MobSF

An automated, all-in-one mobile application security testing framework supporting static and dynamic analysis of Android, iOS, and Windows mobile apps.

Developer

Ajin Abraham / OWASP

verified_user
Visit Official Site open_in_new

description Technical Dossier

Mobile Security Framework (MobSF) is an open-source, automated security testing platform purpose-built for mobile applications. It supports Android (APK, AAB, source), iOS (IPA, source), and Windows (APPX) binaries, providing both static analysis (SAST) and dynamic analysis (DAST) from a single web-based interface. Originally created by security researcher Ajin Abraham and now affiliated with the OWASP project, MobSF has become the most widely used open-source mobile application security tool, with over 17,000 GitHub stars.

The static analysis engine decompiles application binaries, extracts manifests and metadata, and performs automated code review against a comprehensive rule set. For Android, this includes analysis of AndroidManifest.xml permissions, exported components, intent filters, WebView configurations, and Java/Kotlin source code patterns. For iOS, MobSF analyses Info.plist entitlements, App Transport Security settings, and Objective-C/Swift code patterns. Across both platforms, the scanner detects hardcoded credentials, insecure cryptographic implementations, certificate pinning bypasses, insecure data storage, and dangerous API usage.

Dynamic analysis instruments the running application on an emulator or physical device, capturing network traffic (including TLS-intercepted HTTPS), file system activity, log output, and runtime API calls. This reveals behaviours invisible to static analysis — such as data exfiltration, analytics tracking, and server-side communication patterns. Findings are mapped to the OWASP Mobile Top 10 and MASVS (Mobile Application Security Verification Standard) categories, producing structured reports suitable for compliance assessments and penetration test deliverables. The REST API enables full automation, allowing security teams to integrate MobSF into CI/CD pipelines for continuous mobile app security testing.

smartphone Multi-Platform Static Analysis

Decompiles and analyses APK, IPA, APPX, and source archives — reviewing manifest permissions, hardcoded secrets, insecure API calls, and cryptographic weaknesses.

bug_report Dynamic Analysis

Instruments running apps on emulators or devices to capture network traffic, API calls, runtime behaviour, and data leakage in real time.

checklist OWASP Mobile Top 10 Coverage

Maps findings to OWASP Mobile Top 10 and MASVS categories, producing compliance-ready reports for mobile security assessments.

api REST API & CI Integration

Full REST API enables automated scanning in CI/CD pipelines, with JSON and PDF report generation for integration into security workflows.

Distribution Model

Open Source

Free community edition available.
Enterprise support on request.

trending_up Popularity

Low 72 / 100 High

settings_suggest Deployment Complexity

Low 25 / 100 High

engineering Technical Difficulty

Low 35 / 100 High
MobSF visualization
radar

Platforms

ANDROID, IOS, WINDOWS

Analysis

STATIC + DYNAMIC

API

REST

License

GPL 3.0