BFScan: Uncover Hidden URLs, Paths, & Secrets in JAR/WAR/APK Files
BFScan – Tool for initial processing of APK / XAPK / DEX / JAR / WAR applications.
- Search for strings in source code and resources that look like URIs, paths, or secrets
- Generate raw HTTP requests and OpenAPI specifications based on config files, class and method annotations
- Supported client libraries
- Supported server libraries
Use
Example
For this class using Spring annotations, the following results will be generated.
Results
Method: com.mycompany.springbootexample.UserController->create
- Spring Method
Obfuscated code
If you are analyzing an application that uses a supported library, but its code is obfuscated, you can create a mapping file to replace the class names.
To do this, you can manually use the “Rename” function in the decompiled code in the jadx-gui, and then save the generated mapping file (File > Save mappings). Or use an example mapping file for Retrofit and modify it according to your application.
Example of analyzing an application with renaming classes using a mapping file.