MARA is a Mobile Application Reverse engineering and Analysis Framework that combines commonly used tools for testing mobile applications against OWASP mobile security threats. It supports features like APK reverse engineering, disassembling Dalvik bytecode, decompiling APK to Java source code, APK deobfuscation, APK analysis, and more. Developed and maintained by @xtian_kisutsa and @iamckn, MARA is in its early stages of development with ongoing updates based on the roadmap.
FEATURES
SIMILAR TOOLS
Phish Report is inaccessible without JavaScript and cookies enabled.
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.
A tool for extracting static and dynamic features from Android APKs.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
Extract local data storage of an Android application in one click.
Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.