Mobile-Security-Framework-MobSF | Mobile Security Framework | Security library
kandi X-RAY | Mobile-Security-Framework-MobSF Summary
kandi X-RAY | Mobile-Security-Framework-MobSF Summary
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, XAPK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing. Made with in India. MobSF is also bundled with Android Tamer, BlackArch and Pentoo.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Generate dynamic analysis
- Configure the proxy
- Install a mobproxy root CA
- Run the adb command
- View a source file
- Create an AndroidManifest xml
- Get the xml manifest
- Find the Java source folder for the given APK
- Set up frida
- Check for updates
- Mobfy an Android instance
- Update Frida server
- Take a screenshot
- Save or update the contents of the app
- Generate the context for a static analysis
- Generate dynamic analysis report
- Main function for windows static analysis
- Performs the API scan
- Setup Xposed tools
- Update trackers database
- Gets the context of the analysis
- View a file
- Returns the mobsp home directory
- Trigger static analysis
- Search for files in a given directory
- Runs the Logcat streaming
Mobile-Security-Framework-MobSF Key Features
Mobile-Security-Framework-MobSF Examples and Code Snippets
# near the end
if 'runserver' in sys.argv:
print('This is my banner')
execute_from_command_line(sys.argv)
# end
Community Discussions
Trending Discussions on Mobile-Security-Framework-MobSF
QUESTION
I have several dex files that needs to be statically analyzed by mobsf after unpacking the apk file because core code are inaccessible prior to unpacking.
What I've tried:
Adding Line 3 and changing line 4 from glob_pattern = app_dir + *.dex'
to glob_pattern = ddex_dir
ANSWER
Answered 2021-Jan-08 at 21:14I would try to use dex2jar tool for this purpose. Convert your apk to jar and then analyze it with MobSF. MobSF should work with jar files since this is an archive. I am not sure if it will show the stable behavior, but it can be an option.
As far as I know MobSF also have this package within it's source code, so did you try to load this APK directly to MobSF without changing anything? I think it might work.
Also you can use JADX tool for manual source code analyzing. It should restore the source code from the DEX binaries.
Also observe this issue. MobSF developer suggests to use enjarify instead of dex2jar (2nd answer) and sends the link which explains how to do it.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install Mobile-Security-Framework-MobSF
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page