Reverse Engineering

Diggy – Extract Endpoints From APK Files

Diggy can extract endpoints/URLs from apk files. It saves the result into a txt file for further processing.

Dependencies

Usage

./diggy.sh /path/to/apk/file.apk

You can also install it for easier access by running install.sh
After that, you will be able to run Diggy as follows:

diggy /path/to/apk/file.apk

 

About the author

Mazen Elzanaty

Add Comment

Click here to post a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: