
A powerful offensive security toolkit for mobile application analysis
Find Secrets. Protect Apps. Stay Secure.
- π‘ Overview
- π Quick Start
- π Key Features
- ποΈ Architecture
- π Common Use Cases
- π¦ Installation
- π₯οΈ Usage
- π Conference Recognition
- π£οΈ Development Roadmap
- π¨βπ» Authors
- π License
- π Acknowledgments
MORF is an advanced mobile security analysis tool that automatically discovers sensitive information within Android and iOS applications. Designed for security professionals, penetration testers, and developers, MORF provides comprehensive insights into mobile app security posture.
MORF can be up and running in seconds using Docker or the included run script:
# Clone the repository and enter directory
git clone https://github.com/amrudesh1/morf && cd morf
# Option 1: Using the run script (recommended)
chmod +x run.sh && ./run.sh
# Option 2: Using Docker Compose
docker-compose up --build
Then simply visit http://localhost in your browser and upload an APK or IPA file to begin analysis!
MORF offers comprehensive security analysis capabilities for mobile applications:
Feature | Description |
---|---|
π Secret & API Key Detection | Automatically discovers hardcoded credentials, API keys, and tokens throughout the application code and resources |
π± Component Analysis | Extracts activities, services, receivers, and content providers, highlighting security risks in app structure |
π‘οΈ Permission Analysis | Identifies overprivileged applications and highlights dangerous permission combinations |
π Deeplink Inspection | Maps URL schemes and deeplink patterns that could potentially be exploited |
π Metadata Collection | Gathers extensive app metadata for security assessment and threat modeling |
π Version Comparison | Tracks security changes between app versions to identify fixes and regressions |
MORF combines a Go backend with an Angular frontend for powerful analysis with an intuitive interface:
Use Case | Description |
---|---|
π΅οΈ Security Audits | Pre-release scanning to identify security issues before apps reach production |
π Competitive Analysis | Understand security implementations in competitor applications |
βοΈ CI/CD Integration | Automate security checks in your build pipeline with MORF's CLI capabilities |
π¨βπ« Security Education | Train developers on secure mobile development using real-world examples |
- Docker (recommended for simplest installation)
- Alternatively: Go and Node.js for development setup
git clone https://github.com/amrudesh1/morf
cd morf
docker-compose up --build
git clone https://github.com/amrudesh1/morf
cd morf
chmod +x run.sh
./run.sh
MORF requires the DATABASE_URL
environment variable to connect to your database:
# macOS/Linux
export DATABASE_URL="root@tcp(localhost:3306)/Secrets?charset=utf8mb4&parseTime=True&loc=Local"
# Windows (CMD)
set DATABASE_URL=root@tcp(localhost:3306)/Secrets?charset=utf8mb4&parseTime=True&loc=Local
# Windows (PowerShell)
$env:DATABASE_URL = "root@tcp(localhost:3306)/Secrets?charset=utf8mb4&parseTime=True&loc=Local"
Note: Docker Compose will automatically use the environment variables set on your host machine.
After starting MORF, access the intuitive web interface at http://localhost and follow these steps:
- Upload your APK or IPA file using the drag-and-drop interface
- Wait for MORF to process and analyze the application
- Explore the detailed results, including:
- Discovered secrets and API keys
- Component security analysis
- Permission assessment
- Deeplink mapping
- Comprehensive metadata
MORF also provides a powerful CLI for automation and integration:
# Basic scan with console output
./morf cli --apk-path=/path/to/app.apk
MORF was presented at the Arsenal section, showcasing its capabilities in mobile application security analysis and secret detection. |
MORF was featured at BlackHat US 2023 Arsenal, demonstrating advanced mobile security reconnaissance techniques to security professionals. |
MORF continues to gain recognition with its selection for BlackHat Europe 2024 Arsenal, highlighting its ongoing development and relevance in mobile security. |
Looking ahead, MORF has been selected for BlackHat Asia 2025 Arsenal, demonstrating its continued evolution and importance in the mobile security landscape. |
- Improved IPA analysis
- iOS-specific pattern detection
- Swift/Objective-C code scanning
- PDF export functionality
- Compliance reporting
- Historical comparison views
- Machine learning-based vulnerability detection
- Dynamic code analysis
- Advanced threat modeling
MORF is released under the MIT License. See the LICENSE file for more details.
- Secrets Patterns Database - Pattern database used by MORF for secret detection
- Open Source Security Community - For inspiration, feedback and support
- All Contributors - Everyone who has contributed code, feedback, and ideas to the MORF project