Androguard – Reverse Engineering Tool... let's start reversing!


Androguard – Reverse Engineering & Malware Analysis For Android


Androguard is a toolkit built-in Python which provides reverse engineering and malware analysis for Android.

It’s buyilt to examine * Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation), * APK (Android application) (.apk), * Android’s binary xml (.xml) and * Android Resources (.arsc).

Androguard is available for Linux/OSX/Windows (Python powered).


Features:

  • Map and manipulate DEX/ODEX/APK/AXML/ARSC format into full Python objects
  • Disassemble/Decompilation/Modification of DEX/ODEX/APK format
  • Decompilation with the first native (directly from Dalvik bytecodes to java source codes) Dalvik decompiler (DAD)
  • Access to the static analysis of the code (basic blocks, instructions, permissions)
  • Analysis of a bunch of android apps
  • Analysis with python/Sublime Text Editor
  • Diffing of android applications
  • Measure the efficiency of obfuscators (proguard, …)
  • Determine if your application has been pirated (plagiarism/similarities/rip-off indicator)
  • Check if an android application is present in a database (malware, goodwares ?)
  • Open-source database of android malware
  • Detection of ad/open-source libraries (WIP)
  • Risk indicator of malicious application
  • Reverse engineering of applications (goodwares, malware)
  • Transform Android’s binary XML (like AndroidManifest.xml) into classic XML
  • Visualize your application with gephi (gexf format), or with Cytoscape (XML format), or PNG/DOT output
  • Integration with external decompilers (JAD+dex2jar/DED/fernflower/jd-gui…)
Download this amazing tool for from here: Click Here

Comments

Popular posts from this blog

CAREER TECHNOLOGY CYBER SECURITY INDIA PVT LTD.

Cyber Security Audits

Some Dark web Links