Table of Contents
Loading contents...
README.md
📱objection - Runtime Mobile Exploration
objection
is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak.
- Supports both iOS and Android.
- Inspect and interact with container file systems.
- Bypass SSL pinning.
- Dump keychains.
- Perform memory related tasks, such as dumping & patching.
- Explore and manipulate objects on the heap.
- And much, much more…
Screenshots are available in the wiki.
installation
Installation is simply a matter of pip3 install objection
. This will give you the objection
command. You can update an existing objection
installation with pip3 install --upgrade objection
.
For more detailed update and installation instructions, please refer to the wiki page here.
license
objection
is licensed under a GNU General Public v3 License. Permissions beyond the scope of this license may be available at http://sensepost.com/contact/.
Tool Information
Author
sensepost
Project Added On
May 29, 2025
License
Open Source
Tags
Related Tools
Deobfuscate-android-app
LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.
StableSnapdroid
Android Snapshot and recording tool
Stableapk-components-inspector
A lightweight Python-based tool to extract and enumerate exported Android components (activities, services, receivers, providers), parse real intent extras from Smali code, and automatically generate practical ADB commands for pentesting.
Stable