Reverse engineering and pentesting for Android applications
-
Updated
Jun 14, 2023 - Python
Reverse engineering and pentesting for Android applications
Android virtual machine and deobfuscator
Android Reverse-Engineering Workbench for VS Code
The OpenSource Disassembler
DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Droidefense: Advance Android Malware Analysis Framework
The Redexer binary instrumentation framework for Dalvik bytecode
A Program Analysis Toolkit for Android
Experiments with writing Android apps in Nim
Indie assembler/linker for Dalvik VM .dex & .apk files (Work In Progress)
Run arbitrary code by patching OAT files
Ultimate dalvik optimization magisk module
A graph-based static-dynamic hybrid DEX code analysis tool
Add a description, image, and links to the dalvik topic page so that developers can more easily learn about it.
To associate your repository with the dalvik topic, visit your repo's landing page and select "manage topics."