As pentesters, we all know that there are a lot of commands, scripts, and tools that we use during Android and iOS penetration testing, it can be tedious to navigate from the OS to the Android shell, pull and push files, and perform our tests via CLI beside of getting easy output of static and dynamic analysis of iOS apps.
This is exactly why we built the AppUse dashboard! It will allow you work faster, be more effective, get higher quality results and save precious time!
The AppUse dashboard will allow you to perform complex actions on your testing device/emulator via single-click, the following is only a partial list:
protocol/port (even binary protocols!) Configure proxy for any
Pull APK from the device
Edit application files
Launch emulator/auto detect your testing device directly into the AppUse dashboard interface
Easily send broadcast messages and
start activities and services
Perform runtime manipulation
Easily broadcast receivers,
and services detection
Launch any tool you need for your
penetration testing using the Tools section.
Convert APK to debug mode
View APK Manifest
The video demonstrates the differences between ‘regular’ users and AppUse users – you can do the math for yourself
The AppUse features were developed based on the experience we at AppSec Labs acquired through performing daily application penetration tests. In addition, feature requests are very welcome, simply email us your ideas and suggestions: email@example.com
Current Features List:
(Regularly updated for new features and bug fixes)
Real devices fully supported
Dynamic proxy managed via the Dashboard
New application-reversing features
Updated Reframeworker pro