Skip to content

Xyphex/docker-mara-framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Supported tags and respective Dockerfile links

Quick reference

MARA Framework

This unofficial image contains MARA, a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in testing mobile applications against the OWASP mobile security threats. Its objective is to make this task easier and friendlier to mobile application developers and security professionals. See MARA's GitHub repository for more details about what it is.

Using MARA

Start the container. $ docker run -it -v /apps/to/analyze:/apps --name mara-framework --rm xyphex/mara-framework

Analyze an APK file. # ./mara.sh -s /apps/app.apk

Analyze a DEX file. # ./mara.sh -d /apps/app.dex

Analyze a JAR file. # ./mara.sh -j /apps/app.jar

Analyze a Java class file. # ./mara.sh -c /apps/app.class

Analyze a directory of APK files. # ./mara.sh -m /apps

Analyze a directory of DEX files. # ./mara.sh -x /apps

Analyze a directory of JAR files. # ./mara.sh -r /apps

Recommended reading

The MARA Framework wiki is a good place to learn more about what MARA is, how it works, and how to use it.

License

View license information for the software contained in this image.

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc. from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.