- 34 M Wordlist Subdomain Brute Force
- Asn Based Network Scan
- Asset Discovery and Vulnerability Scanning
- Custom Subdomain Brute Force Wordlist From Ip Ranges
- Enumerate Cloud Resources
- Full Subdomain Enumeration
- Get Ips and Cnames
- Github Recon and Scanner
- Hostnames S3 Bucket Finder
- Simple Content Discovery
- Creating a Workflow
- Downloading a Result
- Executing a Workflow
- How Do Machines Work
- Keeping Track of a Run
- Navigating in Workflow Editor
- Saving a Workflow and History
- Scheduling a Workflow
- Using Workflows From Library
- Concepts and Architecture
- Spaces and Projects
- Trickest CLI
APK Discovery - URLs and paths
Set up this workflow by uploading the APK file or adding a raw URL at the beginning (replace APK_FILE input value).
Execution and Results
After setup workflow is ready to be executed. Once workflow’s last node,
uro tool, is finished result can be viewed and downloaded.
uro tool will contain the latest results of the workflow execution.\
Build this workflow in steps
Getting the data with apkurlgrep
Get paths with custom-script
Custom-script node could be used to get all of the paths from the output of apkurlgrep
cat in/*/* | grep 'Paths:' -A 100000000000000000 | uniq | tee out/output.txt
This script will
cat all of the files inside
in directory and grep for paths.
Using uro to deduplicate the results
Lastly, as the results from the previous node could contain duplicates, we will use uro for deduplicating the results.
Execution and results
uro will contain the latest results of the workflow execution.
Try it out!
This workflow is available in the Library, you can copy it and execute it immediately!
Improve this workflow
Get a Video Demo
Fill out and submit this form to receive an in-depth video demo of the Trickest platform.
Talk To Sales
Fill out the form and we'll get back to you about any questions you have on our products, services, pricing, or scheduling a demo.