MobSF
An automated, all-in-one mobile application security testing framework supporting static and dynamic analysis of Android, iOS, and Windows mobile apps.
Developer
Ajin Abraham / OWASP
description Technical Dossier
Mobile Security Framework (MobSF) is an open-source, automated security testing platform purpose-built for mobile applications. It supports Android (APK, AAB, source), iOS (IPA, source), and Windows (APPX) binaries, providing both static analysis (SAST) and dynamic analysis (DAST) from a single web-based interface. Originally created by security researcher Ajin Abraham and now affiliated with the OWASP project, MobSF has become the most widely used open-source mobile application security tool, with over 17,000 GitHub stars.
The static analysis engine decompiles application binaries, extracts manifests and metadata, and performs automated code review against a comprehensive rule set. For Android, this includes analysis of AndroidManifest.xml permissions, exported components, intent filters, WebView configurations, and Java/Kotlin source code patterns. For iOS, MobSF analyses Info.plist entitlements, App Transport Security settings, and Objective-C/Swift code patterns. Across both platforms, the scanner detects hardcoded credentials, insecure cryptographic implementations, certificate pinning bypasses, insecure data storage, and dangerous API usage.
Dynamic analysis instruments the running application on an emulator or physical device, capturing network traffic (including TLS-intercepted HTTPS), file system activity, log output, and runtime API calls. This reveals behaviours invisible to static analysis — such as data exfiltration, analytics tracking, and server-side communication patterns. Findings are mapped to the OWASP Mobile Top 10 and MASVS (Mobile Application Security Verification Standard) categories, producing structured reports suitable for compliance assessments and penetration test deliverables. The REST API enables full automation, allowing security teams to integrate MobSF into CI/CD pipelines for continuous mobile app security testing.
smartphone Multi-Platform Static Analysis
Decompiles and analyses APK, IPA, APPX, and source archives — reviewing manifest permissions, hardcoded secrets, insecure API calls, and cryptographic weaknesses.
bug_report Dynamic Analysis
Instruments running apps on emulators or devices to capture network traffic, API calls, runtime behaviour, and data leakage in real time.
checklist OWASP Mobile Top 10 Coverage
Maps findings to OWASP Mobile Top 10 and MASVS categories, producing compliance-ready reports for mobile security assessments.
api REST API & CI Integration
Full REST API enables automated scanning in CI/CD pipelines, with JSON and PDF report generation for integration into security workflows.
Distribution Model
Open Source
Free community edition available.
Enterprise support on request.

Platforms
ANDROID, IOS, WINDOWS
Analysis
STATIC + DYNAMIC
API
REST
License
GPL 3.0