Michael Spreitzenbarth's starred repositories
Android-InsecureBankv2
Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities
AwesomeXSS
Awesome XSS stuff
MobileSandbox
Source code and tools of the former Mobile-Sandbox
FridaWorkshop
Break Apps with Frida workshop material
detect.location
An easy way to access the user's iOS location data without actually having access
owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
frida-scripts
Frida Scripts
vulnreport
Open-source pentesting management and automation platform by Salesforce Product Security
gplay-scraper
Minimalistic command line Google Play Store scraper for Android apps. Given a search term, it returns a list of package names that match the search.
deobfuscator
The real deal
osxcollector
A forensic evidence collection & analysis toolkit for OS X
Presentations
Presentation Archives for my macOS and iOS Related Research
awesome-incident-response
A curated list of tools for incident response
mobile-incident-response
Mobile Incident Response Book
sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
macOS-Security-and-Privacy-Guide
Guide to securing and improving privacy on macOS
dumpdecrypted
Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.