Read a plist file, write out any embedded plist files
-
Updated
Dec 27, 2015 - Python
Read a plist file, write out any embedded plist files
Recover the Android swipe lock pattern from a gesture.key file.
The Leading Security Assessment Framework for Android.
Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. The map itself is an Android Application Pentesting Methodology component, which assists Pentesters to cover all important areas during an assessment.
frick - aka the first debugger built on top of frida - is a kick ass frida cli for reverse engineer inspired by the epic GDB init gef by @hugsy.
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing.
Droz_scan is a automated script, that runs all the queries of drozer in a single run
Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.
The MPT (Mobile Pentest Toolkit) is a must-have solution for your android penetration testing workflow.
Add a description, image, and links to the mobile-pentest topic page so that developers can more easily learn about it.
To associate your repository with the mobile-pentest topic, visit your repo's landing page and select "manage topics."