Introduction: Mobile Security Framework is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static analysis, dynamic analysis, malware analysis and web API testing.
More: Author   ReportBugs   OfficialWebsite   

Version: v1.1 beta

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing framework capable of performing static, dynamic and malware analysis. It can be used for effective and fast security analysis of Android, iOS and Windows mobile applications and support both binaries (APK, IPA & APPX ) and zipped source code. MobSF can do dynamic application testing at runtime for Android apps and has Web API fuzzing capabilities powered by CapFuzz, a Web API specific security scanner. MobSF is designed to make your CI/CD or DevSecOps pipeline integration seamless.

Made with Love in India

python platform License Codacy Badge Quality Gate Status Build Status Requirements Status ToolsWatch Best Security Tools 2017 ToolsWatch Best Security Tools 2016 Blackhat Arsenal Asia 2018 Blackhat Arsenal Asia 2015

MobSF is also bundled with Android Tamer and BlackArch

Buy us a Coffee!

Your generous donations will keep us motivated.

Paypal: Donate via Paypal

Bitcoin: Donate Bitcoin


MobSF Static Analyzer Docker Image

Automated prebuilt docker image of MobSF Static Analyzer is available from DockerHub

docker pull opensecurity/mobile-security-framework-mobsf
docker run -it -p 8000:8000 opensecurity/mobile-security-framework-mobsf:latest

Other docker options: MobSF Docker Options



Video Course

What's New?

Contribution, Feature Requests & Bugs


Static Analysis - Android APK

android-static-analysis-apk android-static-analysis-apk2

Static Analysis - iOS IPA


Static Analysis - Windows APPX


Dynamic Analysis - Android APK

android-dynamic-analysis android-dynamic-report android-dynamic-report2 android-dynamic-expact

Web API Fuzzer

capfuzz capfuzz-scan


  • Abhinav Sejpal (@Abhinav_Sejpal) - For poking me with bugs, feature requests, and UI & UX suggestions.
  • Amrutha VC (@amruthavc) - For the new MobSF logo
  • Anant Srivastava (@anantshri) - For Activity Tester Idea
  • Anto Joseph (@antojosep007) - For the help with SuperSU.
  • Bharadwaj Machiraju (@tunnelshade_) - For writing pyWebProxy from scratch
  • Dominik Schlecht - For the awesome work on adding Windows Phone App Static Analysis to MobSF
  • Esteban - Better Android Manifest Analysis and Static Analysis Improvement.
  • Matan Dobrushin - For adding Android ARM Emulator support to MobSF - Special thanks goes for cuckoo-droid, I got inspired by their code and idea for this implementation.
  • MindMac - For writing Android Blue Pill
  • Rahul (@c0dist) - Kali Support
  • Shuxin - Android Binary Analysis
  • Thomas Abraham - For JS Hacks on UI.
  • Tim Brown (@timb_machine) - For the iOS Binary Analysis Ruleset.
  • Oscar Alfonso Diaz - (@OscarAkaElvis) - For Dockerfile contributions
  • Abhinav Saxena - (@xandfury) - For Travis CI and Logging integration
About Me
Google+: Trinea trinea
GitHub: Trinea