Skip to content

vwww-droid/Mira

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

131 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

English | 简体中文

Mira icon

Mira

Mobile runtime detection workbench for iOS and Android.

AI-native analysis Android and iOS Live logic execution Relay and MCP


Mira is built in the open as a long-term project for turning real runtime cases into reusable detection knowledge, analysis workflows, and cross-platform tooling.

Why follow Mira

  • Mira grows with real runtime work, not just planned features.
  • Each field case can become a new workflow, tool capability, or detection note.
  • The project is designed to accumulate practical mobile runtime knowledge over time.
  • Following Mira means following how that knowledge turns into working tooling.

Research Updates

Mira is developed in public and updated across multiple channels.

Different platforms carry different parts of the work:

  • GitHub for the main project record
  • Articles for full case write-ups
  • Community posts for focused technical sharing
  • Short updates for demos, progress, and smaller discoveries

Next updates will resume after the early May 2026 holiday break. Happy International Workers' Day to everyone celebrating.

Features

  • 🧩 Real app sandbox access: Drop directly into the true permission sandbox of target apps with one consistent Android and iOS workflow.
  • 🤖 Built for AI operators: Let AI inspect, navigate, and reason inside the live app runtime like a hands-on analyst.
  • Live runtime execution: Run Java, Native, and Frida-driven logic on demand to verify signals instead of guessing from static traces.
  • 🚀 Fast to first result: Start Relay, install the app, and get to shell, screen, and runtime evidence in minutes.
  • ♾️ Compounding detection intelligence: Turn one real finding into reusable detection patterns and repeatable hardening wins.

Getting Started

  • Relay: PYTHONPATH=. python3 -m mira.relay.server --host 0.0.0.0 --port 8765 --advertise-url http://<your-lan-ip>:8765
  • Browser: Open http://127.0.0.1:8765 on your desktop.
  • Android: Download the APK from Releases, install it, then enter http://<your-lan-ip>:8765 in the app.
  • iOS: Verified on a real device running iOS 16.7.10. See docs/GETTING-STARTED.md.
  • AI: PYTHONPATH=. python3 -m mira.mcp.server --relay http://127.0.0.1:8765. MCP config: docs/MCP.md.

Live Discovery Examples

Android Remote Frida iOS Remote Frida
Android Remote Frida
Remote shell, runtime inspection, and live Frida execution on Android.
iOS Remote Frida
Equivalent PTY and Frida workflow adapted to the iOS iSH compatibility layer.
Android LSPosed Trace iOS Jailbreak Trace
Android LSPosed Trace
Construct a Frida path around the app classloader and surface LSPosed traces from runtime state.
iOS Jailbreak Trace
Ask Claude to roam the live terminal and surface jailbreak-related traces in the device environment.

Public Relay Access

Relay exposed through cpolar

With Relay, you can temporarily expose an authorized session beyond the local network for cloud devices, expert review handoff, and fast evidence sharing.

Research Boundaries

  1. Mira observes and interacts with the Mira host app sandbox.
  2. Mira does not control unrelated third-party apps.
  3. Mira does not provide system-wide remote control.
  4. Mira does not provide root or jailbreak bypass capabilities.
  5. Mira is not a production SDK or a silent background control channel.

Documentation

Acknowledgements

  • lamda: inspiration for the web workbench interaction model.
  • Termux: Android terminal UX and extensible shell ecosystem.
  • iSH: iOS-side Linux shell compatibility and syscall translation path.

License

GPL-3.0-only.