Navigate:
All ReposMobile-Security-Framework-MobSF
~$MOBILE0.1%

MobSF: Mobile application security analysis framework

Automated pen-testing for Android, iOS, and Windows applications.

LIVE RANKINGS • 06:50 AM • STEADY
TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100TOP 100
OVERALL
#96
49
SECURITY
#9
4
30 DAY RANKING TREND
ovr#96
·Secur#9
STARS
20.1K
FORKS
3.6K
DOWNLOADS
7D STARS
+27
7D FORKS
+5
See Repo:
Share:

Learn more about Mobile-Security-Framework-MobSF

Mobile Security Framework is a security research platform written in Python that analyzes mobile applications across multiple platforms. It combines static analysis capabilities for APK, IPA, APPX binaries and source code with dynamic analysis through instrumented testing environments for Android and iOS. The framework integrates with CI/CD pipelines via REST APIs and command-line tools, allowing security checks to be embedded in development workflows. Common applications include penetration testing, malware analysis, privacy assessment, and compliance validation of mobile applications.


1

Multi-Platform Analysis

Analyzes Android, iOS, and Windows mobile applications through a single framework. Eliminates the need to maintain separate security tools for each platform, reducing operational complexity for security teams.

2

Dual Analysis Approach

Combines static binary and source code analysis with dynamic runtime instrumentation and network traffic capture. Identifies both code-level vulnerabilities and behavioral security issues that manifest only during execution.

3

DevSecOps Integration

Integrates with CI/CD pipelines for automated mobile app security scanning. REST API enables triggering scans from Jenkins, GitLab CI, or GitHub Actions, embedding security testing into the development workflow automatically.


import requests

api_url = "http://localhost:8000/api/v1/scan"
api_key = "your_api_key_here"

with open("app.apk", "rb") as apk_file:
    files = {"file": apk_file}
    headers = {"Authorization": api_key}
    response = requests.post(api_url, files=files, headers=headers)
    
scan_hash = response.json()["hash"]
print(f"Scan initiated: {scan_hash}")


vv4.4.2

Maintenance release adding Python 3.13 support, updating dependencies (mitmproxy, httptools, apkid), and patching vulnerable packages in Docker images.

  • Upgrade to Python 3.13 if needed; xmlsec and lxml are no longer pinned, allowing flexible dependency resolution.
  • Review Docker deployments for patched vulnerabilities; Android permission list and detection signatures have been refreshed.
vv4.4.1

Breaking: Corellium iOS devices now require Frida server ≥17; patches four critical vulnerabilities (zip bomb DoS, XSS, arbitrary file write, path traversal).

  • Upgrade Frida server to version 17 or later on Corellium iOS devices before dynamic analysis.
  • Patch mitigates zip bomb DoS, stored XSS via SVG icons, AR-Slip file write, and path traversal in downloads.
vv4.3.2

Patches critical vulnerabilities: REST API key leak enabling privilege escalation, stored XSS in iOS dynamic analysis, and partial DoS from regex checks.

  • Rotate REST API keys immediately if exposed in web UI; attackers could escalate privileges locally.
  • Review iOS dynamic analysis workflows for XSS via bundle IDs and verify SSRF protections in Firebase/asset link checks.

See how people are using Mobile-Security-Framework-MobSF

Loading tweets...


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers