For anyone else who enjoys #MobSF for dynamic mobile #MalwareAnalysis but gets tired of running shell scripts, I finally broke down and wrote this little systemd unit file today. I'm slightly embarrassed to say it took longer than it probably should have to get right, but I failed repetitively so you don't have to. You'll probably need to modify the user and paths to align with your existing deployment, but you get the picture.
[Unit]
Description=MobSF Dynamic Service
After=network.target
[Service]
User=$USER
WorkingDirectory=~/Mobile-Security-Framework-MobSF
ExecStart=~/Mobile-Security-Framework-MobSF/venv/bin/gunicorn -b localhost:8000 mobsf.MobSF.wsgi:application --workers=1 --threads=10 --timeout=3600
Restart=always
[Install]
WantedBy=multi-user.target
MobSF
Mobile Security Framework (#MobSF) è un'applicazione completa e automatizzata (#Android/#iOS/#Windows) per svolgere attività di penetration test, #malware analysis e valutazione di sicurezza delle #APP mobile. Il sistema, #opensource, può eseguire analisi statiche e dinamiche e supporta i binari come (#APK, #XAPK, #IPA e #APPX) assieme al codice sorgente e fornisce API REST per una integrazione e automatizzazione all'interno della tua pipeline CI/CD o #DevSecOps.
https://www.redhotcyber.com/post/programmi-hacker-mobsf
#MobSF #XAPK #devsecops #android #malware #app #opensource #apk #ipa #appx
Look what data is shared across YesBank, TenCent, Xiaomi.
Full #MobSF report https://pdfhost.io/v/6MK1oLU4y_MobSF_Static_Analysis_Report_ShareIT.pdf