RMS : Runtime Mobile Security

RMS (Runtime Mobile Security) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts and many other useful stuff.

General Info

Runtime Mobile Security (RMS) is currently supporting Android devices only.

It has been tested on MacOS and with the following devices:

  • AVD emulator
  • Genymotion emulator
  • Amazon Fire Stick 4K

It should also work well on Windows and Linux but some minor adjustments may be needed.

Do not connect more than one device at the same time. RMS is not so smart at the moment.

Prerequisites

FRIDA server up and running on the target device

Refer to the official FRIDA guide for the installation: https://frida.re/docs/android/

Known Issues

  • Sometime RMS fails to load complex methods. Use a filter when this happens or feel free to improve the algo (default.js).
  • Code is not optimized

Improvements

  • iOS support
  • Feel free to send me your best JS sript via a Pull request. I’ll be happy to bundle all the best as default scripts in the next RMS release. e.g.
    • root detection bypass
    • ssl pinning bypass
    • reflection detection
    • etc…

Also Read – Project iKy v2.5.0 – Tool That Collects Information From An Email

Installation

(optional) Create a python virtual environment
pip3 install -r requirements.txt
python3 mobilesecurity.py

Usage

  • Run your favorite app by simply inserting its package name

NOTE : RMS attachs a persistence process called com.android.systemui to get the list of all the classes that are already loaded in memory before the launch of the target app. If you have an issue with it, try to find a different package that works well on your device. You can set another default package via the Config Tab or by simply editing the config.json file.

  • Check which Classes and Methods have been loaded in memory
  • Hook on the fly Classes/Methods and trace their args and return values
  • Search instances of a specific class on the Heap and call its methods [BETA]
  • Select a Class and generate on the fly an Hook template for all its methods
  • Easily detect new classes that have been loaded in memory
  • Inject your favorite FRIDA CUSTOM SCRIPTS on the fly

Just add your .js files inside the custom_script folder and they will be automatically loaded by the web interface ready to be executed.

Credits

Special thanks to the following Open Source projects for the inspiration:

DEMO Apps:

RootBeer Sample is the DEMO app used to show how RMS works. RootBeer is an amazing root detection library. I decided to use the Sample app as DEMO just to show that, as every client-side only check, its root detection logic can be easily bypassed if not combined with a server-side validation.

Anti-Frida Frida Detection Examples by Bernhard Mueller.

R K

Recent Posts

Burrow – Breaking Through Firewalls With Open Source Ingenuity

Burrow is an open source tool for burrowing through firewalls, built by teenagers at Hack Club.…

7 hours ago

Its-A-Trap : Building Secure Web Applications With A Golang Web Server For Authentication

Simple golang webserver that listens for basic auth or post requests and sends a notification…

8 hours ago

Nutek-Apple : Unleashing Power On macOS And Linux

Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and…

8 hours ago

SecureSphere Labs – A Haven For Cybersecurity Innovators And Ethical Hackers

Welcome to SecureSphere Labs, your go-to destination for a curated collection of powerful hacking tools…

8 hours ago

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained…

8 hours ago

LiCo-Extrator : Revolutionizing Icon Extraction Across Platforms

Got it! Below is the updated README.md file with instructions for downloading the project on…

1 day ago