MARA Framework Logo

MARA Framework

0
Free
Updated 11 March 2025
Visit Website

MARA is a Mobile Application Reverse engineering and Analysis Framework that combines commonly used tools for testing mobile applications against OWASP mobile security threats. It supports features like APK reverse engineering, disassembling Dalvik bytecode, decompiling APK to Java source code, APK deobfuscation, APK analysis, and more. Developed and maintained by @xtian_kisutsa and @iamckn, MARA is in its early stages of development with ongoing updates based on the roadmap.

FEATURES

SIMILAR TOOLS

Runtime Mobile Security (RMS) is a powerful web interface powered by FRIDA for manipulating Android and iOS Apps at Runtime.

A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.

A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.

MiniCPS is a framework for real-time Cyber-Physical Systems simulation that supports physical process and control device simulation along with network emulation capabilities.

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

An Outlook add-in for reporting suspicious emails to security teams and tracking user behavior during awareness campaigns.

A cross-platform software library for interacting with iOS devices without jailbreaking.

Steghide is a steganography program for hiding data in image and audio files.

A distributed systems simulator that creates vulnerable Kubernetes clusters in AWS for security training and vulnerability mitigation practice.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved