Retrieve detailed device information, including device name, model, iOS version, UDID, serial number, etc.
List all the installed application on device with basic metadata, select any app to explore detailed information like Info.plist, files, storage(keychain,NSUserDefaults, etc), Classes, etc.
Extract Decrypted IPA files from installed applications for further analysis and reverse engineering (powered by frida-ios-dump).
A simple rule-based scanner powered by frida to scan any installed application on the device to identify vulnerabilities and misconfigurations.
Get started with MobXplore in just a few simple steps
Follow these steps to run mobxplore on your system:
python3 -m venv mobxplore_venv
source mobxplore_venv/bin/activate
git clone https://github.com/enciphers-team/mobXplore
cd mobXplore
pip3 install -r requirements.txt
streamlit run main.py
Now you can access the application at http://localhost:8501
Note: This method works on Linux and MacOS only, if you are on windows use a linux VM with access to USB port.
You can connect your device in the following ways:
Just connect you device via any of the USB cable that your device supports, ideally the cable used for charging should always work.
ssh -L 27042:localhost:27042 root@<mobile_IP> -o ServerAliveInterval=60