dexcalibur
Android analyzer
A tool for analyzing and reverse engineering Android applications using dynamic instrumentation automation and Frida.
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
1k stars
28 watching
126 forks
Language: JavaScript
last commit: almost 2 years ago analysisandroidandroid-securityapkdexfridafrida-nodeguihookhookinginstrumentation-automationmobile-securityreversereverse-engineeringsecurity-toolssmali
Related projects:
Repository | Description | Stars |
---|---|---|
secrary/andromeda | A tool for analyzing and reverse-engineering Android applications | 702 |
julianschuette/condroid | A tool that performs symbolic and concrete execution of Android apps to analyze behavior at specific code locations | 56 |
google/dexmod | Tool to analyze and modify Android bytecode for security research and analysis | 49 |
ucsb-seclab/baredroid | A tool for analyzing bare-metal Android devices | 91 |
alexmyg/andropytool | A tool for analyzing Android applications to extract static and dynamic features | 355 |
te-k/apkcli | Analyzes Android APKs to extract metadata and information about the app's behavior | 41 |
virb3/magisk-frida | Enables persistent frida-server execution on Android devices using Magisk as a root solution | 949 |
rednaga/apkid | Identifies how Android apps were made by analyzing compiled code and file formats | 2,070 |
den4uk/andriller | A software utility for analyzing and extracting data from Android devices without damaging them | 1,343 |
igio90/dwarf | A multi-platform debugger and reverse engineering tool for analyzing Android, iOS, Windows, Linux, and other architectures. | 1,278 |
zsshen/probedroid | A toolset for creating and running custom analysis and debugging tools on Android without modifying the app source code | 197 |
0x742/noia | A tool to browse and analyze mobile applications' files and data without needing physical access or root privileges. | 112 |
claudiugeorgiu/riskindroid | An Android app risk analysis tool using machine learning and reverse engineering to evaluate permission usage and risks. | 140 |
patmartin/dex | A data visualization tool with powerful ETL capabilities, allowing users to analyze and publish visualizations from various data sources. | 1,320 |
maldroid/maldrolyzer | A framework to analyze and extract data from Android malware, providing actionable information about malicious code. | 102 |