Reverse engineering and pentesting for Android applications
-
Updated
May 16, 2024 - Python
Reverse engineering and pentesting for Android applications
Android virtual machine and deobfuscator
DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.
Android Reverse-Engineering Workbench for VS Code
💉 ReVanced Patcher used to patch Android applications
The OpenSource Disassembler
🏆Explore Android performance optimization in depth(continuous updating ...)
Droidefense: Advance Android Malware Analysis Framework
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
The Redexer binary instrumentation framework for Dalvik bytecode
A Program Analysis Toolkit for Android
A tool pulls loaded binaries ordered by memory regions
Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.
Add a description, image, and links to the dalvik topic page so that developers can more easily learn about it.
To associate your repository with the dalvik topic, visit your repo's landing page and select "manage topics."