House Logo

House

0
Free
Visit Website

House is a runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python. It is designed for helping assess mobile applications by implementing dynamic function hooking and intercepting and intended to make Frida script writing as simple as possible. TL;DR ```git clone https://github.com/nccgroup/house cd house pip3 install -r requirements.txt pip3 install pipenv pipenv --python=/usr/bin/python3 install pipenv --python=/usr/bin/python3 shell python3 app.py <PORT> # or: mkvirtualenv --python=/usr/local/bin/python3 house workon house pip install -r requirements.txt python app.py <PORT> # or: (only for Mac OS) git clone https://github.com/nccgroup/house cd house pip3 install -r requirements.txt pip3 install pipenv pipenv --python=/usr/local/bin/python3 install pipenv --python=/usr/local/bin/python3 shell python3 app.py <PORT> By default, House binds to http://127.0.0.1:8000. To get an overview of House capabilities, you can visit user's manual for details.

FEATURES

ALTERNATIVES

An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the Certificate Transparency Log (CTL) via the CertStream API.

Verify scripts and executables to mitigate chain of supply attacks.

Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.

A next-generation file integrity monitoring and change detection system

Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.

An Outlook add-in for reporting suspicious emails to security teams and tracking user behavior during awareness campaigns.