All Projects → xebia → mobilehacktools

xebia / mobilehacktools

Licence: MIT license
A repository for scripting a mobile attack toolchain

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to mobilehacktools

Appmon
Documentation:
Stars: ✭ 1,157 (+1796.72%)
Mutual labels:  mobile-security
Testowanieoprogramowania
Testowanie oprogramowania - Książka dla początkujących testerów
Stars: ✭ 146 (+139.34%)
Mutual labels:  mobile-security
Grapefruit
(WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Stars: ✭ 235 (+285.25%)
Mutual labels:  mobile-security
Mobile Security Framework Mobsf
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Stars: ✭ 10,212 (+16640.98%)
Mutual labels:  mobile-security
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+2911.48%)
Mutual labels:  mobile-security
Ovaa
Oversecured Vulnerable Android App
Stars: ✭ 152 (+149.18%)
Mutual labels:  mobile-security
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (+1388.52%)
Mutual labels:  mobile-security
awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+3308.2%)
Mutual labels:  pentest
Iosreextension
A fast and elegant extension for VSCode used for iOSre projects.
Stars: ✭ 139 (+127.87%)
Mutual labels:  mobile-security
Vscode Frida
Unofficial frida extension for VSCode
Stars: ✭ 221 (+262.3%)
Mutual labels:  mobile-security
Vyapi
VyAPI - A cloud based vulnerable hybrid Android App
Stars: ✭ 75 (+22.95%)
Mutual labels:  mobile-security
Gda Android Reversing Tool
GDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✭ 2,332 (+3722.95%)
Mutual labels:  mobile-security
Evabs
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
Stars: ✭ 173 (+183.61%)
Mutual labels:  mobile-security
Pivaa
Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of mobile vulnerability scanners.
Stars: ✭ 71 (+16.39%)
Mutual labels:  mobile-security
MyJWT
A cli for cracking, testing vulnerabilities on Json Web Token(JWT)
Stars: ✭ 92 (+50.82%)
Mutual labels:  pentest
Frida Snippets
Hand-crafted Frida examples
Stars: ✭ 1,081 (+1672.13%)
Mutual labels:  mobile-security
Apkleaks
Scanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+4337.7%)
Mutual labels:  mobile-security
keyscope
Keyscope is a key and secret workflow (validation, invalidation, etc.) tool built in Rust
Stars: ✭ 369 (+504.92%)
Mutual labels:  pentest
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+129.51%)
Mutual labels:  pentest
Command Mobile Penetration Testing Cheatsheet
Mobile penetration testing android & iOS command cheatsheet
Stars: ✭ 221 (+262.3%)
Mutual labels:  mobile-security

Mobile Security Toolchain

Build Status

This is the mobile security toolchain project. It is loosely based on the MSTG testing tools section (https://github.com/OWASP/owasp-mstg/blob/master/Document/0x08-Testing-Tools.md).

Current status

The project is in early beta stage. Feel free to contribute! Note that developments are currently slow as the primary focus is now on developing the MSTG. There are quiet a few bugs when running this on Catalina. We hope to resolve them in 2021 (as Corona outbreak made our work a little harder) unless a volunteer arrives earlier ;-).

Pre-requisites

Have a Mac OS X based system (needs 10.13.x) with about 4 GB of RAM and 4 GB of free space. Next, install Docker for Mac on it and then:

  • if you want to have both the iOS and Android tools, as well as all the scaffolding, just use ./install.sh

  • if you want to have the iOS tools only: install brew and Ansible, then type:

     ansible-galaxy install -r requirements.yml
      ansible-playbook -K ./iOS/generic_items.yml
  • if you want to have the Android tools only: install brew and Ansible, then type:

  ansible-playbook ./Android/generic_items.yml

Please note: the iOS part requires you to install XCode using the Mac App Store (MAS) which will ask you to authenticate with a popup.

Tools

Brew, pip and Ansible will be installed first, if not available. Then generic, iOS and Android tools will be installed:

Generic Tools

  • autoconf
  • bash-completion
  • dependency-check
  • doxygen
  • git
  • go
  • gpg
  • httpie
  • ideviceinstaller
  • libimobiledevice
  • mcrypt
  • mitmproxy
  • nmap
  • node
  • python #python 3
  • testssl.sh
  • openssl
  • wget
  • atom
  • burp-suite
  • chromedriver
  • docker
  • dropbox
  • firefox
  • google-chrome
  • java
  • owasp-zap
  • sequel-pro
  • vagrant
  • virtualbox
  • Frida
  • Radare2
  • Objection
  • MobSF
  • Appmon
  • zsh //sh -c "$(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)"

Tools for Android

  • apktool
  • dependency-check
  • dex2jar
  • ideviceinstaller
  • jadx
  • libimobiledevice
  • mcrypt
  • node
  • android-studio
  • java
  • jd-gui
  • Nathan
  • super analyzer
  • Drozer
  • Qark

Tools for iOS

  • cmake
  • usbmuxd
  • libimobiledevice
  • qt@4
  • class-dump
  • itms
  • idb
  • java

Quirks

As we are still in development of 1.0, there are the following quirks:

  • Some applications might not work the first time as you will first have to start them from your Applications folder, such as: Android Studio (including ADB) & Docker for Mac. After that you have to run the runbooks once more. You should have , after 2 runs of the android runbook (e.g. run android runbook, run android studio, run android runbook, a working adb, given that you use .bash_profile)
  • iOS has not been tested on the buildserver (only general and android are, so please test them)
  • Some of the output of ansible seems very "drastic": in red/green/yellow. Please wait for it to finish and then see if something failed.
  • For iOS you need to run things twice: once to start the installation, while being logged in into the Apple store with your account (actual active state can be achieved by installing any app from the app-store), second time with an active developer account in xCode.
  • Lastly, it could be the case when you are testing this on a separate account, which does not have the correct rights for the brew folders. See Issue #30 reported by @TheDauntless. When you are on High Sierra you need to do:
  chgrp -R admin /usr/local/*
  chmod -R g+w /usr/local/*

and otherwise you can follow this fix.

Contribution

Does something not work? Create an issue, or even better: create a pull-request!

Special thanks to

@clviper (reviewing), @andreaslindeboom for a lot of ansible improvements, @meetinthemiddle-be for testing & @sushi2k for contributing & @hierynomus for fixing travis issues & @RiieCco for motivating me to get the project started. @geerlingguy for creating awesome Ansible roles that speeded up the development tremendously. Xebia, as a company from which I used an private repo to start hacking at the project. My wife for supporting me in doing mobile security open source projects in my spare time.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].