Androguard – Reverse Engineering Tool... let's start reversing!
Androguard – Reverse Engineering & Malware Analysis For Android
Androguard is a toolkit built-in Python which provides reverse engineering and malware analysis for Android.
It’s buyilt to examine * Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation), * APK (Android application) (.apk), * Android’s binary xml (.xml) and * Android Resources (.arsc).
Androguard is available for Linux/OSX/Windows (Python powered).
Features:
- Map and manipulate DEX/ODEX/APK/AXML/ARSC format into full Python objects
- Disassemble/Decompilation/Modification of DEX/ODEX/APK format
- Decompilation with the first native (directly from Dalvik bytecodes to java source codes) Dalvik decompiler (DAD)
- Access to the static analysis of the code (basic blocks, instructions, permissions)
- Analysis of a bunch of android apps
- Analysis with python/Sublime Text Editor
- Diffing of android applications
- Measure the efficiency of obfuscators (proguard, …)
- Determine if your application has been pirated (plagiarism/similarities/rip-off indicator)
- Check if an android application is present in a database (malware, goodwares ?)
- Open-source database of android malware
- Detection of ad/open-source libraries (WIP)
- Risk indicator of malicious application
- Reverse engineering of applications (goodwares, malware)
- Transform Android’s binary XML (like AndroidManifest.xml) into classic XML
- Visualize your application with gephi (gexf format), or with Cytoscape (XML format), or PNG/DOT output
- Integration with external decompilers (JAD+dex2jar/DED/fernflower/jd-gui…)
Comments
Post a Comment