sensepost / objection

📱 objection - runtime mobile exploration

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

📱objection - Runtime Mobile Exploration

objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.

Twitter PyPi Black Hat Arsenal Black Hat Arsenal

objection

  • Supports both iOS and Android.
  • Inspect and interact with container file systems.
  • Bypass SSL pinning.
  • Dump keychains.
  • Perform memory related tasks, such as dumping & patching.
  • Explore and manipulate objects on the heap.
  • And much, much more...

Screenshots are available in the wiki.

installation

Installation is simply a matter of pip3 install objection. This will give you the objection command. You can update an existing objection installation with pip3 install --upgrade objection.

For more detailed update and installation instructions, please refer to the wiki page here.

license

objection is licensed under a GNU General Public v3 License. Permissions beyond the scope of this license may be available at http://sensepost.com/contact/.

About

📱 objection - runtime mobile exploration

License:GNU General Public License v3.0


Languages

Language:Python 64.4%Language:TypeScript 33.4%Language:JavaScript 2.1%Language:Objective-C 0.1%Language:Makefile 0.0%