Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sensepost/objection
π± objection - runtime mobile exploration
https://github.com/sensepost/objection
android framework frida instrumentation ios mobile pentest security
Last synced: 3 days ago
JSON representation
π± objection - runtime mobile exploration
- Host: GitHub
- URL: https://github.com/sensepost/objection
- Owner: sensepost
- License: gpl-3.0
- Created: 2017-06-29T11:21:38.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2024-09-13T12:21:03.000Z (3 months ago)
- Last Synced: 2024-12-02T13:07:59.607Z (10 days ago)
- Topics: android, framework, frida, instrumentation, ios, mobile, pentest, security
- Language: Python
- Homepage:
- Size: 10.4 MB
- Stars: 7,603
- Watchers: 158
- Forks: 860
- Open Issues: 89
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- awesome-iOS-security - objection
- Awesome-Pentest - objection - objection is a runtime mobile exploration toolkit, powered by Frida. (Mobile Security / Misc)
- awesome-ios-security - objection - A runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. (Tools / Dynamic Analysis Tools)
- awesome-apple-security - objection - A runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. (Tools / Dynamic Analysis Tools)
- awesome-ios-security-cn - Link
- awesome-hacking-lists - sensepost/objection - π± objection - runtime mobile exploration (Python)
README
# π±objection - Runtime Mobile Exploration
`objection` is a runtime mobile exploration toolkit, powered by [Frida](https://www.frida.re/), built to help you assess the security posture of your mobile applications, without needing a jailbreak.
[![Twitter](https://img.shields.io/badge/twitter-%40leonjza-blue.svg)](https://twitter.com/leonjza)
[![PyPi](https://badge.fury.io/py/objection.svg)](https://pypi.python.org/pypi/objection)
[![Black Hat Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg?sanitize=true)](https://www.blackhat.com/eu-17/arsenal-overview.html)
[![Black Hat Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2019.svg?sanitize=true)](https://www.blackhat.com/us-19/arsenal-overview.html)- Supports both iOS and Android.
- Inspect and interact with container file systems.
- Bypass SSL pinning.
- Dump keychains.
- Perform memory related tasks, such as dumping & patching.
- Explore and manipulate objects on the heap.
- And much, much [more](https://github.com/sensepost/objection/wiki/Features)...Screenshots are available in the [wiki](https://github.com/sensepost/objection/wiki/Screenshots).
## installation
Installation is simply a matter of `pip3 install objection`. This will give you the `objection` command. You can update an existing `objection` installation with `pip3 install --upgrade objection`.
For more detailed update and installation instructions, please refer to the wiki page [here](https://github.com/sensepost/objection/wiki/Installation).
## license
`objection` is licensed under a [GNU General Public v3 License](https://www.gnu.org/licenses/gpl-3.0.en.html). Permissions beyond the scope of this license may be available at [http://sensepost.com/contact/](http://sensepost.com/contact/).