Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/mobile_security.py
2371 views
1
from core import HackingTool
2
from core import HackingToolsCollection
3
4
5
class MobSF(HackingTool):
6
TITLE = "MobSF (Mobile Security Framework)"
7
DESCRIPTION = "All-in-one mobile app pentesting, malware analysis, and security assessment."
8
INSTALL_COMMANDS = [
9
"git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git",
10
"cd Mobile-Security-Framework-MobSF && ./setup.sh",
11
]
12
RUN_COMMANDS = ["cd Mobile-Security-Framework-MobSF && ./run.sh"]
13
PROJECT_URL = "https://github.com/MobSF/Mobile-Security-Framework-MobSF"
14
SUPPORTED_OS = ["linux", "macos"]
15
16
17
class Frida(HackingTool):
18
TITLE = "Frida (Dynamic Instrumentation)"
19
DESCRIPTION = "Dynamic instrumentation toolkit for runtime hooking on Android, iOS, Windows, macOS, Linux."
20
INSTALL_COMMANDS = ["pip install --user frida-tools"]
21
RUN_COMMANDS = ["frida --help"]
22
PROJECT_URL = "https://github.com/frida/frida"
23
SUPPORTED_OS = ["linux", "macos"]
24
25
26
class Objection(HackingTool):
27
TITLE = "Objection (Mobile Runtime Exploration)"
28
DESCRIPTION = "Runtime mobile exploration toolkit powered by Frida — no jailbreak/root required."
29
INSTALL_COMMANDS = ["pip install --user objection"]
30
RUN_COMMANDS = ["objection --help"]
31
PROJECT_URL = "https://github.com/sensepost/objection"
32
SUPPORTED_OS = ["linux", "macos"]
33
34
35
class MobileSecurityTools(HackingToolsCollection):
36
TITLE = "Mobile Security Tools"
37
DESCRIPTION = "Tools for Android/iOS application security testing and analysis."
38
TOOLS = [
39
MobSF(),
40
Frida(),
41
Objection(),
42
]
43