objection - Runtime Mobile Exploration

objection - Runtime Mobile Exploration

#Access Control#Specialized Security

Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.

Visit Website

Objection: A Runtime Mobile Exploration Toolkit

Objection is a runtime mobile exploration toolkit, powered by Frida. It is designed to help you evaluate the security posture of your mobile applications without the need for a jailbreak. The toolkit supports both iOS and Android platforms. With Objection, you can: - Inspect and interact with container file systems. - Bypass SSL pinning. - Dump keychains. - Perform memory-related tasks, such as dumping and patching. - Explore and manipulate objects on the heap. - And much, much more... You can find screenshots in the wiki.

Installation Process Made Simple

The installation process is straightforward: just run the command pip3 install objection.

Updating Your Objection Command Installation

You can upgrade an existing installation of Objection by using the command: pip3 install --upgrade objection.

For More Detailed Updates and Installation Instructions

For a more comprehensive update and instructions on installation, please visit the wiki page here. Objection is licensed under the GNU General Public v3 License. Permissions that go beyond the scope of this license may be obtained at http://sensepost.com/contact.