https://github.com/sensepost/objection
📱 objection - runtime mobile exploration
https://github.com/sensepost/objection
android framework frida instrumentation ios mobile pentest security
Last synced: 21 days ago
JSON representation
📱 objection - runtime mobile exploration
- Host: GitHub
- URL: https://github.com/sensepost/objection
- Owner: sensepost
- License: gpl-3.0
- Created: 2017-06-29T11:21:38.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2025-03-21T15:13:44.000Z (about 1 month ago)
- Last Synced: 2025-03-25T05:34:35.769Z (28 days ago)
- Topics: android, framework, frida, instrumentation, ios, mobile, pentest, security
- Language: Python
- Homepage:
- Size: 10.4 MB
- Stars: 7,918
- Watchers: 157
- Forks: 878
- Open Issues: 83
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- awesome-iOS-security-tools - objection
- Awesome-Pentest - objection - objection is a runtime mobile exploration toolkit, powered by Frida. (Mobile Security / Misc)
- awesome-ios-security - objection - A runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. (Tools / Dynamic Analysis Tools)
- awesome-apple-security - objection - A runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. (Tools / Dynamic Analysis Tools)
- awesome-ios-security-cn - Link
- StarryDivineSky - sensepost/objection
- awesome-hacking-lists - sensepost/objection - 📱 objection - runtime mobile exploration (Python)
README
# 📱objection - Runtime Mobile Exploration
`objection` is a runtime mobile exploration toolkit, powered by [Frida](https://www.frida.re/), built to help you assess the security posture of your mobile applications, without needing a jailbreak.
[](https://twitter.com/leonjza)
[](https://pypi.python.org/pypi/objection)
[](https://www.blackhat.com/eu-17/arsenal-overview.html)
[](https://www.blackhat.com/us-19/arsenal-overview.html)
- Supports both iOS and Android.
- Inspect and interact with container file systems.
- Bypass SSL pinning.
- Dump keychains.
- Perform memory related tasks, such as dumping & patching.
- Explore and manipulate objects on the heap.
- And much, much [more](https://github.com/sensepost/objection/wiki/Features)...Screenshots are available in the [wiki](https://github.com/sensepost/objection/wiki/Screenshots).
## installation
Installation is simply a matter of `pip3 install objection`. This will give you the `objection` command. You can update an existing `objection` installation with `pip3 install --upgrade objection`.
For more detailed update and installation instructions, please refer to the wiki page [here](https://github.com/sensepost/objection/wiki/Installation).
## license
`objection` is licensed under a [GNU General Public v3 License](https://www.gnu.org/licenses/gpl-3.0.en.html). Permissions beyond the scope of this license may be available at [http://sensepost.com/contact/](http://sensepost.com/contact/).