A web interface powered by FRIDA for runtime manipulation, analysis, and security testing of Android and iOS applications.
Runtime Mobile Security (RMS) is a dynamic analysis and security testing platform for mobile applications. It provides a web interface to manipulate Android and iOS apps at runtime using the FRIDA framework, allowing users to dump classes, hook methods, trace execution, and inject custom scripts without modifying the original app.
Mobile security researchers, penetration testers, and reverse engineers who need to analyze, debug, or assess the security of Android and iOS applications in real-time.
RMS simplifies runtime manipulation by offering an intuitive web interface that consolidates advanced FRIDA capabilities, making dynamic analysis more accessible and efficient compared to manual scripting or command-line tools.
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Provides a centralized browser-based GUI for FRIDA operations, lowering the barrier to runtime manipulation as emphasized in the project's philosophy, making advanced features like hooking and tracing accessible without command-line expertise.
Supports both Android and iOS devices, tested on emulators like AVD and Genymotion and real hardware such as iPhone 7, enabling versatile mobile security analysis across ecosystems.
Allows on-the-fly class dumping, method hooking, and argument tracing without decompiling or rebuilding apps, demonstrated in demos for bypassing protections like root detection.
Bundles custom FRIDA scripts from community sources for common tasks like SSL pinning bypass and root detection evasion, saving time and effort in script development.
RMS cannot detect or handle multiple connected devices simultaneously, as noted in the known issues, limiting scalability for parallel testing scenarios.
Requires Google Chrome for full functionality due to socket issues on Safari, and the code is not optimized, with failures in loading complex methods requiring manual filters or fixes.
Heavily relies on FRIDA server setup on target devices, which can be tricky for beginners or in restricted environments, and RMS must be started after the server, adding setup overhead.