Quantcast
Channel: Android Tools – Security List Network™
Viewing all articles
Browse latest Browse all 98

Appmon v0.1 – Runtime Security Testing Framework for iOS, Mac OS X and Android Apps.

$
0
0

Changelog appmon v0.1:
+ ipa_installer; Bug fixes
+ Usage Guide: AppMon Android Tracer
+ All code bug fixes.

appmon v0.1

appmon v0.1

AppMon is an automated framework for monitoring and tampering system API calls of native apps on iOS, Mac OS X and Android apps (upcoming). You may call it the GreaseMonkey for native mobile apps. 😉
AppMon is my vision is to make become the Mac OS X/iOS/Android equivalent of the this project apimonitor and GreaseMonkey. This should become a useful tool for the mobile penetration testers to validate the security issues report by a source code scanner and by inspecting the APIs in runtime and monitoring the app’s overall activity and focus on things that seem suspicious. You can also use pre-defined user-scripts to modify the app’s functionality/logic in the runtime e.g. spoofing the DeviceID, spoofing the GPS co-ordinates, faking In-App purchases, bypassing TouchID etc.

appmon

appmon

API’S Categories:
+ Disk I/O (R/W)
+ Network (HTTP GET, POST etc.)
+ Crypto (HMAC, Hash function, block ciphers, X.509 certs etc.)
+ XML/JSON
+ KeyChain
+ Database (e.g. SQLite)
+ WebView
+ UserDefaults (SharedPreferences equiv.) & more.

appintruder

appintruder

latest change 24/5/2016: script:Logging Hooks

Usage:

sudo -H pip install argparse frida flask termcolor dataset
git clone https://github.com/dpnishant/appmon && cd appmon
python appmon.py

cd intruder
python intruder.py

Download: appmon.zip  | appmon.tar.gz
Source: https://github.com/dpnishant


Viewing all articles
Browse latest Browse all 98

Trending Articles