Getting started
Knowledge hub
- Overview
-
-
- 34 M Wordlist Subdomain Brute Force
- Asn Based Network Scan
- Asset Discovery and Vulnerability Scanning
- Custom Subdomain Brute Force Wordlist From Ip Ranges
- Enumerate Cloud Resources
- Full Subdomain Enumeration
- Get Ips and Cnames
- Getdns
- Github Recon and Scanner
- Hostnames S3 Bucket Finder
- Simple Content Discovery
-
-
- amass
- anew
- apkurlgrep
- assetfinder
- cent
- cero
- cewl
- cloudenum
- crosslinked
- dnsdumpster-dns-lookup
- dnsdumpster-host-search
- dnstwist
- dnsvalidator
- dsieve
- dumpsterdiver
- eyeballer
- ffuf
- find-gh-poc
- findomain
- gau
- generate-yaml-report
- get-asn-prefixes
- get-trickest-output
- gf
- github-subdomains
- goaltdns
- gospider
- gotator
- hakcheckurl
- httprobe
- httpx
- infoga
- ipinfo
- jldc-subdomains
- katana
- mapcidr
- mass-linkfinder
- masscan
- massdns
- meg
- mksub
- naabu
- notify
- nrich
- nuclei
- oneforall
- puredns
- pymeta
- s3scanner
- securitytrails-subdomains
- spiderfoot
- sslyze
- subdomainizer
- subfinder
- tlsx
- uncover
- unfurl
- uro
- vita
- webanalyze-1
- webanalyze
- x8
Tutorials
- Creating a Workflow
- Downloading a Result
- Executing a Workflow
- How Do Machines Work
- Keeping Track of a Run
- Navigating in Workflow Editor
- Overview
- Saving a Workflow and History
- Scheduling a Workflow
- Using Workflows From Library
Concepts
APK Discovery - URLs and paths
Complexity: basic
Category: Mobile
Tools
Setup
Set up this workflow by uploading the APK file or adding a raw URL at the beginning (replace APK_FILE input value).
.gif)
Execution and Results
After setup workflow is ready to be executed. Once workflow’s last node, uro
tool, is finished result can be viewed and downloaded.
uro
tool will contain the latest results of the workflow execution.\

Build this workflow in steps
Getting the data with apkurlgrep
We will add apkurlgrep to the Canvas. It already has apkfile
parameter enabled by default.

Use APK as an input for apkurlgrep
Get paths with custom-script
Custom-script node could be used to get all of the paths from the output of apkurlgrep
cat in/*/* | grep 'Paths:' -A 100000000000000000 | uniq | tee out/output.txt
This script will cat
all of the files inside in
directory and grep for paths.

Getting the paths via custom script
Using uro to deduplicate the results
Lastly, as the results from the previous node could contain duplicates, we will use uro for deduplicating the results.
.gif)
Execution and results
uro
will contain the latest results of the workflow execution.

Try it out!
This workflow is available in the Library, you can copy it and execute it immediately!
Improve this workflow
- Changing machine type of tools to speed up the execution
- Adding additional verification for parsing and getting the paths
- Creating wordlists to brute-force locations gathered in Attack Surface Management
Get a Video Demo
Fill out and submit this form to receive an in-depth video demo of the Trickest platform.
Talk To Sales
Fill out the form and we'll get back to you about any questions you have on our products, services, pricing, or scheduling a demo.