Discover and explore top open-source AI tools and projects—updated daily.
ChiChouRuntime instrumentation and security analysis for mobile apps
Top 31.2% on SourcePulse
Grapefruit is an open-source mobile security testing suite designed for runtime instrumentation of iOS and Android applications. It empowers security researchers and developers to inspect, hook, and modify mobile apps through a user-friendly web interface, offering deep insights into application behavior.
How It Works
Leveraging the power of Frida, Grapefruit acts as a dynamic instrumentation toolkit. It allows users to intercept native and managed functions, monitor cryptographic operations, browse filesystems, inspect SQLite databases, and stream logs in real-time. Its architecture enables granular control and visibility into application processes without requiring source code access or recompilation, facilitating efficient security analysis and debugging.
Quick Start & Requirements
npm install -g igf or run directly using npx igf. Prebuilt binaries are available on GitHub Releases.bunx.Highlighted Details
Maintenance & Community
No specific community links (e.g., Discord, Slack) or notable contributors/sponsorships are detailed in the provided README.
Licensing & Compatibility
The project is licensed under the MIT license, which is permissive for commercial use and integration into closed-source projects.
Limitations & Caveats
Grapefruit explicitly does not include built-in bypasses for common anti-tampering protections such as Frida detection, SSL/TLS certificate pinning, or jailbreak/root detection. For remote access or multi-user scenarios, Grapefruit must be secured behind a reverse proxy (e.g., Caddy) with authentication, as it binds to 127.0.0.1 by default and lacks built-in authentication mechanisms.
1 week ago
Inactive