Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
android-application dynamic-analysis ios-app mobile-app network-analysis pentesting reverse-engineers runtime-analysis static-analysis
Last synced: about 2 months ago
JSON representation
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
- Host: GitHub
- URL: https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
- Owner: tanprathan
- Created: 2015-10-01T08:11:57.000Z (about 9 years ago)
- Default Branch: master
- Last Pushed: 2024-02-08T14:18:04.000Z (10 months ago)
- Last Synced: 2024-10-16T15:25:36.336Z (about 2 months ago)
- Topics: android-application, dynamic-analysis, ios-app, mobile-app, network-analysis, pentesting, reverse-engineers, runtime-analysis, static-analysis
- Homepage:
- Size: 333 KB
- Stars: 4,572
- Watchers: 219
- Forks: 1,245
- Open Issues: 15
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-tools - Mobile App Pentest Cheat Sheet
- awesome-pentest-cheat-sheets - Mobile App Pentest Cheat Sheet - Collection of resources on Apple & iOS Penetration Testing (π± Mobile Pentesting)
- awesome-hacking-lists - tanprathan/MobileApp-Pentest-Cheatsheet - The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics. (Others)
README
## Mobile Application Penetration Testing Cheat Sheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics and checklist, which is mapped OWASP Mobile Risk Top 10 for conducting pentest.
- [Mobile Application Security Testing Distributions](#mobile-application-security-testing-distributions)
- [All-in-one Mobile Security Frameworks](#all-in-one-mobile-security-frameworks)
- [Android Application Penetration Testing](#android-application-penetration-testing)
- [Reverse Engineering and Static Analysis](#reverse-engineering-and-static-analysis)
- [Dynamic and Runtime Analysis](#dynamic-and-runtime-analysis)
- [Network Analysis and Server Side Testing](#network-analysis-and-server-side-testing)
- [Bypassing Root Detection and SSL Pinning](#bypassing-root-detection-and-ssl-pinning)
- [Security Libraries](#security-libraries)
- [iOS Application Penetration Testing](#ios-application-penetration-testing)
- [Access Filesystem on iDevice](#access-filesystem-on-idevice)
- [Reverse Engineering and Static Analysis](#reverse-engineering-and-static-analysis)
- [Dynamic and Runtime Analysis](#dynamic-and-runtime-analysis)
- [Network Analysis and Server Side Testing](#network-analysis-and-server-side-testing)
- [Bypassing Root Detection and SSL Pinning](#bypassing-root-detection-and-ssl-pinning)
- [Security Libraries](#security-libraries)
- [Mobile Penetration Testing Lab](#mobile-penetration-testing-lab)
- [Contribution](#contribution)
- [License](#license)### Mobile Application Security Testing Distributions
* [Appie](https://manifestsecurity.com/appie) - A portable software package for Android Pentesting and an awesome alternative to existing Virtual machines.
* [Android Tamer](https://androidtamer.com/) - Android Tamer is a Virtual / Live Platform for Android Security professionals.
* [Androl4b](https://github.com/sh4hin/Androl4b) - A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
* [Vezir Project](https://github.com/oguzhantopgul/Vezir-Project) - Mobile Application Pentesting and Malware Analysis Environment.
* [Mobexler](https://mobexler.com/) - Mobexler is a customised virtual machine, designed to help in penetration testing of Android & iOS applications.### All-in-One Mobile Security Frameworks
* [Mobile Security Framework - MobSF](https://github.com/ajinabraham/Mobile-Security-Framework-MobSF) - Mobile Security Framework is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis.
* `python manage.py runserver 127.0.0.1:1337`
* [Needle](https://github.com/mwrlabs/needle) - Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps including Binary Analysis, Static Code Analysis, Runtime Manipulation using Cycript and Frida hooking, and so on.
* [Objection](https://github.com/sensepost/objection) - Objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device.
* [RMS-Runtime-Mobile-Security](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime.### Android Application Penetration Testing
#### Reverse Engineering and Static Analysis
* [APKTool](http://ibotpeaches.github.io/Apktool/) - A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications.
* Disassembling Android apk file
* `apktool d `
* Rebuilding decoded resources back to binary APK/JAR with certificate signing
* `apktool b `
* `keytool -genkey -v -keystore keys/test.keystore -alias Test -keyalg RSA -keysize 1024 -sigalg SHA1withRSA -validity 10000`
* `jarsigner -keystore keys/test.keystore dist/test.apk -sigalg SHA1withRSA -digestalg SHA1 Test`
* [Bytecode Viewer](https://github.com/Konloch/bytecode-viewer) - Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, It's written completely in Java, and it's open sourced.
* [Jadx](https://github.com/skylot/jadx) - Dex to Java decompiler: Command line and GUI tools for produce Java source code from Android Dex and Apk files.
* [APK Studio](https://github.com/vaibhavpandeyvpz/apkstudio) - Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
* [Oat2dex](https://github.com/testwhat/SmaliEx) - A tool for converting .oat file to .dex files.
* Deoptimize boot classes (The output will be in "odex" and "dex" folders)
* `java -jar oat2dex.jar boot `
* Deoptimize application
* `java -jar oat2dex.jar `
* Get odex from oat
* `java -jar oat2dex.jar odex `
* Get odex smali (with optimized opcode) from oat/odex
* `java -jar oat2dex.jar smali `
* [Spotbugs](https://github.com/spotbugs/spotbugs) - SpotBugs is FindBugs' successor. A tool for static analysis to look for bugs in Java code.
* [Qark](https://github.com/linkedin/qark) - This tool is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs.
* [SUPER](https://github.com/SUPERAndroidAnalyzer/super) - SUPER is a command-line application that can be used in Windows, MacOS X and Linux, that analyzes .apk files in search for vulnerabilities. It does this by decompressing APKs and applying a series of rules to detect those vulnerabilities.
* [AndroBugs](https://github.com/AndroBugs/AndroBugs_Framework) - AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.
* [Simplify](https://github.com/CalebFenton/simplify) - A tool for de-obfuscating android package into Classes.dex which can be use Dex2jar and JD-GUI to extract contents of dex file.
* `simplify.jar -i "input smali files or folder" -o `
* [ClassNameDeobfuscator](https://github.com/HamiltonianCycle/ClassNameDeobfuscator) - Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.
* [Android backup extractor](https://github.com/nelenkov/android-backup-extractor) - Utility to extract and repack Android backups created with adb backup (ICS+). Largely based on BackupManagerService.java from AOSP.
Tip !! "adb backup" command can also be used for extracting application package with the following command:
* `adb backup `
* `dd if=backup.ab bs=1 skip=24 | python -c "import zlib,sys;sys.stdout.write(zlib.decompress(sys.stdin.read()))" > backup.tar`
* [GDA(GJoy Dex Analysizer)](https://github.com/charles2gan/GDA-android-reversing-Tool) - GDA, a new Dalvik bytecode decompiler, is implemented in C++, which has the advantages of faster analysis and lower memory&disk consumption and an stronger ability to decompiling the APK, DEX, ODEX, OAT files(supports JAR, CLASS and AAR files since 3.79)
#### Dynamic and Runtime Analysis
* [Cydia Substrate](http://www.cydiasubstrate.com/) - Cydia Substrate for Android enables developers to make changes to existing software with Substrate extensions that are injected in to the target process's memory.
* [Xposed Framework](http://forum.xda-developers.com/xposed/xposed-installer-versions-changelog-t2714053) - Xposed framework enables you to modify the system or application aspect and behaviour at runtime, without modifying any Android application package(APK) or re-flashing.
* [PID Cat](https://github.com/JakeWharton/pidcat) - An update to Jeff Sharkey's excellent logcat color script which only shows log entries for processes from a specific application package.
* [Inspeckage](https://github.com/ac-pm/Inspeckage) - Inspeckage is a tool developed to offer dynamic analysis of Android applications. By applying hooks to functions of the Android API, Inspeckage will help you understand what an Android application is doing at runtime.
* [Frida](http://www.frida.re/) - The toolkit works using a client-server model and lets you inject in to running processes not just on Android, but also on iOS, Windows and Mac.
* [Diff-GUI](https://github.com/antojoseph/diff-gui) - A Web framework to start instrumenting with the avaliable modules, hooking on native, inject JavaScript using Frida.
* [Fridump](https://github.com/Nightbringer21/fridump) - Fridump is using the Frida framework to dump accessible memory addresses from any platform supported. It can be used from a Windows, Linux or Mac OS X system to dump the memory of an iOS, Android or Windows application.
* [House](https://github.com/nccgroup/house) - A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, is designed for helping assess mobile applications by implementing dynamic function hooking and intercepting and intended to make Frida script writing as simple as possible.
* [AndBug](https://github.com/swdunlop/AndBug) - AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers.
* Identifying application process using adb shell
* `adb shell ps | grep -i "App keyword"`
* Accessing the application using AndBug in order to identify loaded classes
* `andbug shell -p `
* Tracing specific class
* `ct `
* Debugging with jdb
* `adb forward tcp: jdwp:`
* `jdb -attach localhost:`
* [Cydia Substrate: Introspy-Android](https://github.com/iSECPartners/Introspy-Android) - Blackbox tool to help understand what an Android application is doing at runtime and assist in the identification of potential security issues.
* [Drozer](https://github.com/FSecureLABS/drozer) - Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.
* Starting a session
* `adb forward tcp:31415 tcp:31415`
* `drozer console connect`
* Retrieving package information
* `run app.package.list -f `
* `run app.package.info -a `
* Identifying the attack surface
* `run app.package.attacksurface `
* Exploiting Activities
* `run app.activity.info -a -u`
* `run app.activity.start --component `
* Exploiting Content Provider
* `run app.provider.info -a `
* `run scanner.provider.finduris -a `
* `run app.provider.query `
* `run app.provider.update --selection `
* `run scanner.provider.sqltables -a `
* `run scanner.provider.injection -a `
* `run scanner.provider.traversal -a `
* Exploiting Broadcast Receivers
* `run app.broadcast.info -a `
* `run app.broadcast.send --component --extra `
* `run app.broadcast.sniff --action `
* Exploiting Service
* `run app.service.info -a `
* `run app.service.start --action --component `
* `run app.service.send --msg --extra --bundle-as-obj`#### Network Analysis and Server Side Testing
* [Tcpdump](http://www.androidtcpdump.com) - A command line packet capture utility.
* [Wireshark](https://www.wireshark.org/download.html) - An open-source packet analyzer.
* Live packet captures in real time
* `adb shell "tcpdump -s 0 -w - | nc -l -p 4444"`
* `adb forward tcp:4444 tcp:4444`
* `nc localhost 4444 | sudo wireshark -k -S -i β`
* [Mallory](https://intrepidusgroup.com/insight/mallory/) - A Man in The Middle Tool (MiTM) that use to monitor and manipulate traffic on mobile devices and applications.
* [Burp Suite](https://portswigger.net/burp/download.html) - Burp Suite is an integrated platform for performing security testing of applications.
* Installing trusted CA at the Android OS level (Root device/Emulator) for Android N+ as the following:
* `openssl x509 -inform PEM -subject_hash -in BurpCA.pem | head -1`
* `cat BurpCA.pem > 9a5ba580.0`
* `openssl x509 -inform PEM -text -in BurpCA.pem -out /dev/null >> 9a5ba580.0`
* `adb root`
* `abd remount`
* `adb push 9a5ba580.0 /system/etc/security/cacerts/`
* `adb shell βchmod 644 /system/etc/security/cacerts/9a5ba580.0β`
* `adb shell βrebootβ`
* Check Settings > Security > Trusted Credentials > SYSTEM to confirm your newly added CA is listed.
* [Burp Suite Mobile Assistant](https://portswigger.net/burp/documentation/desktop/mobile-testing) - Burp Suite Mobile Assistant is a tool to facilitate testing of iOS apps with Burp Suite; It can modify the system-wide proxy settings of iOS devices so that HTTP(S) traffic can be easily redirected to a running instance of Burp, It can attempt to circumvent SSL certificate pinning in selected apps, allowing Burp Suite to break their HTTPS connections and intercept, inspect and modify all traffic.
* [OWASP ZAP](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - OWASP Zed Attack Proxy Project is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers.
* [Proxydroid](https://play.google.com/store/apps/details?id=org.proxydroid) - Global Proxy App for Android System.
* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.#### Bypassing Root Detection and SSL Pinning
* [Magisk](https://github.com/topjohnwu/Magisk) - Magisk suites provide root access to your device, capability to modify read-only partitions by installing modules and hide Magisk from root detections/system integrity checks.
* [Xposed Module: Just Trust Me](https://github.com/Fuzion24/JustTrustMe) - Xposed Module to bypass SSL certificate pinning.
* [Xposed Module: SSLUnpinning](https://github.com/ac-pm/SSLUnpinning_Xposed) - Android Xposed Module to bypass SSL certificate validation (Certificate Pinning).
* [Cydia Substrate Module: Android SSL Trust Killer](https://github.com/iSECPartners/Android-SSL-TrustKiller) - Blackbox tool to bypass SSL certificate pinning for most applications running on a device.
* [Cydia Substrate Module: RootCoak Plus](https://github.com/devadvance/rootcloakplus) - Patch root checking for commonly known indications of root.
* [Android-ssl-bypass](https://github.com/iSECPartners/android-ssl-bypass) - an Android debugging tool that can be used for bypassing SSL, even when certificate pinning is implemented, as well as other debugging tasks. The tool runs as an interactive console.
* [Apk-mitm](https://github.com/shroudedcode/apk-mitm) - A CLI application that automatically prepares Android APK files for HTTPS inspection
* [Frida CodeShare](https://codeshare.frida.re/) - The Frida CodeShare project is comprised of developers from around the world working together with one goal - push Frida to its limits in new and innovative ways.
* Bypassing Root Detection
* `frida --codeshare dzonerzy/fridantiroot -f YOUR_BINARY`
* Bypassing SSL Pinning
* `frida --codeshare pcipolloni/universal-android-ssl-pinning-bypass-with-frida -f YOUR_BINARY`#### Security Libraries
* [PublicKey Pinning](https://www.owasp.org/images/1/1f/Pubkey-pin-android.zip) - Pinning in Android can be accomplished through a custom X509TrustManager. X509TrustManager should perform the customary X509 checks in addition to performing the pinning configuration.
* [Android Pinning](https://github.com/moxie0/AndroidPinning) - A standalone library project for certificate pinning on Android.
* [Java AES Crypto](https://github.com/tozny/java-aes-crypto) - A simple Android class for encrypting & decrypting strings, aiming to avoid the classic mistakes that most such classes suffer from.
* [Proguard](http://proguard.sourceforge.net/) - ProGuard is a free Java class file shrinker, optimizer, obfuscator, and preverifier. It detects and removes unused classes, fields, methods, and attributes.
* [SQL Cipher](https://www.zetetic.net/sqlcipher/sqlcipher-for-android/) - SQLCipher is an open source extension to SQLite that provides transparent 256-bit AES encryption of database files.
* [Secure Preferences](https://github.com/scottyab/secure-preferences) - Android Shared preference wrapper than encrypts the keys and values of Shared Preferences.
* [Trusted Intents](https://github.com/guardianproject/TrustedIntents) - Library for flexible trusted interactions between Android apps.
* [RootBeer](https://github.com/scottyab/rootbeer) - A tasty root checker library and sample app.
* [End-to-end encryption](https://github.com/google/capillary) - Capillary is a library to simplify the sending of end-to-end encrypted push messages from Java-based application servers to Android clients.### iOS Application Penetration Testing
#### Access Filesystem on iDevice
* [FileZilla](https://filezilla-project.org/download.php?show_all=1) - It supports FTP, SFTP, and FTPS (FTP over SSL/TLS).
* [Cyberduck](https://cyberduck.io) - Libre FTP, SFTP, WebDAV, S3, Azure & OpenStack Swift browser for Mac and Windows.
* [itunnel](https://code.google.com/p/iphonetunnel-usbmuxconnectbyport/downloads/list) - Use to forward SSH via USB.
* [iProxy](https://github.com/tcurdt/iProxy) - Let's you connect your laptop to the iPhone to surf the web.
* [iFunbox](http://www.i-funbox.com) - The File and App Management Tool for iPhone, iPad & iPod Touch.#### Reverse Engineering and Static Analysis
* [otool](http://www.unix.com/man-page/osx/1/otool/) - The otool command displays specified parts of object files or libraries.
* [Clutch](http://cydia.radare.org/) - Decrypted the application and dump specified bundleID into binary or .ipa file.
* [Dumpdecrypted](https://github.com/stefanesser/dumpdecrypted) - Dumps decrypted mach-o files from encrypted iPhone applications from memory to disk. This tool is necessary for security researchers to be able to look under the hood of encryption.
* `iPod:~ root# DYLD_INSERT_LIBRARIES=dumpdecrypted.dylib /var/mobile/Applications/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/Scan.app/Scan`
* [class-dump](http://stevenygard.com/projects/class-dump/) - A command-line utility for examining the Objective-C runtime information stored in Mach-O files.
* [dsdump](https://github.com/DerekSelander/dsdump) - An improved nm + objc/swift class-dump.
* [Weak Classdump](https://github.com/limneos/weak_classdump) - A Cycript script that generates a header file for the class passed to the function. Most useful when you cannot classdump or dumpdecrypted , when binaries are encrypted etc.
* `iPod:~ root# cycript -p Skype weak_classdump.cy; cycript -p Skype`
* `#cy weak_classdump_bundle([NSBundle mainBundle],"/tmp/Skype")`
* [Fridpa](https://github.com/tanprathan/Fridpa) - An automated wrapper script for patching iOS applications (IPA files) and work on non-jailbroken device.
* [Frida-iOS-Dump](https://github.com/AloneMonkey/frida-ios-dump) - Pull a decrypted IPA from a jailbroken device.
* [bagbak](https://github.com/ChiChou/bagbak) - Yet another frida based iOS dumpdecrypted, supports decrypting app extensions and no SSH required.
* [bfinject](https://github.com/BishopFox/bfinject) - bfinject loads arbitrary dylibs into running App Store apps. It has built-in support for decrypting App Store apps, and comes bundled with iSpy and Cycript.
* A Simple Test
* `bash bfinject -P Reddit -L test`
* Decrypt App Store apps
* `bash bfinject -P Reddit -L decrypt`
* Cycript
* `bash bfinject -P Reddit -L cycript `
* [HopperApp](http://hopperapp.com/) - Hopper is a reverse engineering tool for OS X and Linux, that lets you disassemble, decompile and debug your 32/64bits Intel Mac, Linux, Windows and iOS executables.
* [hopperscripts](https://github.com/Januzellij/hopperscripts) - Hopperscripts can be used to demangle the Swift function name in HopperApp.
* [Radare2](http://www.radare.org/) - Radare2 is a unix-like reverse engineering framework and commandline tools.
* [XReSign](https://github.com/xndrs/XReSign) - XReSign allows you to sign or resign unencrypted ipa-files with certificate for which you hold the corresponding private key. Checked for developer, ad-hoc and enterprise distribution.
#### Dynamic and Runtime Analysis
* [cycript](http://www.cycript.org) - Cycript allows developers to explore and modify running applications on either iOS or Mac OS X using a hybrid of Objective-C++ and JavaScript syntax through an interactive console that features syntax highlighting and tab completion.
* Show currently visible view controller
* `cy# UIApp.keyWindow.rootViewController.visibleViewController`
* Show view controller at the top of the navigation stack
* `cy# UIApp.keyWindow.rootViewController.topViewController`
* Get an array of existing objects of a certain class
* `cy# choose(UIViewController)`
* UI Dump,cuts off lots of descriptions of UIViews
* `cy# [[UIApp keyWindow] _autolayoutTrace].toString()`
* Skip UIViews and nextResponders to get ViewControllers directly
* `cy# [[[UIApp keyWindow] rootViewController] _printHierarchy].toString()`
* List method at runtime
* `cy# classname.messages` or
``
cy# function printMethods(className, isa) {
var count = new new Type("I");
var classObj = (isa != undefined) ? objc_getClass(className)->isa : objc_getClass(className);
var methods = class_copyMethodList(classObj, count);
var methodsArray = [];
for(var i = 0; i < *count; i++) {
var method = methods[i];
methodsArray.push({selector:method_getName(method), implementation:method_getImplementation(method)});
}
free(methods);
return methodsArray;
}
``
*
* `cy# printMethods("")`
* Prints out all the instance variables
* `cy# a=#0x15d0db80`
* `cy# *a` or
* ```cy# function tryPrintIvars(a){ var x={}; for(i in *a){ try{ x[i] = (*a)[i]; } catch(e){} } return x; }```
* `cy# a=#0x15d0db80`
* `cy# tryPrintIvars(a)`
* Manipulating through property
* `cy# [a pinCode]`
* `cy# [a setPinCode: @"1234"]` or `cy# a.setPinCode= @"1234"`
* Method Swizzling for Instance Method
* `cy# [a isValidPin]`
* `cy# .prototype.isValidPin = function(){return 1;}`
* Method Swizzling for Class Method
* `cy# [Pin isValidPin]`
* `cy# Pin.contructor.prototype.['isValidPin'] = function(){return 1;}`
* [iNalyzer](https://appsec-labs.com/cydia/) - AppSec Labs iNalyzer is a framework for manipulating iOS applications, tampering with parameters and method.
* [Grapefruit](https://github.com/ChiChou/grapefruit) - Runtime Application Instruments for iOS, previously Passionfruit .
* [Introspy-iOS](https://github.com/iSECPartners/Introspy-iOS) - Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security issues.
* [Apple configurator 2](https://itunes.apple.com/app/apple-configurator-2/id1037126344) - A utility which can be used to view live system log on iDevice.
* [keychaindumper](http://cydia.radare.org/) - A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken.
* [BinaryCookieReader](http://securitylearn.net/wp-content/uploads/tools/iOS/BinaryCookieReader.py) - A tool to dump all the cookies from the binary Cookies.binarycookies file.#### Network Analysis and Server Side Testing
* [Mallory](https://intrepidusgroup.com/insight/mallory/) - A Man in The Middle Tool (MiTM) that use to monitor and manipulate traffic on mobile devices and applications.
* [Burp Suite](https://portswigger.net/burp/download.html) - Burp Suite is an integrated platform for performing security testing of applications.
* [OWASP ZAP](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - OWASP Zed Attack Proxy Project is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers.
* [Charles Proxy](http://www.charlesproxy.com) - HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet.#### Bypassing Root Detection and SSL Pinning
* [SSL Kill Switch 2](https://github.com/nabla-c0d3/ssl-kill-switch2) - Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps.
* [iOS TrustMe](https://github.com/intrepidusgroup/trustme) - Disable certificate trust checks on iOS devices.
* [tsProtector](http://cydia.saurik.com/package/kr.typostudio.tsprotector8/) - Another tool for bypassing Jailbreak detection.
* [JailProtect](http://julioverne.github.io/) - Apart from bypassing jailbreak detection, it also allows you to spoof your iOS firmware version easily.
* [Shadow](https://ios.jjolano.me) - Shadow is a tweak to bypass jailbreak detection that defeats basic detection methods used by many App Store apps.
* [Frida CodeShare](https://codeshare.frida.re/) - The Frida CodeShare project is comprised of developers from around the world working together with one goal - push Frida to its limits in new and innovative ways.
* Bypassing SSL Pinning
* `frida --codeshare lichao890427/ios-ssl-bypass -f YOUR_BINARY`
* `frida --codeshare dki/ios10-ssl-bypass -f YOUR_BINARY`#### Security Libraries
* [PublicKey Pinning](https://www.owasp.org/images/9/9a/Pubkey-pin-ios.zip) - iOS pinning is performed through a NSURLConnectionDelegate. The delegate must implement connection:canAuthenticateAgainstProtectionSpace: and connection:didReceiveAuthenticationChallenge:. Within connection:didReceiveAuthenticationChallenge:, the delegate must call SecTrustEvaluate to perform customary X509 checks.
* [Swiftshield](https://github.com/rockbruno/swiftshield) - SwiftShield is a tool that generates irreversible, encrypted names for your iOS project's objects (including your Pods and Storyboards) in order to protect your app from tools that reverse engineer iOS apps, like class-dump and Cycript.
* [IOSSecuritySuite](https://github.com/securing/IOSSecuritySuite) - iOS Security Suite is an advanced and easy-to-use platform security & anti-tampering library written in pure Swift! If you are developing for iOS and you want to protect your app according to the OWASP MASVS standard, chapter v8, then this library could save you a lot of time.
* [OWASP iMAS](https://project-imas.github.com/) - iMAS is a collaborative research project from the MITRE Corporation focused on open source iOS security controls.### Mobile Penetration Testing Lab
* [WaTF Bank](https://github.com/WaTF-Team/WaTF-Bank) - What-a-Terrible-Failure Mobile Banking Application (WaTF-Bank), written in Java, Swift 4, Objective-C and Python (Flask framework) as a backend server, is designed to simulate a "real-world" web services-enabled mobile banking application that contains over 30 vulnerabilities based on OWASP Mobile Top 10 Risks.
* [InsecureBankv2](https://github.com/dineshshetty/Android-InsecureBankv2) - WThis vulnerable Android application is named "InsecureBankv2" and is made for security enthusiasts and developers to learn the Android insecurities by testing this vulnerable application. Its back-end server component is written in python.
* [DVIA-v2](https://github.com/prateek147/DVIA-v2) - Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment.
* [DIVA Android](https://github.com/payatu/diva-android) - DIVA (Damn insecure and vulnerable App) is an App intentionally designed to be insecure.The aim of the App is to teach developers/QA/security professionals, flaws that are generally present in the Apps due poor or insecure coding practices.
* [DVHMA](https://github.com/logicalhacking/DVHMA) - Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. Its purpose is to enable security professionals to test their tools and techniques legally, help developers better understand the common pitfalls in developing hybrid mobile apps securely.
* [MSTG Hacking Playground](https://github.com/OWASP/MSTG-Hacking-Playground) - This is a collection of iOS and Android mobile apps, that are intentionally build insecure. These apps are used as examples to demonstrate different vulnerabilities explained in the the OWASP Mobile Security Testing Guide.
* [UnCrackable Mobile Apps](https://github.com/OWASP/owasp-mstg/tree/master/Crackmes) - UnCrackable Apps for Android and iOS, a collection of mobile reverse engineering challenges. These challenges are used as examples throughout the Mobile Security Testing Guide.
* [OWASP iGoat](https://github.com/OWASP/igoat) - Goat is a learning tool for iOS developers (iPhone, iPad, etc.) and mobile app pentesters. It was inspired by the WebGoat project, and has a similar conceptual flow to it.### Contribution
Your contributions and suggestions are welcome.### License
[![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)](http://creativecommons.org/licenses/by/4.0/)
This work is licensed under a [Creative Commons Attribution 4.0 International License](http://creativecommons.org/licenses/by/4.0/)