Dynamic Analysis
A guide to Mobile Penetration Testing (Dynamic Analysis) including SSL Pinning Bypass, Frida and Objection.
Detect Android Device's Architecture
getprop ro.product.cpu.abiFrida
# with pip install
pip3 install fridadownloader
# or with pipx install
pipx install fridadownloaderpython3 fridaDownloader.py --target server --architecture x86SSL Pinning Bypass
Using Frida Server
Using Frida Gadget in /lib/ folder
/lib/ folderUsing Objection and frida-gadget
frida-gadgetRoot Detection Bypass
Using Frida Scripts
Using Objection
All-in-one Docker container for Android Pentest (by hackermater)
Mobile Android Pentesting Setup
Description
Features
Installation
Examples
Intercept HTTP/HTTPS traffic with Burp Suite
Last updated
