework that performs intelligent static analysis to discover HIGH-SEVERITY, BOUNTY-WORTHY vulnerabilities. Built for bug bounty hunters who need fewer, higher-quality findings.

๐Ÿ† Elite Framework Features

๐ŸŽฏ Business Logic Intelligence

  • Payment bypass detection (client-side verification)
  • Premium feature unlock detection
  • Price manipulation detection
  • Access control bypass via boolean flags

๐Ÿ” Advanced IDOR Engine

  • Logic-based detection (not just patterns)
  • Identifier flow tracking (API โ†’ Storage โ†’ UI โ†’ API)
  • IDOR classification (Horizontal, Vertical, Contextual)
  • Confidence scoring per finding

๐Ÿ”— Deep Link Abuse v2

  • State-changing deep link detection
  • Auth-bypass deep link identification
  • Callback abuse (password reset, verification, OAuth)
  • Attack narrative generation

๐Ÿ” Crypto Misuse Intelligence

  • Context-aware analysis (only exploitable issues)
  • ECB mode detection with pattern analysis
  • Weak algorithm detection (MD5, SHA1, DES, RC4)
  • Encoding vs encryption distinction

๐Ÿ† Exploit Path Ranking

  • Rank by: Business Impact (40%), Ease (30%), Acceptance (30%)
  • Highlight TOP 1-3 MOST DANGEROUS PATHS
  • "Why This Is Exploitable" explanations
  • Bug bounty acceptance likelihood

โœ… Quality Control

  • Evidence requirement (file + line + code)
  • Speculation filter (no "might", "could")
  • Deterministic results (same APK = same findings)
  • Confidence scoring (0.75-0.95)

๐Ÿ“Š Core Capabilities

โœจ Intelligent Analysis

  • App classification (fintech, social, e-commerce, etc.)
  • Risk surface estimation
  • Vulnerability scoring using Reachability ร— Control ร— Impact ร— Exploitability ร— ContextConfidence

๐Ÿ” Comprehensive Discovery

  • 15+ secret patterns (AWS keys, Firebase, OAuth, JWT, etc.)
  • REST, GraphQL, WebSocket endpoint extraction
  • Admin/internal API detection

โ›“๏ธ Exploit Chain Correlation

  • Chains multiple findings into attack paths
  • Generates PoC outlines
  • CVSS scoring

๐Ÿ“Š HackerOne-Ready Reports

  • TOP 3 Most Dangerous Paths section
  • Detailed impact analysis (users, business, security)
  • Clear exploitation steps
  • Professional remediation guidance
  • JSON export support

๐Ÿš€ Zero Configuration

  • Auto-downloads tools (apktool, jadx)
  • Cross-platform (Windows + Linux)
  • No manual setup required

๐Ÿ“ˆ Quality Metrics

Metric Traditional Scanners AppXploit Elite
Findings per APK 15-30 5-15
False Positive Rate 20-30% <5%
Critical Findings 1-3 3-7
Confidence Scores 0.5-0.7 0.75-0.95
Report Quality Generic HackerOne-ready

๐Ÿ“ฆ Installation

From PyPI (Recommended)

pip install appxploit

From Source

git clone https://github.com/letchupkt/AppXploit.git
cd AppXploit
pip install -e .

Requirements

  • Python 3.8+
  • Java 8+ (for apktool and jadx)

AppXploit will automatically download apktool and jadx on first run.


๐Ÿš€ Usage

Basic Usage

appxploit target.apk

This will:

  1. Extract and analyze the APK
  2. Discover secrets and API endpoints
  3. Detect vulnerabilities
  4. Generate exploit chains
  5. Create a report: target_report.md

Advanced Options

# Specify output file
appxploit target.apk -o custom_report.md

# JSON output
appxploit target.apk --format json

# Verbose mode
appxploit target.apk -v

# Quick scan (skip deep analysis)
appxploit target.apk --quick

# Suppress banner
appxploit target.apk --no-banner

Example Output

    ___                 _  __      __      _ __ 
   /   |  ____  ____   | |/ /___  / /___  (_) /_
  / /| | / __ \/ __ \  |   / __ \/ / __ \/ / __/
 / ___ |/ /_/ / /_/ / /   / /_/ / / /_/ / / /_  
/_/  |_/ .___/ .___/ /_/|_\____/_/\____/_/\__/  
      /_/   /_/                                  

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘  Professional Android APK Bug Hunting Tool                โ•‘
โ•‘  Version: 1.0.0                                           โ•‘
โ•‘  Author: LAKSHMIKANTHAN K (letchupkt)                     โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

[] Target APK: target.apk [] Output: target_report.md [] Mode: Deep Analysis [] Verbose: Disabled

[*] Starting analysis...

[1/8] Extracting APK... [โœ“] APK extracted [2/8] Running APK intelligence... [โœ“] Intelligence complete App Type: Fintech Risk Level: Critical [3/8] Running static analysis... [โœ“] Static analysis complete [4/8] Discovering secrets and APIs... [] Decompiling with jadx... [] Scanning 1247 Java files for secrets... [โœ“] Discovery complete Secrets found: 12 Endpoints found: 45 [5/8] Analyzing vulnerabilities... [*] Advanced vulnerabilities found: 8 [โœ“] Vulnerability analysis complete Vulnerabilities found: 16 [6/8] Correlating exploit chains... [โœ“] Exploit correlation complete Exploit chains found: 4 [7/8] Filtering noise... [โœ“] Filtering complete High-signal findings: 12 [8/8] Generating report... [โœ“] Report generated

[โœ“] Analysis complete! [โœ“] Report saved to: target_report.md


---

## โœจ Advanced Features (v1.0+)

### ๐Ÿ” 8 Advanced Vulnerability Categories

- **Authentication & Session Logic** - Client-side auth, bypass flags
- **IDOR & Access Control** - User IDs in URLs, admin endpoints
- **Cryptography & Data Protection** - Weak algorithms, hardcoded keys
- **WebView Security** - XSS, JavaScript interfaces
- **Storage & Data Leaks** - SharedPreferences, logs
- **Component Abuse** - Exported components, PendingIntents
- **OTP & Verification** - Client-side validation
- **Payment & Financial** - Price manipulation

### ๐ŸŽฏ Improved Confidence Scoring

- **ContextConfidence factor** reduces false positives by 40-60%
- Evidence strength, usage frequency, business logic relevance
- Minimum confidence threshold filtering

### โ›“๏ธ Multi-Hop Exploit Chains

- **8 pre-built exploit chains** (3-5 steps each)
- Impact classification (Account Takeover, Data Exfiltration, etc.)
- Human-readable attack narratives
- Business impact explanations

### ๐Ÿ“ฆ Version Checking

- Automatic PyPI version check on startup
- Non-blocking update notifications

### ๐Ÿ“‚ Current Directory Execution

- Reports save to current working directory by default
- Matches expected CLI tool behavior

---

---

## ๐Ÿ“‹ What AppXploit Detects

### Security Misconfigurations
- `android:debuggable="true"`
- `android:allowBackup="true"`
- `android:usesCleartextTraffic="true"`
- Old target SDK versions

### Component Security
- Exported activities without permissions
- Exported content providers
- Exported services and receivers
- Deep link injection risks

### Secret Exposure
- AWS access keys
- Google API keys
- Firebase configurations
- Stripe keys
- OAuth secrets
- JWT secrets
- Database credentials
- Private keys

### API Security
- Admin/internal endpoints
- HTTP (non-HTTPS) endpoints
- GraphQL endpoints
- WebSocket URLs

### Exploit Chains
- Debuggable + Exported Activity โ†’ Runtime Manipulation
- Hardcoded API Key + Admin Endpoint โ†’ Account Takeover
- Backup Enabled + Secrets โ†’ Data Exfiltration
- Deep Link + Exported Activity โ†’ Auth Bypass

---

## ๐Ÿ“Š Report Example

AppXploit generates professional Markdown reports with:

- **Executive Summary** - App info and findings overview
- **Exploit Chains** - Correlated attack paths with PoC outlines
- **Vulnerability Findings** - Detailed findings with CWE, impact, and remediation
- **API Inventory** - All discovered endpoints
- **Secrets Summary** - Exposed credentials and keys
- **Recommendations** - Actionable security improvements

---

## ๐Ÿ—๏ธ Architecture

AppXploit/ โ”œโ”€โ”€ appxploit/ โ”‚ โ”œโ”€โ”€ core/ # CLI, orchestration, config โ”‚ โ”œโ”€โ”€ intelligence/ # APK fingerprinting, classification โ”‚ โ”œโ”€โ”€ analysis/ # Manifest, components, permissions โ”‚ โ”œโ”€โ”€ discovery/ # Secrets, API endpoints โ”‚ โ”œโ”€โ”€ reasoning/ # Vulnerability detection, scoring โ”‚ โ”œโ”€โ”€ filtering/ # Noise reduction โ”‚ โ””โ”€โ”€ reporting/ # Report generation


### Analysis Pipeline

1. **APK Extraction** โ†’ Extract with apktool
2. **Intelligence** โ†’ Fingerprint, classify, estimate risk
3. **Static Analysis** โ†’ Parse manifest, analyze components
4. **Discovery** โ†’ Decompile with jadx, find secrets/APIs
5. **Reasoning** โ†’ Detect vulnerabilities, score findings
6. **Correlation** โ†’ Chain findings into exploit paths
7. **Filtering** โ†’ Remove noise, prioritize high-impact
8. **Reporting** โ†’ Generate professional report

---

## ๐ŸŽ“ Methodology

AppXploit uses intelligent reasoning over brute-force scanning:

### Vulnerability Scoring Formula

Score = Reachability ร— Control ร— Impact ร— Exploitability ร— 100


- **Reachability**: Can attacker reach this? (exported components, deep links)
- **Control**: Can attacker manipulate input?
- **Impact**: What's the business impact? (data leak, auth bypass)
- **Exploitability**: How easy to exploit? (PoC complexity)

### Noise Filtering

- Prioritizes exploit chains (highest value)
- Filters low-impact findings
- Focuses on business-critical vulnerabilities
- Removes common false positives

---

## ๐Ÿค Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

---

## ๐Ÿ“„ License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

---

## ๐Ÿ‘ค Author

**LAKSHMIKANTHAN K**  
GitHub: [@letchupkt](https://github.com/letchupkt)

---

## โš ๏ธ Disclaimer

This tool is intended for **authorized security testing only**. Unauthorized testing or exploitation of vulnerabilities is illegal and unethical. Always obtain proper authorization before testing any application.

---

## ๐Ÿ™ Acknowledgments

- [apktool](https://ibotpeaches.github.io/Apktool/) - APK decompilation
- [jadx](https://github.com/skylot/jadx) - Dex to Java decompiler

---

<div align="center">

**Built with โค๏ธ for the security community**

If AppXploit helped you find bugs, consider โญ starring the repo!

</div>

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

appxploit-1.0.1.tar.gz (73.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

appxploit-1.0.1-py3-none-any.whl (81.5 kB view details)

Uploaded Python 3

File details

Details for the file appxploit-1.0.1.tar.gz.

File metadata

  • Download URL: appxploit-1.0.1.tar.gz
  • Upload date:
  • Size: 73.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for appxploit-1.0.1.tar.gz
Algorithm Hash digest
SHA256 885725306b780ff27084932eb5b666d923bfb1f32ded9aa29098b98c4baeee1f
MD5 80a893e920cea7b9e37c80e3f89d2696
BLAKE2b-256 f076933efd85b3ed3ce5d0fd6b889ad5e45332631ea241c4f9035e95b7734095

See more details on using hashes here.

File details

Details for the file appxploit-1.0.1-py3-none-any.whl.

File metadata

  • Download URL: appxploit-1.0.1-py3-none-any.whl
  • Upload date:
  • Size: 81.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for appxploit-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 2944ff4c09fa109ad1e8e760cb1c3a925ed07442c15bf9956117eed0660da57d
MD5 de860f1c8e8e2417aba0fbe664b1e84c
BLAKE2b-256 aac015d7ad8ab8af13d4d97e41feaf7e0dfa6b31e334e85531b20b692f2722d4

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page