A runtime mobile exploration toolkit powered by Frida for security assessment of iOS and Android apps without jailbreak.
Objection is a runtime mobile exploration toolkit powered by Frida that enables security assessment of iOS and Android applications. It allows security researchers to dynamically analyze, manipulate, and test mobile apps for vulnerabilities without needing a jailbroken or rooted device. The toolkit provides features like SSL pinning bypass, keychain dumping, memory exploration, and file system inspection.
Mobile security researchers, penetration testers, and application security professionals who need to assess the security of iOS and Android applications through dynamic runtime analysis.
Objection offers a comprehensive, easy-to-use toolkit for runtime mobile exploration that works without device modification, leveraging Frida's powerful instrumentation capabilities to provide deep insight into application behavior and security flaws.
📱 objection - runtime mobile exploration
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Works seamlessly with both iOS and Android apps, enabling security assessments across ecosystems without separate tools, as highlighted in the README's key features.
Built-in functionality to circumvent SSL pinning, allowing tools like Burp Suite to intercept encrypted traffic, which is crucial for mobile app penetration testing.
Enables dumping of sensitive data from iOS keychains during runtime, a vital feature for uncovering stored credentials and secrets in security audits.
Supports memory dumping, patching, and heap manipulation for dynamic analysis, providing deep insights into app behavior without device modification.
Simple pip-based installation with a single command, making setup straightforward for security professionals, as noted in the README's installation section.
Heavily relies on Frida for instrumentation, which can be unstable, require additional setup, or be blocked in secured environments, limiting portability.
Lacks a graphical user interface, making it less accessible for users who prefer visual tools and requiring familiarity with terminal commands for all operations.
Primarily designed for runtime exploration, so it lacks built-in static analysis features, necessitating complementary tools for comprehensive security assessments.
Requires prior knowledge of mobile security concepts and Frida scripting for advanced use, which can be daunting for newcomers despite the easy installation.