{"id":10482,"date":"2020-05-05T13:11:43","date_gmt":"2020-05-05T07:41:43","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10482"},"modified":"2020-05-05T13:11:43","modified_gmt":"2020-05-05T07:41:43","slug":"rms","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/rms\/","title":{"rendered":"RMS : Runtime Mobile Security"},"content":{"rendered":"\n<p><strong>RMS (Runtime Mobile Security)<\/strong> is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts and many other useful stuff.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>General Info<\/strong><\/p>\n\n\n\n<p>Runtime Mobile Security (RMS) is currently supporting Android devices only.<\/p>\n\n\n\n<p>It has been tested on MacOS and with the following devices:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AVD emulator<\/li><li>Genymotion emulator<\/li><li>Amazon Fire Stick 4K<\/li><\/ul>\n\n\n\n<p>It should also work well on Windows and Linux but some minor adjustments may be needed.<\/p>\n\n\n\n<p>Do not connect more than one device at the same time. RMS is not so smart at the moment.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Prerequisites<\/strong><\/p>\n\n\n\n<p>FRIDA server up and running on the target device<\/p>\n\n\n\n<p>Refer to the official FRIDA guide for the installation: <a href=\"https:\/\/frida.re\/docs\/android\/\">https:\/\/frida.re\/docs\/android\/<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Known Issues<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sometime RMS fails to load complex methods. Use a filter when this happens or feel free to improve the algo (default.js).<\/li><li>Code is not optimized<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Improvements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>iOS support<\/li><li>Feel free to send me your best JS sript via a Pull request. I&#8217;ll be happy to bundle all the best as default scripts in the next RMS release. e.g.<ul><li>root detection bypass<\/li><li>ssl pinning bypass<\/li><li>reflection detection<\/li><li>etc&#8230;<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/project-iky-v2-5-0-tool-that-collects-information-from-an-email\/\" target=\"_blank\" rel=\"noreferrer noopener\">Project iKy v2.5.0 \u2013 Tool That Collects Information From An Email<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>(optional)<\/strong> Create a python virtual environment<br>pip3 install -r requirements.txt<br>python3 mobilesecurity.py<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Run your favorite app by simply inserting its package name<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-background has-luminous-vivid-amber-background-color\"><strong>NOTE<\/strong> : RMS attachs a persistence process called <strong>com.android.systemui<\/strong> to get the list of all the classes that are already loaded in memory before the launch of the target app. If you have an issue with it, try to find a different package that works well on your device. You can set another default package via the Config Tab or by simply editing the config.json file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_1_Device.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Check which Classes and Methods have been loaded in memory<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_2_Dump.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Hook on the fly Classes\/Methods and trace their args and return values<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_3_Massive_Hook.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Search instances of a specific class on the Heap and call its methods [BETA]<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_4_Heap_Search.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Select a Class and generate on the fly an Hook template for all its methods<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_5_Hook_Hack.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Easily detect new classes that have been loaded in memory<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_6_Diff_Classes.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Inject your favorite FRIDA CUSTOM SCRIPTS on the fly<\/strong><\/li><\/ul>\n\n\n\n<p>Just add your .js files inside the custom_script folder and they will be automatically loaded by the web interface ready to be executed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\/master\/DEMO\/GIF\/DEMO_7_Custom_Script.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Credits<\/strong><\/p>\n\n\n\n<p>Special thanks to the following Open Source projects for the inspiration:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/github.com\/frida\/frida\">FRIDA<\/a><\/li><li><a href=\"https:\/\/github.com\/sensepost\/objection\">Objection<\/a><\/li><li><a href=\"https:\/\/github.com\/nccgroup\/house\">House<\/a><\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>DEMO Apps:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.scottyab.rootbeer.sample\">RootBeer Sample<\/a> is the DEMO app used to show how RMS works. <a href=\"https:\/\/github.com\/scottyab\/rootbeer\">RootBeer<\/a> is an <strong>amazing root detection library<\/strong>. I decided to use the Sample app as DEMO just to show that, as every client-side only check, its root detection logic can be easily bypassed if not combined with a server-side validation.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/b-mueller\/frida-detection-demo\">Anti-Frida<\/a> Frida Detection Examples by Bernhard Mueller.<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/m0bilesecurity\/RMS-Runtime-Mobile-Security\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts and many other useful stuff. General Info Runtime Mobile [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16280,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","fifu_image_alt":"RMS : Runtime Mobile Security","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[156,1722,2103,2866,2906],"class_list":["post-10482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-android","tag-java","tag-mobile-security","tag-rms","tag-runtime-mobile-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RMS : Runtime Mobile Security 2020!Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/rms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RMS : Runtime Mobile Security 2020!Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/rms\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-05T07:41:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"RMS : Runtime Mobile Security\",\"datePublished\":\"2020-05-05T07:41:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/\"},\"wordCount\":494,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png\",\"keywords\":[\"android\",\"Java\",\"Mobile Security\",\"RMS\",\"Runtime Mobile Security\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/rms\/\",\"name\":\"RMS : Runtime Mobile Security 2020!Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png\",\"datePublished\":\"2020-05-05T07:41:43+00:00\",\"description\":\"RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/rms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RMS : Runtime Mobile Security 2020!Kalilinuxtutorials","description":"RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/rms\/","og_locale":"en_US","og_type":"article","og_title":"RMS : Runtime Mobile Security 2020!Kalilinuxtutorials","og_description":"RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime.","og_url":"https:\/\/kalilinuxtutorials.com\/rms\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-05T07:41:43+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/rms\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/rms\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"RMS : Runtime Mobile Security","datePublished":"2020-05-05T07:41:43+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/rms\/"},"wordCount":494,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","keywords":["android","Java","Mobile Security","RMS","Runtime Mobile Security"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/rms\/","url":"https:\/\/kalilinuxtutorials.com\/rms\/","name":"RMS : Runtime Mobile Security 2020!Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","datePublished":"2020-05-05T07:41:43+00:00","description":"RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/rms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/rms\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-LuuErajzvig\/Xq7Zz2eKPUI\/AAAAAAAAGJQ\/gVTsAc1ePzkY07HHCAB5GUfXmMdoxOqygCLcBGAsYHQ\/s1600\/RMS%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33001,"url":"https:\/\/kalilinuxtutorials.com\/mobilehackersweapons\/","url_meta":{"origin":10482,"position":0},"title":"MobileHackersWeapons &#8211; The Arsenal Of Mobile Hackers","author":"Varshini","date":"May 10, 2024","format":false,"excerpt":"A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting. The clandestine tools and techniques of mobile hackers are laid bare. In this curated collection, delve into the arsenal utilized by modern-day hackers in their quest for digital exploration and exploitation. From runtime manipulation to code\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11749,"url":"https:\/\/kalilinuxtutorials.com\/awesome-android-security\/","url_meta":{"origin":10482,"position":1},"title":"Awesome Android Security","author":"R K","date":"November 4, 2020","format":false,"excerpt":"A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG - Android application penetration testing guideTikTok: three persistent arbitrary code executions and one theft of arbitrary filesPersistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913Android: Access\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5742,"url":"https:\/\/kalilinuxtutorials.com\/objection-mobile-exploration\/","url_meta":{"origin":10482,"position":2},"title":"Objection : Runtime Mobile Exploration","author":"R K","date":"July 15, 2019","format":false,"excerpt":"Objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. Note: This is not some form of jailbreak \/ root bypass. By using objection, you\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36367,"url":"https:\/\/kalilinuxtutorials.com\/ssl-bypass\/","url_meta":{"origin":10482,"position":3},"title":"SSL Bypass : Utilizing The Universal Android Security Bypass Suite For Penetration Testing","author":"Varshini","date":"February 12, 2025","format":false,"excerpt":"SSL bypass refers to techniques used to circumvent SSL\/TLS pinning mechanisms in mobile applications, allowing security researchers or attackers to intercept and analyze encrypted traffic. SSL pinning ensures that an application only communicates with trusted servers by embedding specific certificates within the app. However, bypassing this security measure is often\u2026","rel":"","context":"In &quot;Android Security&quot;","block_context":{"text":"Android Security","link":"https:\/\/kalilinuxtutorials.com\/category\/android-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SSL-Bypass.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SSL-Bypass.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SSL-Bypass.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SSL-Bypass.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SSL-Bypass.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SSL-Bypass.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10497,"url":"https:\/\/kalilinuxtutorials.com\/intercept\/","url_meta":{"origin":10482,"position":4},"title":"Intercept : Policy As Code Static Analysis Auditing","author":"R K","date":"May 7, 2020","format":false,"excerpt":"Intercept stupidly easy to use, small footprint Policy as Code subsecond command-line scanner that leverages the power of the fastest multi-line search tool to scan your codebase. It can be used as a linter, guard rail control or simple data collector and inspector. Consider it a cross-platform weaponized ripgrep. Features\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":29804,"url":"https:\/\/kalilinuxtutorials.com\/blutter\/","url_meta":{"origin":10482,"position":5},"title":"B(l)utter","author":"Varshini","date":"January 23, 2025","format":false,"excerpt":"Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime. Currently, the application supports only Android libapp.so. Also, the application currently works only against recent Dart versions. Environment Setup This application uses the C++20 Formatting Library. It requires a very recent C++ compiler, such as g++ >=13 or Clang\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgV8VZVT29EFI9wiDwRXrPQt0gxJLa0plKeMqxprtsdEiBNMGG10C0kv21_sxCjP11PQTHXYxt0qkEiYKs2gtKer-4SJXMG31C7j7yf5-7ru8nJcpyiUwA_JXIxN9HIOAKnJ-M_nTMbsufbWW1qgM6WtPz7o2kcmEq_mljNajsd-_wIKDtoQYqxaMCnFSgv\/s16000\/blutter-741x415-9f6a8e049a.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgV8VZVT29EFI9wiDwRXrPQt0gxJLa0plKeMqxprtsdEiBNMGG10C0kv21_sxCjP11PQTHXYxt0qkEiYKs2gtKer-4SJXMG31C7j7yf5-7ru8nJcpyiUwA_JXIxN9HIOAKnJ-M_nTMbsufbWW1qgM6WtPz7o2kcmEq_mljNajsd-_wIKDtoQYqxaMCnFSgv\/s16000\/blutter-741x415-9f6a8e049a.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgV8VZVT29EFI9wiDwRXrPQt0gxJLa0plKeMqxprtsdEiBNMGG10C0kv21_sxCjP11PQTHXYxt0qkEiYKs2gtKer-4SJXMG31C7j7yf5-7ru8nJcpyiUwA_JXIxN9HIOAKnJ-M_nTMbsufbWW1qgM6WtPz7o2kcmEq_mljNajsd-_wIKDtoQYqxaMCnFSgv\/s16000\/blutter-741x415-9f6a8e049a.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgV8VZVT29EFI9wiDwRXrPQt0gxJLa0plKeMqxprtsdEiBNMGG10C0kv21_sxCjP11PQTHXYxt0qkEiYKs2gtKer-4SJXMG31C7j7yf5-7ru8nJcpyiUwA_JXIxN9HIOAKnJ-M_nTMbsufbWW1qgM6WtPz7o2kcmEq_mljNajsd-_wIKDtoQYqxaMCnFSgv\/s16000\/blutter-741x415-9f6a8e049a.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10482"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16280"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}