Changelog appmon v0.1:
+ ipa_installer; Bug fixes
+ Usage Guide: AppMon Android Tracer
+ All code bug fixes.

appmon v0.1
AppMon is an automated framework for monitoring and tampering system API calls of native apps on iOS, Mac OS X and Android apps (upcoming). You may call it the GreaseMonkey for native mobile apps.
AppMon is my vision is to make become the Mac OS X/iOS/Android equivalent of the this project apimonitor and GreaseMonkey. This should become a useful tool for the mobile penetration testers to validate the security issues report by a source code scanner and by inspecting the APIs in runtime and monitoring the app’s overall activity and focus on things that seem suspicious. You can also use pre-defined user-scripts to modify the app’s functionality/logic in the runtime e.g. spoofing the DeviceID, spoofing the GPS co-ordinates, faking In-App purchases, bypassing TouchID etc.
API’S Categories:
+ Disk I/O (R/W)
+ Network (HTTP GET, POST etc.)
+ Crypto (HMAC, Hash function, block ciphers, X.509 certs etc.)
+ XML/JSON
+ KeyChain
+ Database (e.g. SQLite)
+ WebView
+ UserDefaults (SharedPreferences equiv.) & more.
latest change 24/5/2016: script:Logging Hooks
Usage:
sudo -H pip install argparse frida flask termcolor dataset git clone https://github.com/dpnishant/appmon && cd appmon python appmon.py cd intruder python intruder.py
Download: appmon.zip | appmon.tar.gz
Source: https://github.com/dpnishant