Mobile Exploitation

Hack mobile devices (mainly Android)

7 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

Dex2Jar 

Open-source    

Tool for Android ".dex" and Java ".class" files

Drozer 

Open-source    

A mobile app security testing framework

Frida 

Open-source    

Dynamic instrumentation toolkit

Frida "Universal" SSL Unpinner 

Open-source    

Universal unpinner

Genymotion 

Commercial    

Cross-platform Android emulator for developers & QA engineers

Jadx 

Open-source    

Command line and GUI tool for producing Java source code from Android Dex and APK files

MobSF 

Open-source    

Automated mobile app pentesting, malware analysis and security assessment framework with SAST and DAST