pysecuritas
pysecuritas copied to clipboard
Tag the source
Could you please tag the source? This allows distributions to get the complete source from GitHub.
Thanks
I'd love to know where all the endpoints and information is gathered from...
Could you please tag the source? This allows distributions to get the complete source from GitHub.
Thanks
Hi, could you please elaborate ? How should this be done ?
Thanks
I'd love to know where all the endpoints and information is gathered from...
What you mean ? The endpoint is the API URL that the mobile app uses itself.
I'd love to know where all the endpoints and information is gathered from...
What you mean ? The endpoint is the API URL that the mobile app uses itself.
I mean how you'd know the endpoints used and the data you need to send to it?
I'd love to know where all the endpoints and information is gathered from...
What you mean ? The endpoint is the API URL that the mobile app uses itself.
I mean how you'd know the endpoints used and the data you need to send to it?
The mobile app was reverse engineered to capture the API calls using a proxy in between the app and the internet. From here on, just pressing buttons in the app to see which kind of calls are done when doing arms, disarms, and so on ...
Does that help ?
I'd love to know where all the endpoints and information is gathered from...
What you mean ? The endpoint is the API URL that the mobile app uses itself.
I mean how you'd know the endpoints used and the data you need to send to it?
The mobile app was reverse engineered to capture the API calls using a proxy in between the app and the internet. From here on, just pressing buttons in the app to see which kind of calls are done when doing arms, disarms, and so on ...
Does that help ?
Ah, okay, yes, thanks!