# MobileHackersWeapons **Repository Path**: delete_user/MobileHackersWeapons ## Basic Information - **Project Name**: MobileHackersWeapons - **Description**: Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-01-24 - **Last Updated**: 2021-10-20 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README



A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting ## Family project [![WebHackersWeapons](https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons)](https://github.com/hahwul/WebHackersWeapons) [![MobileHackersWeapons](https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons)](https://github.com/hahwul/MobileHackersWeapons) ## Table of Contents - [Weapons](#weapons) - [Contribute](/CONTRIBUTING.md) - [Thanks to contributor](#thanks-to-contributor) ## Weapons | OS | Type | Name | Description | Popularity | Language | | ---------- | :---------- | :---------- | :----------: | :----------: | :----------: | | All | Analysis | [RMS-Runtime-Mobile-Security](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) | Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime | ![](https://img.shields.io/github/stars/m0bilesecurity/RMS-Runtime-Mobile-Security) | ![](https://img.shields.io/github/languages/top/m0bilesecurity/RMS-Runtime-Mobile-Security) | | All | Analysis | [scrounger](https://github.com/nettitude/scrounger) | Mobile application testing toolkit | ![](https://img.shields.io/github/stars/nettitude/scrounger) | ![](https://img.shields.io/github/languages/top/nettitude/scrounger) | | All | Proxy | [BurpSuite](https://portswigger.net/burp) | The BurpSuite|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) | All | Proxy | [hetty](https://github.com/dstotijn/hetty) | Hetty is an HTTP toolkit for security research. | ![](https://img.shields.io/github/stars/dstotijn/hetty) | ![](https://img.shields.io/github/languages/top/dstotijn/hetty) | | All | Proxy | [httptoolkit](https://github.com/httptoolkit/httptoolkit) | HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac | ![](https://img.shields.io/github/stars/httptoolkit/httptoolkit) | ![](https://img.shields.io/github/languages/top/httptoolkit/httptoolkit) | | All | Proxy | [proxify](https://github.com/projectdiscovery/proxify) | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. | ![](https://img.shields.io/github/stars/projectdiscovery/proxify) | ![](https://img.shields.io/github/languages/top/projectdiscovery/proxify) | | All | Proxy | [zaproxy](https://github.com/zaproxy/zaproxy) | The OWASP ZAP core project | ![](https://img.shields.io/github/stars/zaproxy/zaproxy) | ![](https://img.shields.io/github/languages/top/zaproxy/zaproxy) | | All | RE | [frida](https://github.com/frida/frida) | Clone this repo to build Frida | ![](https://img.shields.io/github/stars/frida/frida) | ![](https://img.shields.io/github/languages/top/frida/frida) | | All | RE | [frida-tools](https://github.com/frida/frida-tools) | Frida CLI tools | ![](https://img.shields.io/github/stars/frida/frida-tools) | ![](https://img.shields.io/github/languages/top/frida/frida-tools) | | All | RE | [fridump](https://github.com/Nightbringer21/fridump) | A universal memory dumper using Frida | ![](https://img.shields.io/github/stars/Nightbringer21/fridump) | ![](https://img.shields.io/github/languages/top/Nightbringer21/fridump) | | All | RE | [ghidra](https://github.com/NationalSecurityAgency/ghidra) | Ghidra is a software reverse engineering (SRE) framework | ![](https://img.shields.io/github/stars/NationalSecurityAgency/ghidra) | ![](https://img.shields.io/github/languages/top/NationalSecurityAgency/ghidra) | | All | SCRIPTS | [frida-scripts](https://github.com/0xdea/frida-scripts) | A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps. | ![](https://img.shields.io/github/stars/0xdea/frida-scripts) | ![](https://img.shields.io/github/languages/top/0xdea/frida-scripts) | | All | Scanner | [Mobile-Security-Framework-MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) | Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. | ![](https://img.shields.io/github/stars/MobSF/Mobile-Security-Framework-MobSF) | ![](https://img.shields.io/github/languages/top/MobSF/Mobile-Security-Framework-MobSF) | | All | Scanner | [StaCoAn](https://github.com/vincentcox/StaCoAn) | StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. | ![](https://img.shields.io/github/stars/vincentcox/StaCoAn) | ![](https://img.shields.io/github/languages/top/vincentcox/StaCoAn) | | Android | Analysis | [apkleaks](https://github.com/dwisiswant0/apkleaks) | Scanning APK file for URIs, endpoints & secrets. | ![](https://img.shields.io/github/stars/dwisiswant0/apkleaks) | ![](https://img.shields.io/github/languages/top/dwisiswant0/apkleaks) | | Android | Analysis | [drozer](https://github.com/FSecureLABS/drozer) | The Leading Security Assessment Framework for Android. | ![](https://img.shields.io/github/stars/FSecureLABS/drozer) | ![](https://img.shields.io/github/languages/top/FSecureLABS/drozer) | | Android | NFC | [nfcgate](https://github.com/nfcgate/nfcgate) | An NFC research toolkit application for Android | ![](https://img.shields.io/github/stars/nfcgate/nfcgate) | ![](https://img.shields.io/github/languages/top/nfcgate/nfcgate) | | Android | Pentest | [Kali NetHunter](https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project) | Mobile Penetration Testing Platform|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) | Android | RE | [Apktool](https://github.com/iBotPeaches/Apktool) | A tool for reverse engineering Android apk files | ![](https://img.shields.io/github/stars/iBotPeaches/Apktool) | ![](https://img.shields.io/github/languages/top/iBotPeaches/Apktool) | | Android | RE | [Smali-CFGs](https://github.com/EugenioDelfa/Smali-CFGs) | Smali Control Flow Graph's | ![](https://img.shields.io/github/stars/EugenioDelfa/Smali-CFGs) | ![](https://img.shields.io/github/languages/top/EugenioDelfa/Smali-CFGs) | | Android | RE | [apkx](https://github.com/b-mueller/apkx) | One-Step APK Decompilation With Multiple Backends | ![](https://img.shields.io/github/stars/b-mueller/apkx) | ![](https://img.shields.io/github/languages/top/b-mueller/apkx) | | Android | RE | [bytecode-viewer](https://github.com/Konloch/bytecode-viewer/) | A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More) | ![](https://img.shields.io/github/stars/Konloch/bytecode-viewer/) | ![](https://img.shields.io/github/languages/top/Konloch/bytecode-viewer/) | | Android | RE | [dex-oracle](https://github.com/CalebFenton/dex-oracle) | A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis | ![](https://img.shields.io/github/stars/CalebFenton/dex-oracle) | ![](https://img.shields.io/github/languages/top/CalebFenton/dex-oracle) | | Android | RE | [dex2jar](https://github.com/pxb1988/dex2jar) | Tools to work with android .dex and java .class files | ![](https://img.shields.io/github/stars/pxb1988/dex2jar) | ![](https://img.shields.io/github/languages/top/pxb1988/dex2jar) | | Android | RE | [enjarify](https://github.com/Storyyeller/enjarify) | Enjarify is a tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications. | ![](https://img.shields.io/github/stars/Storyyeller/enjarify) | ![](https://img.shields.io/github/languages/top/Storyyeller/enjarify) | | Android | RE | [jadx](https://github.com/skylot/jadx) | Dex to Java decompiler | ![](https://img.shields.io/github/stars/skylot/jadx) | ![](https://img.shields.io/github/languages/top/skylot/jadx) | | Android | RE | [jd-gui](https://github.com/java-decompiler/jd-gui) | A standalone Java Decompiler GUI | ![](https://img.shields.io/github/stars/java-decompiler/jd-gui) | ![](https://img.shields.io/github/languages/top/java-decompiler/jd-gui) | | Android | RE | [procyon](https://github.com/mstrobel/procyon) | Procyon is a suite of Java metaprogramming tools, including a rich reflection API, a LINQ-inspired expression tree API for runtime code generation, and a Java decompiler. | ![](https://img.shields.io/github/stars/mstrobel/procyon) | ![](https://img.shields.io/github/languages/top/mstrobel/procyon) | | Android | Scanner | [qark](https://github.com/linkedin/qark) | Tool to look for several security related Android application vulnerabilities | ![](https://img.shields.io/github/stars/linkedin/qark) | ![](https://img.shields.io/github/languages/top/linkedin/qark) | | iOS | Analysis | [iFunBox](http://www.i-funbox.com/) | General file management software for iPhone and other Apple products|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray)|![](https://img.shields.io/static/v1?label=&message=it's%20not%20github&color=gray) | iOS | Analysis | [idb](https://github.com/dmayer/idb) | idb is a tool to simplify some common tasks for iOS pentesting and research | ![](https://img.shields.io/github/stars/dmayer/idb) | ![](https://img.shields.io/github/languages/top/dmayer/idb) | | iOS | Analysis | [needle](https://github.com/FSecureLABS/needle) | The iOS Security Testing Framework | ![](https://img.shields.io/github/stars/FSecureLABS/needle) | ![](https://img.shields.io/github/languages/top/FSecureLABS/needle) | | iOS | Analysis | [objection](https://github.com/sensepost/objection) | 📱 objection - runtime mobile exploration | ![](https://img.shields.io/github/stars/sensepost/objection) | ![](https://img.shields.io/github/languages/top/sensepost/objection) | | iOS | Bluetooth | [toothpicker](https://github.com/seemoo-lab/toothpicker) | ToothPicker is an in-process, coverage-guided fuzzer for iOS. for iOS Bluetooth | ![](https://img.shields.io/github/stars/seemoo-lab/toothpicker) | ![](https://img.shields.io/github/languages/top/seemoo-lab/toothpicker) | | iOS | Inject | [bfinject](https://github.com/BishopFox/bfinject) | Dylib injection for iOS 11.0 - 11.1.2 with LiberiOS and Electra jailbreaks | ![](https://img.shields.io/github/stars/BishopFox/bfinject) | ![](https://img.shields.io/github/languages/top/BishopFox/bfinject) | | iOS | RE | [Clutch](https://github.com/KJCracks/Clutch) | Fast iOS executable dumper | ![](https://img.shields.io/github/stars/KJCracks/Clutch) | ![](https://img.shields.io/github/languages/top/KJCracks/Clutch) | | iOS | RE | [class-dump](https://github.com/nygard/class-dump) | Generate Objective-C headers from Mach-O files. | ![](https://img.shields.io/github/stars/nygard/class-dump) | ![](https://img.shields.io/github/languages/top/nygard/class-dump) | | iOS | RE | [frida-ios-dump](https://github.com/AloneMonkey/frida-ios-dump) | pull decrypted ipa from jailbreak device | ![](https://img.shields.io/github/stars/AloneMonkey/frida-ios-dump) | ![](https://img.shields.io/github/languages/top/AloneMonkey/frida-ios-dump) | | iOS | RE | [iRET](https://github.com/S3Jensen/iRET) | iOS Reverse Engineering Toolkit. | ![](https://img.shields.io/github/stars/S3Jensen/iRET) | ![](https://img.shields.io/github/languages/top/S3Jensen/iRET) | | iOS | RE | [momdec](https://github.com/atomicbird/momdec) | Core Data Managed Object Model Decompiler | ![](https://img.shields.io/github/stars/atomicbird/momdec) | ![](https://img.shields.io/github/languages/top/atomicbird/momdec) | | iOS | Unpinning | [MEDUZA](https://github.com/kov4l3nko/MEDUZA) | A more or less universal SSL unpinning tool for iOS | ![](https://img.shields.io/github/stars/kov4l3nko/MEDUZA) | ![](https://img.shields.io/github/languages/top/kov4l3nko/MEDUZA) | | iOS | Unpinning | [ssl-kill-switch2](https://github.com/nabla-c0d3/ssl-kill-switch2) | Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps | ![](https://img.shields.io/github/stars/nabla-c0d3/ssl-kill-switch2) | ![](https://img.shields.io/github/languages/top/nabla-c0d3/ssl-kill-switch2) | ## Thanks to (Contributor) I would like to thank everyone who helped with this project 👍😎 ![](/CONTRIBUTORS.svg)