@@ -74,15 +74,14 @@ Mango is medusa's twin brother which can be used to:
74
74
75
75
...and many many more
76
76
77
- A [ wiki page ] ( https://github.com/Ch0pin/medusa/wiki ) is currently under construction.
77
+ Please reffer to our [ wiki] ( https://github.com/Ch0pin/medusa/wiki ) for usage details.
78
78
79
79
# ** Updates** :
80
80
81
81
### (12/2022) Using the translator script:
82
82
1 . Replace the default google_trans_new.py of you google_trans_new python package with the one from the utils/google_trans_new.py
83
83
2 . Import it with medusa>use helpers/tranlsator
84
84
85
-
86
85
# ** Contribute by:**
87
86
88
87
- Making a pull request
@@ -100,32 +99,33 @@ A [wiki page](https://github.com/Ch0pin/medusa/wiki) is currently under construc
100
99
101
100
#### - SSL Unpinning
102
101
103
- ![ Screenshot 2020-09-22 at 16 41 10 ] ( https://user-images.githubusercontent.com/4659186/151658672-dc80f37c-f4fb-48b8-a355-1dc0bf2b172c.png )
102
+ ![ ssl unpinning ] ( https://user-images.githubusercontent.com/4659186/151658672-dc80f37c-f4fb-48b8-a355-1dc0bf2b172c.png )
104
103
105
104
#### - Intent Monitoring
106
105
107
- <img src =" https://user-images.githubusercontent.com/4659186/151658670-2ddac205-4c77-418a-8edd-2035b233387e.png " alt =" Screenshot 2020-09-22 at 16 41 10 " style =" zoom :100% ;" />
106
+ ![ Intent monitoring] ( https://user-images.githubusercontent.com/4659186/225246566-ad1e7de0-0c74-4da9-ae01-ba3fec9661a0.png )
107
+
108
+ #### - Webview Monitoring
108
109
109
- #### - Passive Monitoring of HTTP Requests
110
+ ![ Webview monitoring ] ( https://user-images.githubusercontent.com/4659186/225247047-f25fde47-671f-4e94-99d6-54996678e770.png )
110
111
111
- ![ Screenshot 2020-09-22 at 16 41 10] ( https://user-images.githubusercontent.com/4659186/93905749-34203580-fcf3-11ea-9f36-8138141c2302.png )
112
112
113
- ![ Screenshot 2020-09-22 at 16 43 37] ( https://user-images.githubusercontent.com/4659186/93905699-25d21980-fcf3-11ea-85e0-fafd62ea7d28.png )
113
+ #### - File/Content provider monitoring
114
+
115
+ ![ File and content providers] ( https://user-images.githubusercontent.com/4659186/225247734-69a58b7a-1318-4f7c-a877-6c95cdf8b07d.png )
114
116
115
117
116
118
#### - Native Libraries Enumeration
117
119
118
120
![ Screenshot 2020-09-22 at 16 41 10] ( https://user-images.githubusercontent.com/4659186/151658663-6c77f2e3-6f42-4424-b593-d8cfe3d3bed3.png )
119
121
120
-
121
122
#### - Memory READ/WRITE/SEARCH (interactive mode):
122
123
123
124
![ Screenshot 2020-09-22 at 16 41 10] ( https://user-images.githubusercontent.com/4659186/151658659-b4f83296-60ec-4818-a303-5645284b0a67.png )
124
125
125
126
#### - Personal information exfiltration monitoring
126
127
127
128
> Hooks api calls which found to be common for this kind of malware, including:
128
- >
129
129
> - Contact exfiltration
130
130
> - Call log exfiltration
131
131
> - Camera usage
@@ -161,3 +161,4 @@ A [wiki page](https://github.com/Ch0pin/medusa/wiki) is currently under construc
161
161
- https://github.com/0xdea/frida-scripts
162
162
- https://github.com/Areizen/JNI-Frida-Hook
163
163
164
+
0 commit comments