Metadata-Version: 2.4
Name: objection
Version: 1.12.3
Summary: Instrumented Mobile Pentest Framework
Author-email: Leon Jacobs <leon@sensepost.com>
License-Expression: GPL-3.0-or-later
Project-URL: Homepage, https://github.com/sensepost/objection
Project-URL: Repository, https://github.com/sensepost/objection
Project-URL: Bug Tracker, https://github.com/sensepost/objection/issues
Keywords: mobile,instrumentation,pentest,frida,hook
Classifier: Natural Language :: English
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3 :: Only
Classifier: Programming Language :: JavaScript
Requires-Python: >=3.10
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: click>=8.2.0
Requires-Dist: delegator-py>=0.1.1
Requires-Dist: flask>=3.0.0
Requires-Dist: frida>=16.0.0
Requires-Dist: frida-tools>=10.0.0
Requires-Dist: litecli>=1.3.0
Requires-Dist: packaging>=23.0
Requires-Dist: prompt-toolkit<4.0.0,>=3.0.30
Requires-Dist: pygments>=2.0.0
Requires-Dist: requests>=2.32.0
Requires-Dist: semver>=2
Requires-Dist: setuptools>=70.0.0
Requires-Dist: tabulate>=0.9.0
Dynamic: license-file

# 📱objection - Runtime Mobile Exploration

`objection` is a runtime mobile exploration toolkit, powered by [Frida](https://www.frida.re/), built to help you assess the security posture of your mobile applications, without needing a jailbreak.

[![Twitter](https://img.shields.io/badge/twitter-%40leonjza-blue.svg)](https://twitter.com/leonjza)
[![PyPi](https://badge.fury.io/py/objection.svg)](https://pypi.python.org/pypi/objection)
[![Black Hat Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2017.svg?sanitize=true)](https://www.blackhat.com/eu-17/arsenal-overview.html)
[![Black Hat Arsenal](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2019.svg?sanitize=true)](https://www.blackhat.com/us-19/arsenal-overview.html)

<img align="right" src="./images/objection.png" height="220" alt="objection">

- Supports both iOS and Android.
- Inspect and interact with container file systems.
- Bypass SSL pinning.
- Dump keychains.
- Perform memory related tasks, such as dumping & patching.
- Explore and manipulate objects on the heap.
- And much, much [more](https://github.com/sensepost/objection/wiki/Features)...

Screenshots are available in the [wiki](https://github.com/sensepost/objection/wiki/Screenshots).

## installation

Installation is simply a matter of `pip3 install objection`. This will give you the `objection` command. You can update an existing `objection` installation with `pip3 install --upgrade objection`.

For more detailed update and installation instructions, please refer to the wiki page [here](https://github.com/sensepost/objection/wiki/Installation).

## license

`objection` is licensed under a [GNU General Public v3 License](https://www.gnu.org/licenses/gpl-3.0.en.html). Permissions beyond the scope of this license may be available at [http://sensepost.com/contact/](http://sensepost.com/contact/).
