Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/dpnishant/appmon
Documentation:
https://github.com/dpnishant/appmon
android appmon frida instrumentation ios-app macos-app mobile-security reverse-engineering security-tools
Last synced: 6 days ago
JSON representation
Documentation:
- Host: GitHub
- URL: https://github.com/dpnishant/appmon
- Owner: dpnishant
- License: apache-2.0
- Created: 2016-04-29T10:16:13.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2023-05-01T20:29:15.000Z (over 1 year ago)
- Last Synced: 2024-12-01T20:22:58.270Z (11 days ago)
- Topics: android, appmon, frida, instrumentation, ios-app, macos-app, mobile-security, reverse-engineering, security-tools
- Language: JavaScript
- Homepage: http://dpnishant.github.io/appmon
- Size: 31.7 MB
- Stars: 1,566
- Watchers: 76
- Forks: 278
- Open Issues: 38
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-tools - AppMon - AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on Frida. (Android Security / Misc Tools)
- awesome-hacking-lists - dpnishant/appmon - Documentation: (JavaScript)
README
![](https://raw.githubusercontent.com/dpnishant/appmon/master/resources/logo.png)
Welcome to AppMon!
==================
As seen at [![](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.blackhat.com/us-16/arsenal.html#appmon) US & [![](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.blackhat.com/eu-16/arsenal.html#appmon-runtime-security-testing-and-profiling-framework-for-native-apps) EU[![Backers on Open Collective](https://opencollective.com/appmon/backers/badge.svg)](#backers)
[![Sponsors on Open Collective](https://opencollective.com/appmon/sponsors/badge.svg)](#sponsors)AppMon is an automated framework for monitoring and tampering system API calls of native macOS, iOS and android apps. It is based on [**Frida**](http://www.frida.re).
This project was only possible because of **Ole André Vadla Ravnås** and I dedicate it to him. Follow him on [**GitHub**](https://github.com/oleavr), [**Twitter**](https://twitter.com/oleavr)
It consists of the following components:
* AppMon Sniffer - Intercept API calls to figure out interesting operations performed by an App
* Appmon Intruder - Manipulate API calls data to create change app's original behavior
* AppMon Android Tracer - Automatically traces Java classes, methods, its arguments and their data-types in Android APKs
* AppMon IPA Installer - Creates and installs "inspectable" IPAs on non-jailbroken iOS devices
* AppMon APK Builder - Creates APKs "inspectable" on non-rooted Android devicesNew/Experimental Features
=====================
[Details](https://github.com/dpnishant/appmon/wiki/Experimental-Features)Documentation
=============
Follow the documentation below to learn more.
[Click Here](https://dpnishant.github.io/appmon/)Credits
=============|JetBrains|
|:-:|
|![JetBrains](https://github.com/dpnishant/appmon/raw/master/resources/external/jetbrains.png)|
|Many thanks to [JetBrains s.r.o.](https://www.jetbrains.com) for providing a free license of [All Products Pack](https://www.jetbrains.com/store/?fromMenu#edition=personal) to kindly support the development of appmon.|## Contributors
This project exists thanks to all the people who contribute.
## Backers
Thank you to all our backers! 🙏 [[Become a backer](https://opencollective.com/appmon#backer)]
## Sponsors
Support this project by becoming a sponsor. Your logo will show up here with a link to your website. [[Become a sponsor](https://opencollective.com/appmon#sponsor)]