apk-mitm
APK inspection tool
Automates the process of preparing Android APK files to inspect HTTPS traffic
🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection
4k stars
45 watching
353 forks
Language: TypeScript
last commit: 7 months ago androidapkapktoolcertificate-pinningcliman-in-the-middlemitmreverse-engineering
Related projects:
Repository | Description | Stars |
---|---|---|
| An Android application analysis tool with dynamic API hooks and Xposed module capabilities | 2,827 |
| A tool that enables reverse engineering of Android app binaries to modify and debug them | 20,516 |
| Allows bypassing of SSL certificate validation in Android apps to intercept traffic | 792 |
| Analyzes Android APKs to extract metadata and information about the app's behavior | 41 |
| An application that performs static analysis and malware detection on Android APKs to identify security vulnerabilities. | 206 |
| An app update tool that aggregates updates from multiple sources and simplifies the process of finding and installing new apps. | 3,003 |
| Bypasses SSL certificate pinning to allow intercepting encrypted traffic from many applications on Android devices. | 710 |
| A collection of tools and resources for conducting security assessments and penetration testing on mobile applications. | 4,609 |
| An Android security suite for in-depth reconnaissance and static bytecode analysis of APKs. | 537 |
| An Android-specific toolkit for analyzing and understanding APK files | 118 |
| An extension for a Java-based proxy that intercepts HTTPS connections and enables caching while offline. | 225 |
| An interactive HTTP proxy that can intercept and inspect HTTP/1, HTTP/2, and WebSocket traffic for testing and debugging purposes. | 37,148 |
| A tool to automatically scan Android applications for common security vulnerabilities and generate exploit APKs. | 3,210 |
| Automates scanning and hardening of Android devices to detect malware and protect user privacy. | 202 |
| Protects Android Shared Preferences with encryption techniques | 71 |