Skip to content

AppSnooper/AppSnooper-Releases

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

AppSnooper Releases

Penetration testing tool to help you analyze possible vulnerabilities in your native Android application.

WebsiteReleasesDiscussionsWikiFeedback

preview

Requirements

  • Operation system
    • Windows 10 or later
    • MacOS
    • Linux
  • 16 GB RAM
  • Java 8+ (available in the system path)

Features

  • Pull an application from device - It enables you to choose between opening a local application file or pulling one directly from a connected device. image

  • Rebuild an application - Allows you to assemble already decompiled applications to test Resource or Smali changes and verify your hypotheses. image

  • Application code preview - Allows you to preview the decompiled Java and the option to edit Smali and resources.

  • Extract application data - Download the data directory for an application from the selected device.

  • Find token patterns - Pattern detection helps you find tokens such as Bearer, UUID, PGP, etc.

  • Bypass Permission - When rebuilding automatically grants all permissions required by the application.

  • Global Search - It empowers you to search through the files for a query defined by you.

  • Protocol handling - Test the way the applications handle links and protocols.

  • Local APKs - It enables you to analyze APKs from your local storage.

  • Appearance - Customize the filling of AppSnooper by picking an accent color.