CapFuzz - capture, fuzz & intercept web traffic.
-
Updated
Mar 22, 2018 - CSS
CapFuzz - capture, fuzz & intercept web traffic.
Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing.
Quickly analyze and reverse engineer Android packages
Bypass SSL certificate pinning for most applications
The Leading Security Assessment Framework for Android.
Instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS and macOS
Repository with research related to Android
Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat
Easy SSL pinning validation and reporting for Android.
Android application vulnerability analysis and Android pentest tool
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
A library to use Xposed without root or recovery(or modify system image etc..).
Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. The map itself is an Android Application Pentesting Methodology component, which assists Pentesters to cover all important areas during an assessment.
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Add a description, image, and links to the mobile-pentest topic page so that developers can more easily learn about it.
To associate your repository with the mobile-pentest topic, visit your repo's landing page and select "manage topics."