flare-fakenet-ng
Mobile-Security-Framework-MobSF
flare-fakenet-ng | Mobile-Security-Framework-MobSF | |
---|---|---|
2 | 6 | |
1,700 | 16,325 | |
1.8% | 0.9% | |
4.1 | 8.6 | |
8 days ago | 18 days ago | |
Python | JavaScript | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
flare-fakenet-ng
-
Ask HN: What is your home networking setup?
* INetSim [1]
Reverse engineering, and malware analysis skills will transfer to this task directly.
[0]: https://github.com/mandiant/flare-fakenet-ng
-
DYNAMIC MALWARE ANALYSIS WITH INTERNET
Hi, what you are looking for is Fakenet or the newer, separate version fakenet-ng https://github.com/fireeye/flare-fakenet-ng
Mobile-Security-Framework-MobSF
-
Hacking & Gaming :)
the program is from github too lmao https://github.com/MobSF/Mobile-Security-Framework-MobSF ðŸ˜
-
Can anyone recommend a good tool to pentest mobile apps?, I have the packages locally. Thanks
I can say only for android: - General Scanner -> https://github.com/MobSF/Mobile-Security-Framework-MobSF - Decompiler -> https://github.com/skylot/jadx
-
iOS pentest help
You want to useMobSF to disable Certificate Pinning and install your Burp CA. Then, set up a network to be able to MitM the traffic.
-
Strengthen your Android or iOS Application Security using MobSF - Learn by example (2021)
# This will download MobSF into a folder # called Mobile-Security-Framework-MobSF git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git
-
Tools and Skills to be the Bug Bounty Hunting.
MobiSRF:Mobile Appliation testing)Mobile Security System (MobSF) is an integrated, all-in-one mobile device pen-testing, malware analysis, and vulnerability evaluation system capable of conducting static and dynamic analysis (Android/iOS/Windows). MobSF accepts mobile app binaries (APK, XAPK, IPA, and APPX) as well as zipped source code and offers REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.You may use the Dynamic Analyzer to conduct runtime security assessments and immersive instrumented monitoring.
-
Weekly Developer Roundup #21 - Sun Nov 08 2020
MobSF/Mobile-Security-Framework-MobSF (Python): Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
What are some alternatives?
flare-vm - A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
RMS-Runtime-Mobile-Security - Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
flare-ida - IDA Pro utilities from FLARE team
OpenCorePkg - OpenCore bootloader
theZoo - A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
PEpper - An open source script to perform malware static analysis on Portable Executable
refinery - High Octane Triage Analysis
apkleaks - Scanning APK file for URIs, endpoints & secrets.
flare-floss - FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Deep Java Library (DJL) - An Engine-Agnostic Deep Learning Framework in Java
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
MobileApp-Pentest-Cheatsheet - The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.