عکس moh53n
Some scripts for the Reverse engineered (old) api of CafeBazaar Python
موضوع‌ها
۰
فورک‌ها
۴
ستاره‌ها
۳۵
تاریخ ایجاد
۲ اردیبهشت ۱۴۰۰
آخرین بروزرسانی
بیشتر از ۱ سال قبل
لایسنس
MIT License

bazz

Note: This project is done and published only for educational purposes.

Some scripts for the Reverse engineered (old) API of CafeBazaar.
Be aware that new Cafebazaar clients are using a new and easier API but this API is still working as of writing this.
I've reverse-engineered CafeBazaar's API and developed these scripts between 2019-2021 to research the safety of their platform.

Repo Tree

doc: (SOON) Documents about the Reverse engineering process and the API.
get.py: A simple script to download the given package name from the Cafebazaar.
app_list.py: A simple script to get the package names of all of the apps from their website.
legacy_scan.py: A -legacy- script to send the given apps to an online malware scanner and receive the result.

Notes

Some of the files are modified to be suitable for publishing.
legacy_scan.py: Some bypass methods for rate-limit and some methods for changing fingerprint are removed from the published file. Also, This file is the legacy version (First run) of my scanner (when I didn't know ORMs exist :D)

FAQ

What is CafeBazaar?

It's the biggest Android market in Iran.

Why did you Reverse engineered their API?

To research about malwares on their market.

If there is a new API, so what's the point?

At the time of my research, it was the only API. The point of publishing, however, is the complexity and their technique of adding multilayers to difficult the process of Reverse engineering.

Your code and coding skills sucks.

Thanks for informing, but I know. I have to mention that this project never meant to be public so I didn't care about the readability.