MobileHackersWeapons
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Install / Use
/learn @hahwul/MobileHackersWeaponsREADME
Family project
Table of Contents
Weapons
Attributes
| | Attributes |
|-------|---------------------------------------------------|
| Types | Analysis Pentest Proxy RE Scripts Scanner Utils Device Discovery, Monitor, NFC, Target, Bluetooth, Jailbreak, Inject, Unpinning|
| Tags | SCRIPTS NFC Target Jailbreak Inject Hijack Unpinning Bluetooth Monitor Discovery |
| Langs | TypeScript Python Unknown C++ JavaScript Ruby Shell Java Go Objective-C Meson Kotlin C Objective-C++ |
All
| Type | Name | Description | Star |
| --- | --- | --- | --- |
|Analysis|flipper|A desktop debugging platform for mobile developers.||
|Analysis|RMS-Runtime-Mobile-Security|Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime|
|
|Analysis|scrounger|Mobile application testing toolkit|
|
|Pentest|metasploit-framework|Metasploit Framework|
|
|Proxy|zaproxy|The OWASP ZAP core project|
|
|Proxy|proxify|Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.|
|
|Proxy|hetty|Hetty is an HTTP toolkit for security research.|
|
|Proxy|httptoolkit|HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac|
|
|Proxy|BurpSuite|The BurpSuite||
|RE|frida-tools|Frida CLI tools|
|
|RE|fridump|A universal memory dumper using Frida|
|
|RE|frida|Clone this repo to build Frida|
|
|RE|ghidra|Ghidra is a software reverse engineering (SRE) framework|
|
|RE|diff-gui|GUI for Frida -Scripts|
|
|Scanner|StaCoAn|StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.|
|
|Scanner|Mobile-Security-Framework-MobSF|Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.|
|
|Utils|watchman|Watches files and records, or triggers actions, when they change.|
|
||frida-scripts|A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.|
|
||frida-gadget|frida-gadget is a tool that can be used to patch APKs in order to utilize the Frida gadget.|
|
iOS
| Type | Name | Description | Star |
| --- | --- | --- | --- |
|Analysis|needle|The iOS Security Testing Framework||
|Analysis|iFunBox|General file management software for iPhone and other Apple products||
|Analysis|iblessing|iblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.|
|
|Analysis|objection|📱 objection - runtime mobile exploration|
|
|RE|momdec|Core Data Managed Object Model Decompiler|
|
|RE|iSpy|A reverse engineering framework for iOS|
|
|RE|iRET|iOS Reverse Engineering Toolkit.|
|
|RE|Clutch|Fast iOS executable dumper|
|
|RE|class-dump|Generate Objective-C headers from Mach-O files.|
|
|RE|frida-ios-dump|pull decrypted ipa from Jailbreak device|
|
|RE|ipsw|iOS/macOS Research Swiss Army Knife|
|
|Utils|idb|idb is a flexible command line interface for automating iOS simulators and devices|
|
||ipainstaller|Install IPA from command line|
|
||HideJB|a tweak has the ability to skip Jailbreak detection on iOS apps.||
||bfinject|Dylib injection for iOS 11.0 - 11.1.2 with LiberiOS and Electra Jailbreaks|
|
||A-Jailbreak|Super Jailbreak detection Jailbreak!||
||MEDUZA|A more or less universal SSL unpinning tool for iOS|
|
||ssl-kill-switch2|Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps|
|
||Liberty|Bypass Jailbreak and SSL Pinning||
||toothpicker|ToothPicker is an in-process, coverage-guided fuzzer for iOS. for iOS Bluetooth|
|
||[FlyJB-X](https://github.com/XsF1re/
