MobSF

    MobSF/Mobile-Security-Framework-MobSF

    Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

    security
    android-security
    api-testing
    apk
    cwe
    devsecops
    dynamic-analysis
    ios-security
    malware-analysis
    mastg
    masvs
    mobile-security
    mobsf
    mstg
    owasp
    rest
    runtime-security
    static-analysis
    web-security
    windows-mobile-security
    JavaScript
    GPL-3.0
    20.3K stars
    3.6K forks
    20.3K watching
    Updated 2/27/2026
    View on GitHub
    Backblaze Advertisement

    Loading star history...

    Health Score

    25.55

    Weekly Growth

    +0

    +0.0% this week

    Contributors

    1

    Total contributors

    Open Issues

    18

    Generated Insights

    About Mobile-Security-Framework-MobSF

    Mobile Security Framework (MobSF)

    Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. MobSF can be used for a variety of use cases such as mobile application security, penetration testing, malware analysis, and privacy analysis. The Static Analyzer supports popular mobile app binaries like APK, IPA, APPX and source code. Meanwhile, the Dynamic Analyzer supports both Android and iOS applications and offers a platform for interactive instrumented testing, runtime data and network traffic analysis. MobSF seamlessly integrates with your DevSecOps or CI/CD pipeline, facilitated by REST APIs and CLI tools, enhancing your security workflow with ease.

    Made with Love in India

    Docker Pulls python PyPI version platform License MobSF tests Quality Gate Status GitHub closed issues CII Best Practices

    ToolsWatch Best Security Tools 2016 ToolsWatch Best Security Tools 2017 Blackhat Arsenal Asia 2015 Blackhat Arsenal Asia 2018 Blackhat Arsenal Europe 2023

    MobSF is also bundled with Android Tamer, BlackArch and Pentoo.

    Support MobSF

    Donate to MobSF

    Has MobSF made a difference for you? Show your support and help us innovate with a donation. It's easy to build open source, maintaining one is a different story.

    Long live open source!

    Documentation

    Quick setup with docker

    docker pull opensecurity/mobile-security-framework-mobsf:latest
    docker run -it --rm -p 8000:8000 opensecurity/mobile-security-framework-mobsf:latest
    
    # Default username and password: mobsf/mobsf
    

    See MobSF Documentation

    Collaborators

    Ajin Abraham india | Magaofei china | Matan Dobrushin israel | Vincent Nadal france

    e-Learning Courses & Certifications

    MobSF Course Automated Mobile Application Security Assessment with MobSF -MAS

    Android Security Tools Course Android Security Tools Expert -ATX

    MobSF Support

    • Free Support: Free limited support, questions, help and discussions, join our Slack channel Join_MobSF_Slack
    • Enterprise Support: Priority feature requests, live support & onsite training, see MobSF Support Packages

    Contribution, Feature Requests & Bugs

    • Read CONTRIBUTING.md before opening bugs, feature requests and pull request.
    • For Project updates and announcements, follow @ajinabraham or @OpenSecurity_IN.
    • Github Issues are only for tracking bugs and feature requests. Do not post support or help queries there. We have a slack channel for that.

    Static Analysis - Android

    mobsf_android_static_analysis

    Static Analysis - iOS

    mobsf_ios_ipa_static_analysis

    Dynamic Analysis - Android APK

    mobsf_android_dynamic_analysis

    Web API Viewer

    mobsf_web_api_fuzzing_with_burp

    Dynamic Analysis - iOS IPA

    mobsf_ios_dynamic_analysis

    Past Collaborators

    Honorable Contributors & Shoutouts

    • Amrutha VC - For the new MobSF logo
    • Dominik Schlecht - For the awesome work on adding Windows Phone App Static Analysis to MobSF
    • Esteban - Better Android Manifest Analysis and Static Analysis Improvement.
    • Matan Dobrushin - For adding Android ARM Emulator support to MobSF - Special thanks goes for cuckoo-droid
    • Shuxin - Android Binary Analysis
    • Abhinav Saxena - (@xandfury) - For Travis CI and Logging integration
    • netguru Netguru (@karolpiateknet, @mtbrzeski) - For iOS Swift support, Rule contributions and SAST refactoring.
    • Maxime Fawe - (@Arenash13) - For Matching Strategy implementation of SAST pattern matching algorithms.
    • Abhinav Sejpal (@Abhinav_Sejpal) - For poking me with bugs, feature requests, and UI & UX suggestions
    • Anant Srivastava (@anantshri) - For Activity Tester Idea
    • Anto Joseph (@antojoseph) - For the help with SuperSU
    • Bharadwaj Machiraju (@tunnelshade) - For writing pyWebProxy from scratch
    • Rahul (@c0dist) - Kali Support
    • MindMac - For writing Android Blue Pill
    • Oscar Alfonso Diaz - (@OscarAkaElvis) - For Dockerfile contributions
    • Thomas Abraham - For JS Hacks on UI
    • Tim Brown (@timb_machine) - For the iOS Binary Analysis Ruleset
    • Shanil Prasad (@Rajuraju14) - For improving iOS ATS Analysis
    • Jovan Petrovic (@JovanPetrovic) - For sponsoring a server to host mobsf.live

    Discover Repositories

    Search across tracked repositories by name or description