MobSF: Mobile application security analysis framework
Automated pen-testing for Android, iOS, and Windows applications.
Learn more about Mobile-Security-Framework-MobSF
Mobile Security Framework is a security research platform written in Python that analyzes mobile applications across multiple platforms. It combines static analysis capabilities for APK, IPA, APPX binaries and source code with dynamic analysis through instrumented testing environments for Android and iOS. The framework integrates with CI/CD pipelines via REST APIs and command-line tools, allowing security checks to be embedded in development workflows. Common applications include penetration testing, malware analysis, privacy assessment, and compliance validation of mobile applications.
Multi-Platform Analysis
Analyzes Android, iOS, and Windows mobile applications through a single framework. Eliminates the need to maintain separate security tools for each platform, reducing operational complexity for security teams.
Dual Analysis Approach
Combines static binary and source code analysis with dynamic runtime instrumentation and network traffic capture. Identifies both code-level vulnerabilities and behavioral security issues that manifest only during execution.
DevSecOps Integration
Integrates with CI/CD pipelines for automated mobile app security scanning. REST API enables triggering scans from Jenkins, GitLab CI, or GitHub Actions, embedding security testing into the development workflow automatically.
import requests
api_url = "http://localhost:8000/api/v1/scan"
api_key = "your_api_key_here"
with open("app.apk", "rb") as apk_file:
files = {"file": apk_file}
headers = {"Authorization": api_key}
response = requests.post(api_url, files=files, headers=headers)
scan_hash = response.json()["hash"]
print(f"Scan initiated: {scan_hash}")Maintenance release adding Python 3.13 support, updating dependencies (mitmproxy, httptools, apkid), and patching vulnerable packages in Docker images.
- –Upgrade to Python 3.13 if needed; xmlsec and lxml are no longer pinned, allowing flexible dependency resolution.
- –Review Docker deployments for patched vulnerabilities; Android permission list and detection signatures have been refreshed.
Breaking: Corellium iOS devices now require Frida server ≥17; patches four critical vulnerabilities (zip bomb DoS, XSS, arbitrary file write, path traversal).
- –Upgrade Frida server to version 17 or later on Corellium iOS devices before dynamic analysis.
- –Patch mitigates zip bomb DoS, stored XSS via SVG icons, AR-Slip file write, and path traversal in downloads.
Patches critical vulnerabilities: REST API key leak enabling privilege escalation, stored XSS in iOS dynamic analysis, and partial DoS from regex checks.
- –Rotate REST API keys immediately if exposed in web UI; attackers could escalate privileges locally.
- –Review iOS dynamic analysis workflows for XSS via bundle IDs and verify SSRF protections in Firebase/asset link checks.
See how people are using Mobile-Security-Framework-MobSF
Top in Security
Related Repositories
Discover similar tools and frameworks used by developers
semgrep
Pattern-based code scanner for 30+ languages.
ghidra
NSA's open-source tool for analyzing compiled binaries.
sigma
YAML-based detection rules with SIEM query conversion.
fingerprintjs
Client-side JavaScript library for browser fingerprinting and visitor identification.
httpx
Fast HTTP probing with response metadata extraction.