Bypass SSL certificate pinning for most applications
-
Updated
Jul 18, 2018 - Java
Bypass SSL certificate pinning for most applications
Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing.
Quickly analyze and reverse engineer Android packages
Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS
Simple Bash scripts to make easier Android hacking (mobile pentesting).
Repository with research related to Android
Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat
frick - aka the first debugger built on top of frida - is a kick ass frida cli for reverse engineer inspired by the epic GDB init gef by @hugsy.
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Easy SSL pinning validation and reporting for Android.
Android application vulnerability analysis and Android pentest tool
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
A library to use Xposed without root or recovery(or modify system image etc..).
Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps
Recover the Android swipe lock pattern from a gesture.key file.
Add a description, image, and links to the mobile-pentest topic page so that developers can more easily learn about it.
To associate your repository with the mobile-pentest topic, visit your repo's landing page and select "manage topics."