theos-jailed
owasp-mastg
theos-jailed | owasp-mastg | |
---|---|---|
7 | 22 | |
339 | 11,290 | |
- | 0.8% | |
3.6 | 8.3 | |
4 months ago | 3 days ago | |
Shell | Python | |
GNU General Public License v3.0 or later | Creative Commons Attribution Share Alike 4.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
theos-jailed
-
[Tutorial] Fix Apollo with personal API key and FLEX 3
There's tools that can do that for you. Theos-jailed (https://github.com/kabiroberai/theos-jailed), Sideloadly (https://sideloadly.io), and Azule (https://github.com/Al4ise/Azule) are probably the most user-friendly ways to do it.
-
Is it possible to inject an Orion tweak into an ipa and have it work on a jailed device
I’d give Theos-Jailed a try. Seems like some people (at least in the past) got it to work.
-
[Question] Can anyone make a tutorial on how to "compile" a tweak to an ipa?
Here you go: https://github.com/kabiroberai/theos-jailed
- [question] how do I view contents of a decrypted ipa file in windows 11?
-
[Free Release] Azule - Jailed Tweaks made Simple
The 2 widely-used tools for bringing tweaks to jailed devices are kabiroberai's theos jailed and Brandon Plank's iPAPatcher. Both tools, though, have their own issues.
-
[Question] Does anyone know how to import .dylib files as frameworks (for example Rocket.dylib from Rocket for Instagram) using theos jailed, provided that I don’t have the source code and therefore don’t have the .h files?
check out theos-jailed, that’s how tweaked IPAs are usually made.
-
Does Supercharge support importing .dylib files as frameworks?
It does! You can add dylib files from the Libraries section of the editor and supporting files to Resources (after which you may also need to hook the framework’s code to change where it looks for the support files). Following that, you may need to hook the dylib’s methods that fetch resources in order to point them to the right folder. Note that I also have a detailed explanation of how to do something similar in Theos Jailed’s docs: see https://github.com/kabiroberai/theos-jailed/wiki/Usage#injecting-a-cydia-tweak. Good luck :)
owasp-mastg
- More ways to identify independently security tested apps on Google Play
-
Google Play rolls out an "Independent security review" badge for apps
https://mas.owasp.org/ :
> The OWASP Mobile Application Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS) and a comprehensive testing guide (OWASP MASTG) that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases
- Need Help on Patching
- The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
- Mobile game security - how to?
-
Are android bugs mostly api and web ?
Have a look at the OWASP Mobile Application Testing Guide https://github.com/OWASP/owasp-mastg
-
How can we get our Apps validated against OWASP's MASVS and does it shown on the PlayStore?
owasp-mastg
-
How do you check your app for security issues?
Be aware that this kind of tools shouldn't be seen as a substitute for a manual and thorough pentesting of the application. As u/StoryOfDavid suggested decompiling the application (I usually use jadx for this) and using Wireshark to check the network traffic are good ways to start assessing the security of your application. If you want to be thorough I suggest going through the OWASP-MSTG guide (now renamed to MASTG) which provides a categorization of possible security issues, with a description of the problem and actionable ways to statically/dynamically analyze your application.
-
Securing API keys, clientId, clientSecret etc while distributing to App Store? Ways to prevent reverse engineering?
Check out OWASP, they have plenty documentation about threat modeling and attack vectors for mobile apps. Regarding jailbreak detection, see the following: https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06j-Testing-Resiliency-Against-Reverse-Engineering.md
-
Moving from Web application pentesting to mobile.
- OWASP is as usual a good resource: https://owasp.org/www-project-mobile-security-testing-guide/
What are some alternatives?
Azule
H4CKINTO - H4CKINTO - Remote Android Management Suite
MonkeyDev - CaptainHook Tweak、Logos Tweak and Command-line Tool、Patch iOS Apps, Without Jailbreak.
owasp-masvs - The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
Kaitai Struct - Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
grapefruit - (WIP) Runtime Application Instruments for iOS. Previously Passionfruit
Cronet.framework - This package makes it easy to use Chromium's networking stack in your iOS applications
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
Apollo-CustomApiCredentials - Tweak to use your own reddit API credentials in Apollo
hacktricks - Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
howtolinux - A Webpage with tips, tricks and guides for Linux. (with Algolia Search)
audiohq_module - Provide binary and apk for controlling each applications volume using Magisk