Read a plist file, write out any embedded plist files
-
Updated
Dec 27, 2015 - Python
Read a plist file, write out any embedded plist files
Recover the Android swipe lock pattern from a gesture.key file.
Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat
Quickly analyze and reverse engineer Android packages
Mobile security trainings based on android
CapFuzz - capture, fuzz & intercept web traffic.
The Leading Security Assessment Framework for Android.
Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps
This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.
Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static analysis. The map itself is an Android Application Pentesting Methodology component, which assists Pentesters to cover all important areas during an assessment.
A library to use Xposed without root or recovery(or modify system image etc..).
Add a description, image, and links to the mobile-pentest topic page so that developers can more easily learn about it.
To associate your repository with the mobile-pentest topic, visit your repo's landing page and select "manage topics."