AppMon is an automated framework for monitoring and tampering system API calls of native apps on iOS, Mac OS X and Android apps (upcoming). You may call it the GreaseMonkey for native mobile apps. 😉
AppMon is my vision is to make become the Mac OS X/iOS/Android equivalent of the this project apimonitor and GreaseMonkey. This should become a useful tool for the mobile penetration testers to validate the security issues report by a source code scanner and by inspecting the APIs in runtime and monitoring the app’s overall activity and focus on things that seem suspicious. You can also use pre-defined user-scripts to modify the app’s functionality/logic in the runtime e.g. spoofing the DeviceID, spoofing the GPS co-ordinates, faking In-App purchases, bypassing TouchID etc.
+ Disk I/O (R/W)
+ Network (HTTP GET, POST etc.)
+ Crypto (HMAC, Hash function, block ciphers, X.509 certs etc.)
+ Database (e.g. SQLite)
+ UserDefaults (SharedPreferences equiv.) & more.
latest change 24/5/2016: script:Logging Hooks
sudo -H pip install argparse frida flask termcolor dataset
git clone https://github.com/dpnishant/appmon && cd appmon