Some scripts for the Reverse engineered (old) API of CafeBazaar.
Be aware that new Cafebazaar clients are using a new and easier API but this API is still working as of writing this.
I've reverse-engineered CafeBazaar's API and developed these scripts between 2019-2021 to research the safety of their platform.
doc: (SOON) Documents about the Reverse engineering process and the API.
get.py: A simple script to download the given package name from the Cafebazaar.
app_list.py: A simple script to get the package names of all of the apps from their website.
legacy_scan.py: A -legacy- script to send the given apps to an online malware scanner and receive the result.
Some of the files are modified to be suitable for publishing.
legacy_scan.py: Some bypass methods for rate-limit and some methods for changing fingerprint are removed from the published file. Also, This file is the legacy version (First run) of my scanner (when I didn't know ORMs exist :D)
It's the biggest Android market in Iran.
To research about malwares on their market.
At the time of my research, it was the only API. The point of publishing, however, is the complexity and their technique of adding multilayers to difficult the process of Reverse engineering.
Thanks for informing, but I know. I have to mention that this project never meant to be public so I didn't care about the readability.