Skip to content
/ morf Public

Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information within mobile applications.

License

Notifications You must be signed in to change notification settings

amrudesh1/morf

Repository files navigation

MORF

MORF Logo

Mobile Reconnaissance Framework

A powerful offensive security toolkit for mobile application analysis

License Last Commit Language BlackHat Arsenal

Find Secrets. Protect Apps. Stay Secure.

πŸ“‹ Table of Contents

πŸ’‘ Overview

MORF is an advanced mobile security analysis tool that automatically discovers sensitive information within Android and iOS applications. Designed for security professionals, penetration testers, and developers, MORF provides comprehensive insights into mobile app security posture.

MORF Demo

πŸš€ Quick Start

MORF can be up and running in seconds using Docker or the included run script:

# Clone the repository and enter directory
git clone https://github.com/amrudesh1/morf && cd morf

# Option 1: Using the run script (recommended)
chmod +x run.sh && ./run.sh

# Option 2: Using Docker Compose
docker-compose up --build

Then simply visit http://localhost in your browser and upload an APK or IPA file to begin analysis!


πŸ” Key Features

MORF offers comprehensive security analysis capabilities for mobile applications:

Feature Description
πŸ” Secret & API Key Detection Automatically discovers hardcoded credentials, API keys, and tokens throughout the application code and resources
πŸ“± Component Analysis Extracts activities, services, receivers, and content providers, highlighting security risks in app structure
πŸ›‘οΈ Permission Analysis Identifies overprivileged applications and highlights dangerous permission combinations
πŸ”— Deeplink Inspection Maps URL schemes and deeplink patterns that could potentially be exploited
πŸ“Š Metadata Collection Gathers extensive app metadata for security assessment and threat modeling
πŸ“œ Version Comparison Tracks security changes between app versions to identify fixes and regressions

πŸ—οΈ Architecture

MORF combines a Go backend with an Angular frontend for powerful analysis with an intuitive interface:

MORF Architecture


πŸ“‹ Common Use Cases

Use Case Description
πŸ•΅οΈ Security Audits Pre-release scanning to identify security issues before apps reach production
πŸ” Competitive Analysis Understand security implementations in competitor applications
βš™οΈ CI/CD Integration Automate security checks in your build pipeline with MORF's CLI capabilities
πŸ‘¨β€πŸ« Security Education Train developers on secure mobile development using real-world examples

πŸ“¦ Installation

Prerequisites

  • Docker (recommended for simplest installation)
  • Alternatively: Go and Node.js for development setup

Method 1: Docker (Recommended)

git clone https://github.com/amrudesh1/morf
cd morf
docker-compose up --build

Method 2: Run Script

git clone https://github.com/amrudesh1/morf
cd morf
chmod +x run.sh
./run.sh

Environment Configuration

MORF requires the DATABASE_URL environment variable to connect to your database:

# macOS/Linux
export DATABASE_URL="root@tcp(localhost:3306)/Secrets?charset=utf8mb4&parseTime=True&loc=Local"

# Windows (CMD)
set DATABASE_URL=root@tcp(localhost:3306)/Secrets?charset=utf8mb4&parseTime=True&loc=Local

# Windows (PowerShell)
$env:DATABASE_URL = "root@tcp(localhost:3306)/Secrets?charset=utf8mb4&parseTime=True&loc=Local"

Note: Docker Compose will automatically use the environment variables set on your host machine.


πŸ–₯️ Usage

Web Interface

After starting MORF, access the intuitive web interface at http://localhost and follow these steps:

  1. Upload your APK or IPA file using the drag-and-drop interface
  2. Wait for MORF to process and analyze the application
  3. Explore the detailed results, including:
    • Discovered secrets and API keys
    • Component security analysis
    • Permission assessment
    • Deeplink mapping
    • Comprehensive metadata

Command Line Interface

MORF also provides a powerful CLI for automation and integration:

# Basic scan with console output
./morf cli --apk-path=/path/to/app.apk

πŸ† Conference Recognition

Conference Appearances

BlackHat Asia 2023

MORF was presented at the Arsenal section, showcasing its capabilities in mobile application security analysis and secret detection.

View Presentation

BlackHat US 2023

MORF was featured at BlackHat US 2023 Arsenal, demonstrating advanced mobile security reconnaissance techniques to security professionals.

View Presentation

BlackHat Europe 2024

MORF continues to gain recognition with its selection for BlackHat Europe 2024 Arsenal, highlighting its ongoing development and relevance in mobile security.

View Presentation

BlackHat Asia 2025

Looking ahead, MORF has been selected for BlackHat Asia 2025 Arsenal, demonstrating its continued evolution and importance in the mobile security landscape.

View Presentation


πŸ›£οΈ Development Roadmap

βœ… v1.0 - Initial Release

  • APK scanning and analysis
  • Secret detection
  • Basic web interface

⏳ v1.1 - Enhanced iOS Support

  • Improved IPA analysis
  • iOS-specific pattern detection
  • Swift/Objective-C code scanning

⏳ v1.2 - Reporting Enhancements

  • PDF export functionality
  • Compliance reporting
  • Historical comparison views

⏳ v2.0 - Advanced Analysis

  • Machine learning-based vulnerability detection
  • Dynamic code analysis
  • Advanced threat modeling

πŸ‘¨β€πŸ’» Authors


πŸ“„ License

MORF is released under the MIT License. See the LICENSE file for more details.


πŸ™ Acknowledgments

  • Secrets Patterns Database - Pattern database used by MORF for secret detection
  • Open Source Security Community - For inspiration, feedback and support
  • All Contributors - Everyone who has contributed code, feedback, and ideas to the MORF project