{"id":13438288,"url":"https://github.com/dpnishant/appmon","last_synced_at":"2025-05-15T17:08:55.799Z","repository":{"id":43690247,"uuid":"57376133","full_name":"dpnishant/appmon","owner":"dpnishant","description":"Documentation:","archived":false,"fork":false,"pushed_at":"2023-05-01T20:29:15.000Z","size":33264,"stargazers_count":1591,"open_issues_count":38,"forks_count":278,"subscribers_count":75,"default_branch":"master","last_synced_at":"2025-05-12T22:35:38.760Z","etag":null,"topics":["android","appmon","frida","instrumentation","ios-app","macos-app","mobile-security","reverse-engineering","security-tools"],"latest_commit_sha":null,"homepage":"http://dpnishant.github.io/appmon","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/dpnishant.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2016-04-29T10:16:13.000Z","updated_at":"2025-05-11T20:07:36.000Z","dependencies_parsed_at":"2023-02-17T15:01:20.748Z","dependency_job_id":"6932330c-9e7f-426d-b877-c65497db86b8","html_url":"https://github.com/dpnishant/appmon","commit_stats":null,"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dpnishant%2Fappmon","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dpnishant%2Fappmon/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dpnishant%2Fappmon/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/dpnishant%2Fappmon/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/dpnishant","download_url":"https://codeload.github.com/dpnishant/appmon/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254384989,"owners_count":22062422,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","appmon","frida","instrumentation","ios-app","macos-app","mobile-security","reverse-engineering","security-tools"],"created_at":"2024-07-31T03:01:04.286Z","updated_at":"2025-05-15T17:08:55.758Z","avatar_url":"https://github.com/dpnishant.png","language":"JavaScript","readme":"![](https://raw.githubusercontent.com/dpnishant/appmon/master/resources/logo.png)\nWelcome to AppMon!\n==================\nAs seen at [![](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.blackhat.com/us-16/arsenal.html#appmon) US \u0026 [![](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.blackhat.com/eu-16/arsenal.html#appmon-runtime-security-testing-and-profiling-framework-for-native-apps) EU\n\n[![Backers on Open Collective](https://opencollective.com/appmon/backers/badge.svg)](#backers)\n [![Sponsors on Open Collective](https://opencollective.com/appmon/sponsors/badge.svg)](#sponsors) \n\nAppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on [**Frida**](http://www.frida.re).\n\nThis project was only possible because of **Ole André Vadla Ravnås** and I dedicate it to him. Follow him on [**GitHub**](https://github.com/oleavr), [**Twitter**](https://twitter.com/oleavr)\n\nIt consists of the following components:\n\n* AppMon Sniffer - Intercept API calls to figure out interesting operations performed by an App\n* Appmon Intruder - Manipulate API calls data to create change app's original behavior\n* AppMon Android Tracer - Automatically traces Java classes, methods, its arguments and their data-types in Android APKs\n* AppMon IPA Installer - Creates and installs \"inspectable\" IPAs on non-jailbroken iOS devices\n* AppMon APK Builder - Creates APKs \"inspectable\" on non-rooted Android devices\n\nNew/Experimental Features\n=====================\n[Details](https://github.com/dpnishant/appmon/wiki/Experimental-Features)\n\n\nDocumentation\n=============\nFollow the documentation below to learn more.\n[Click Here](https://dpnishant.github.io/appmon/)\n\n\nCredits\n=============\n\n|JetBrains|\n|:-:|\n|![JetBrains](https://github.com/dpnishant/appmon/raw/master/resources/external/jetbrains.png)|\n|Many thanks to [JetBrains s.r.o.](https://www.jetbrains.com) for providing a free license of [All Products Pack](https://www.jetbrains.com/store/?fromMenu#edition=personal) to kindly support the development of appmon.|\n\n## Contributors\n\nThis project exists thanks to all the people who contribute. \n\u003ca href=\"graphs/contributors\"\u003e\u003cimg src=\"https://opencollective.com/appmon/contributors.svg?width=890\u0026button=false\" /\u003e\u003c/a\u003e\n\n\n## Backers\n\nThank you to all our backers! 🙏 [[Become a backer](https://opencollective.com/appmon#backer)]\n\n\u003ca href=\"https://opencollective.com/appmon#backers\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/backers.svg?width=890\"\u003e\u003c/a\u003e\n\n\n## Sponsors\n\nSupport this project by becoming a sponsor. Your logo will show up here with a link to your website. [[Become a sponsor](https://opencollective.com/appmon#sponsor)]\n\n\u003ca href=\"https://opencollective.com/appmon/sponsor/0/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/0/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/1/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/1/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/2/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/2/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/3/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/3/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/4/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/4/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/5/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/5/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/6/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/6/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/7/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/7/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/8/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/8/avatar.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://opencollective.com/appmon/sponsor/9/website\" target=\"_blank\"\u003e\u003cimg src=\"https://opencollective.com/appmon/sponsor/9/avatar.svg\"\u003e\u003c/a\u003e\n\n\n","funding_links":["https://opencollective.com/appmon"],"categories":["Android Security","\u003ca id=\"9eee96404f868f372a6cbc6769ccb7f8\"\u003e\u003c/a\u003e新添加的","JavaScript","Tools","JavaScript (485)","Dynamic Analysis","\u003ca id=\"f24f1235fd45a1aa8d280eff1f03af7e\"\u003e\u003c/a\u003eFrida","Powered by Frida","Penetration Testing"],"sub_categories":["Misc Tools","\u003ca id=\"31185b925d5152c7469b963809ceb22d\"\u003e\u003c/a\u003e新添加的","\u003ca id=\"a5336a0f9e8e55111bda45c8d74924c1\"\u003e\u003c/a\u003e工具","Mobile Penetration Testing"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdpnishant%2Fappmon","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdpnishant%2Fappmon","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdpnishant%2Fappmon/lists"}