![]() A YAML view of the API specification at /swagger.yaml.A JSON view of the API specification at /swagger.json.These can be activated and deactivated in /patterns ![]() The application has an engine with different rules and patterns that are used though the findings scanning phase to detect vulnerabilities and/or malicious code into the apk. User authentication and user management for Malware Analysis lab setupĪlso See – LAB CIF Forensics Analysis for Mobile Apps Patterns.All scan results can be exported to PDF.The findings can be edited and the false positives can be triaged and deleted.Also highlight the Best Practices in Secure Android Implementation in the APK.All findings are categorized and include Mobile Top 10 Risk.All findings are categorized and follows CWE standards.Analyze all the source code searching for weaknesses.Uses Docker for easy deployment in multiplatform environment.Mpast/mobile_audit 1.0.0 python:3.9.0-buster Main features Mpast/mobile_audit 1.3.0 python:3.9.1-buster Mpast/mobile_audit 1.3.6 python:3.9.2-buster Mpast/mobile_audit 1.3.8 python:3.9.4-buster
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |