diff --git a/README.md b/README.md index 72cfe0f..1edc09f 100644 --- a/README.md +++ b/README.md @@ -34,6 +34,7 @@ The Mobile App Pentest cheat sheet was created to provide concise collection of * `python manage.py runserver 127.0.0.1:1337` * [Needle](https://github.com/mwrlabs/needle) - Needle is an open source, modular framework to streamline the process of conducting security assessments of iOS apps including Binary Analysis, Static Code Analysis, Runtime Manipulation using Cycript and Frida hooking, and so on. * [Objection](https://github.com/sensepost/objection) - Objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. +* [NullKia Mobile Security Framework](https://github.com/bad-antics/nullkia) - A multi-language mobile security framework with tools written in Nim, Crystal, V, D, Red, Odin, Haxe, Zig, Kotlin, and Python for Android/iOS penetration testing, baseband analysis, bootloader security, and firmware hacking. * [RMS-Runtime-Mobile-Security](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security) - Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime.