Open-Source Alternatives to Cellebrite UFED
Cellebrite UFED is a commercial mobile forensics platform for extracting data from smartphones. These open-source tools provide mobile device forensics, app analysis, and spyware detection.
MVT
Python12.3k stars3d agoMVT (Mobile Verification Toolkit) is Amnesty International's forensic tool for detecting traces of commercial spyware like Pegasus, Predator, and other surveillance malware on iOS and Android devices. It gained worldwide attention through the Pegasus Project investigation and has since become the standard tool for journalists, activists, and human rights organizations to verify if their devices have been compromised. MVT analyzes iOS backups and filesystem dumps for known indicators of compromise (IOCs) published by Amnesty's Security Lab, checking SMS messages, browser history, installed profiles, process lists, and application data. For Android, it examines APK installations, SMS messages, and downloads for known malicious artifacts. The tool outputs timeline-based reports showing exactly when compromise indicators appeared. With over 12,000 GitHub stars, MVT represents a critical capability for civil society to detect state-sponsored surveillance.
MobSF
Python20.8k stars8d agoMobSF (Mobile Security Framework) is an automated framework for performing static and dynamic analysis on Android, iOS, and Windows mobile applications. It can decompile apps, analyze code for vulnerabilities, and perform runtime analysis to detect potential security issues. MobSF supports both binary and source code analysis, providing comprehensive security insights through detailed reports. The framework is widely used for mobile application security testing, offering a robust toolset for identifying and mitigating security risks.
Frida
C20.3k stars3d agoFrida is a dynamic instrumentation toolkit that allows developers and security researchers to inject scripts into native applications for real-time analysis. It supports multiple platforms, including Windows, macOS, Linux, iOS, and Android, enabling deep inspection and manipulation of running processes. Frida is notable for its ease of integration and powerful scripting capabilities, which facilitate tasks like function hooking and API monitoring. It is widely used for reverse engineering and security testing applications.
Objection
Python9.0k stars4d agoObjection is a runtime mobile exploration toolkit that leverages Frida to perform security assessments on iOS and Android devices without requiring a jailbreak. It allows testers to inspect and modify application behavior, explore file systems, and manipulate memory. Objection simplifies the process of dynamic analysis by providing a user-friendly interface to Frida's capabilities, making it accessible for security research on mobile applications. Its non-invasive nature makes it ideal for conducting security tests on live apps.
APKLeaks
Python6.0k stars7mo agoAPKLeaks is a Python tool for scanning Android APK files to extract URLs, API endpoints, and hardcoded secrets from decompiled source code. It uses JADX for decompilation and applies a comprehensive set of regex patterns to identify API keys, OAuth tokens, AWS credentials, Firebase URLs, database connection strings, and other sensitive data that developers accidentally leave in production builds. APKLeaks is particularly useful during mobile app security assessments where you need a quick initial triage of what backend services an app communicates with and whether any credentials are exposed. The tool outputs findings in JSON format and supports custom regex pattern files for organization-specific secret formats. With over 6,000 GitHub stars, APKLeaks has become a standard first step in Android application security testing, often used alongside MobSF for comprehensive static analysis.
JADX
Java48.1k stars2d agoJADX is a DEX to Java decompiler that produces readable Java source code from Android APK and DEX files. It is particularly useful for reverse engineering Android applications, allowing security researchers and developers to analyze app behavior by converting compiled code back into a human-readable form. The tool supports both command-line and GUI interfaces, making it versatile for diverse use cases. Its ability to handle large applications efficiently makes it a popular choice in the mobile security domain.
Androguard
Python6.0k stars3mo agoAndroguard is a reverse engineering framework for Android applications, enabling DEX/APK analysis, decompilation, and malware detection. The Python-based tool allows researchers to dissect Android app components and identify security vulnerabilities or malicious code. Androguard supports static and dynamic analysis, making it a versatile solution for cybersecurity professionals engaged in mobile app security assessment. Its ability to handle complex APK structures is widely recognized in the industry.