Ethical Hacking News Hubb
Advertisement Banner
  • Home
  • News
  • Ethical Hackers
  • Contact
No Result
View All Result
  • Home
  • News
  • Ethical Hackers
  • Contact
No Result
View All Result
Wellnessnewshubb
No Result
View All Result
Home News

A Simple Tool To Allows Users To Search For And Analyze Android Apps For Potential Security Threats And Vulnerabilities

admin by admin
May 20, 2023
in News




A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities

Create a Koodous account and get your api key https://koodous.com/settings/developers

$ pip install koodousfinder

Param description
-h, –help 'Show this help message and exit'
–package-name "General search for APKs”`
–app-name Name of the app to search for

koodous.py –package-name “app: Brata AND package: com.brata”
koodous.py –package-name “package: com.google.android.videos AND trusted: true”
koodous.py –package-name “com.metasploit”
python3 koodous.py –app-name “WhatsApp MOD”

Attribute Modifier Description
Hash hash: Performs the search depending on the automatically inserted hash. The admitted hashes are sha1, sha256 and md5.
App name app: Searches for the specified app name. If it is a compound name, it can be searched enclosed in quotes, for example: app: “Whatsapp premium”.
Package name. package: Searches the package name to see if it contains the indicated string, for example: package: com.whatsapp.
Name of the developer or company. developer: Searches whether the company or developer field includes the indicated string, for example: developer: “WhatsApp Inc.”.
Certificate certificate: Searches the apps by their certificate. For example: cert: 60BBF1896747E313B240EE2A54679BB0CE4A5023 or certificate: 38A0F7D505FE18FEC64FBF343ECAAAF310DBD799.

More information: https://docs.koodous.com/apks.html.
#TODO

  • Discord Integration
  • Rulesets view





Source link

Tags: cybersecurityethical hackinghack androidhack apphack wordpresshacker newshackinghacking tools for windowskeyloggerkitkitploitpassword brute forcepenetration testingpentestpentest androidpentest linuxpentest toolkitpentest toolsspy tool kitspywaretools
Previous Post

Best Privileged Access Management Tools for 2023

Next Post

Meet ‘Jack’ from Romania! Mastermind Behind Golden Chickens Malware

Next Post

Meet 'Jack' from Romania! Mastermind Behind Golden Chickens Malware

Recommended

An Automated Tool Which Can Simultaneously Crawl, Fill Forms, Trigger Error/Debug Pages And “Loot” Secrets Out Of The Client-Facing Code Of Sites

9 months ago

Automatic SSTI Detection Tool With Interactive Interface

8 months ago

© Ethical Hacking News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Ethical Hackers
  • Contact

Newsletter Sign Up.

No Result
View All Result
  • Home
  • News
  • Ethical Hackers
  • Contact

© 2022 Ethical Hacking News Hubb All rights reserved.