Skip to content
Home Mobile Tools Objection
OB

Objection

Category: Mobile
License: GPL-3.0 (open source)
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 12, 2026
4 min read
0 Comments

Objection is a runtime mobile exploration toolkit developed by SensePost that simplifies mobile application security testing. With over 8,900 GitHub stars, it has become a popular choice for pentesters who need quick assessment capabilities without the complexity of writing Frida scripts from scratch. Released in January 2026, Objection is actively maintained as an instrumented mobile pentest framework.

The tool’s primary advantage is accessibility. While Frida requires JavaScript knowledge and custom hook development, Objection provides a command-line interface with pre-built commands for common security testing tasks. This makes it ideal for rapid assessments and for testers who want powerful capabilities without deep instrumentation expertise.

What is Objection?

Objection is a Python-based toolkit that leverages Frida’s dynamic instrumentation capabilities to perform runtime analysis of iOS and Android applications. It injects scripts into running processes to bypass security controls, inspect application internals, and manipulate behavior—all without modifying the original APK or IPA permanently.

The framework operates as a command-line REPL (Read-Eval-Print Loop) where you can execute commands against a running mobile app. This interactive approach lets you explore the app dynamically, responding to what you discover rather than planning all tests in advance.

Installation is straightforward via pip (pip3 install objection), and the tool handles the complexity of Frida setup behind the scenes. For apps on non-jailbroken or non-rooted devices, Objection can patch APKs and IPAs to embed frida-gadget, enabling testing without system-level access.

SSL Pinning Bypass
Automatically disable certificate pinning to intercept HTTPS traffic with proxies
File System Access
Browse, download, and upload files from the app’s sandbox without jailbreak
Memory Manipulation
Dump process memory, explore heap objects, and search for sensitive data in RAM
Keychain Inspection
Extract credentials and certificates from iOS Keychain or Android KeyStore
Runtime Hooks
Inject custom hooks to bypass biometric auth, modify method behavior, or trace calls
No Jailbreak Mode
Patch apps to include Frida without requiring device-level root or jailbreak access

Key features

SSL Pinning Bypass

One of Objection’s most popular features is automated SSL certificate pinning bypass. With a single command (ios sslpinning disable or android sslpinning disable), you can defeat most pinning implementations, allowing you to intercept HTTPS traffic with mitmproxy or Burp Suite. This eliminates hours of manual hook writing for a task that’s essential to most mobile pentests.

The SSL pinning bypass works by hooking common pinning libraries and custom implementations at runtime. It covers frameworks like AFNetworking on iOS and OkHttp on Android, as well as many custom validation routines.

File System and Container Exploration

Objection provides commands to browse the app’s file system, download databases and configuration files, and upload modified versions for testing. On iOS, you can navigate the app’s Documents, Library, and tmp directories. On Android, you can explore /data/data// and external storage.

This capability is invaluable for finding hardcoded credentials, examining SQLite databases for sensitive data, and understanding how the app stores information locally. You can dump binary cookies, inspect plist files, and analyze local encryption implementations.

Memory and Heap Analysis

The toolkit includes commands for memory dumping and heap exploration. You can search process memory for sensitive strings like API keys or tokens, dump objects from the heap to understand runtime state, and identify where sensitive data resides in RAM.

These features help identify insecure data storage vulnerabilities where apps keep sensitive information in memory longer than necessary or fail to zero out credentials after use.

Integration with Mobile Security Workflows

Objection fits naturally into comprehensive mobile testing workflows. Start by decompiling the APK with Jadx to understand the app’s structure and identify interesting classes or methods. Then use Objection to hook those methods at runtime, modify their behavior, and observe the results.

For apps with native libraries, combine Objection with Ghidra for reverse engineering the compiled code, then use Objection’s custom hook capabilities to test your findings. The framework also integrates with Frida scripts, allowing you to extend Objection with custom functionality when needed.

App Patching for Non-Rooted Testing

The objection patchapk (Android) and objection patchipa (iOS) commands automate the process of embedding frida-gadget into apps. This allows you to test on non-rooted Android devices and non-jailbroken iOS devices, significantly expanding the range of devices you can use for testing.

The patched app behaves identically to the original but includes the Frida runtime, enabling full Objection capabilities without system-level privileges.

When to use Objection

Strengths:

  • Significantly faster assessment than writing custom Frida scripts
  • Beginner-friendly interface with extensive documentation
  • Covers the most common mobile pentest tasks out of the box
  • Active development with regular updates and new features
  • Strong community and cheat sheets available online
  • Works without jailbreak/root via app patching
  • Free and open source under GPL-3.0
  • Cross-platform support for iOS and Android

Limitations:

  • Less flexible than custom Frida scripting for complex scenarios
  • Pre-built hooks may not work on heavily customized implementations
  • Requires some learning of command syntax and options
  • App patching may trigger anti-tampering detections
  • Performance overhead from multiple simultaneous hooks
  • Some advanced techniques still require dropping to raw Frida
Best for
Objection is perfect for penetration testers who need to quickly assess mobile app security posture, especially for common vulnerabilities like SSL pinning, insecure data storage, and weak authentication, without investing time in custom instrumentation code.

Getting started

1
Install Objection — Run pip3 install objection to install the toolkit and its dependencies including Frida.
2
Connect to a running app — On a rooted/jailbroken device with frida-server running, use objection -g com.example.app explore to launch the interactive REPL.
3
For non-rooted devices — Patch the APK with objection patchapk -s app.apk, install the patched app, run it, then connect with objection explore.
4
Run security checks — Use commands like ios sslpinning disable to bypass pinning, android hooking list activities to enumerate components, or env to inspect the app’s file system paths.

Combine Objection with mitmproxy for traffic interception, Jadx for static analysis, and Frida scripts when you need custom capabilities beyond Objection’s built-in commands.

Frequently Asked Questions

What is Objection?
Objection is a runtime mobile exploration toolkit built on top of Frida. It provides a command-line interface for assessing mobile app security without requiring jailbreak or root access. The tool automates common pentesting tasks like SSL pinning bypass, file system inspection, and memory manipulation.
How does Objection differ from Frida?
Objection is built on top of Frida and provides a higher-level, more accessible interface. While Frida requires writing JavaScript hooks, Objection offers ready-made commands for common tasks. Think of Objection as a mobile pentest framework, while Frida is the underlying instrumentation engine.
Can Objection work on non-jailbroken devices?
Yes, Objection can work on non-jailbroken iOS devices and non-rooted Android devices by patching apps to include the frida-gadget. The objection patchapk and objection patchipa commands automate this process, allowing you to test apps without system-level access.
Is Objection suitable for beginners?
Yes, Objection is more beginner-friendly than raw Frida scripting. Its command-line interface provides intuitive commands for common tasks, making it an excellent starting point for learning mobile security testing. However, understanding basic mobile security concepts is still recommended.

Complement with DAST

Pair mobile security with dynamic testing for broader coverage.

See all DAST tools

Comments

Powered by Giscus — comments are stored in GitHub Discussions.