|Metabolic||Дата: Четверг, 24.01.2019, 15:03 | Сообщение # 1|
安卓逆向辅助工具 AR Helper v5.2.1 [2017-05-30]
因为感觉市面上的逆向工具用起来都不是很顺手，于是自己做了一个，功能包括反编译、回编译、签名、安装、查壳、解析 xml、编码转换、JavaToSmali、修改 so 汇编、右键菜单等等。
不支持 XP 系统
Скачать: AR Helper public v5.2.1
Jeb v220.127.116.11608151620 [2016.11.29]
JEB Android Decompiler v18.104.22.168808031948 Pro
JEB.android.decompiler 22.214.171.124808031948 Pro
Cracked by : ....................................... Roentgen
1) Install the app.
License is valid till 2032-03-12
Telemetry patched (though the program creates a single SSL connection on startup, I could not
patch it. So if you are afraid - use the firewall)
Greetings and thanks fly out to:
- my buddy void/tPORt;
- The Sabotage Rebellion hackers team (miss u guys);
- exelab.ru community;
- Pavel Kouznetsov for jad (java decompiling engine);
- Emmanuel Dupuy for Java Decompiler;
- Atanas Neshkov for DJ Java Decompiler;
- Matt (Col-E) for Recaf;
- SweetScape Software for 010 Editor;
- Christian Ghisler for TotalCommander;
- Microsoft for VisualStudio.
APKTools Windows GUI v1.0 (by SandPox) [01.05.2015]
APKTools Windows GUI Decompile/Recompile/ZipAlign/SignAPK
SandPox: "Hi everyone, I want to share a tool that I make it myself for easy to modify APKs (Because laziness so I don't want to type cmd )".
1. Windows XP or above.
2. .NET 2.0 is installed (default on XP, Vista, 7)
2. JRE/JDK Installed.
3. An APK that you want to do something with it.
1. Decompile APK.
2. Recompile APK.
3. Batch SignAPK (You can select or Drag multiple file).
4. Batch ZipAlign APK (You can select or Drag multiple file).
The inputboxes are Drag&Drop able.
CREDITS & BIG THANKS TO :
- viperneo for MetroFrameworkUI.
- brutall for apktool.
- Anyone that make signapk.
- The Android Opensource Project for zipalign.
Source: XDA Developers
Скачать: APKTools v0.1
Android Multitool v3.5.9 (23.10.2018) by bovirus
I´m glad to present my Android Multitool wich makes it easier to decompile/recompile applications + jar framework files. You can also sign your apk by easily clicking a button.
Winows OS XP / 7 / 8 / 8.1 / 10
Installed Java on Windows
Installed Microsoft Powerpacks
Installed .NET framework
- Easy handling: Select your apk and push the "decompile" button!
- This tool makes modding much faster and easier, no cmd handling any more.
- You can read the log which is integrated in the tool to find your mistake in the error.
- ADB inside: Push files into your file system with a few clicks
Latest version is: 3.5.9 (23.10.2018) updated by bovirus
This version is based on original v. 3.5.9 by Flextrick plus with these updates
- apktool (by iBotPeaches) v. 2.3.4 stable
- apktool commands list
- baksmali/smali (by JesusFreke) v. 2.2.5 stable
- baksmali/smali command list
- Android Build Tools (by Google) v. 28.0.3 stable
- Android Build Tools commands list
- Android Platform Tools (by Google) v. 28.0.1 stable
- Android Platform Tools commands list
- 7zip (by Igor Pavlov) v. 18.05
- DOS batch updated (now support file names with spaces)
With the DOS batch (file AMT.BAT) you can
- install framework file
- select application
- decompile application
- compile application
- sign application
Source: XDA Developers
Скачать: Android Multitool v3.5.9
Bytecode Viewer v2.9.11 - JRE 8, 9 & 10 
Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX Decompiler, GUI Procyon Java Decompiler, GUI Krakatau, GUI CFR Java Decompiler, GUI FernFlower Java Decompiler, GUI DEX2Jar, GUI Jar2DEX, GUI Jar-Jar, Hex Viewer, Code Searcher, Debugger and more. It's written completely in Java, and it's open sourced. It's currently being maintained and developed by Konloch.
There is also a plugin system that will allow you to interact with the loaded classfiles, for example you can write a String deobfuscator, a malicious code searcher, or something else you can think of. You can either use one of the pre-written plugins, or write your own. It supports groovy scripting. Once a plugin is activated, it will execute the plugin with a ClassNode ArrayList of every single class loaded in BCV, this allows the user to handle it completely using ASM.
Code from various projects has been used, including but not limited to:
• J-RET by WaterWolf
• JHexPane by Sam Koivu
• RSynaxPane by Robert Futrell
• Commons IO by Apache
• ASM by OW2
• FernFlower by Stiver
• Procyon by Mstrobel
• CFR by Lee Benfield
• CFIDE by Bibl
• Smali by JesusFreke
• Dex2Jar by pxb1..?
• Krakatau by Storyyeller
• JD GUI/JD Core by The Java-Decompiler Team
• Enjarify by Storyyeller
• If I missed you, please feel free to contact me @Konloch or email@example.com
• Krakatau Integration for Bytecode assembly/disassembly.
• Smali/BakSmali Integration - You can now edit class files/dex files via smali!
• APK/DEX Support - Using Dex2Jar and Jar2Dex it's able to load and save APKs with ease!
• Java Decompiler - It utilizes FernFlower, Procyon and CFR for decompilation.
• Bytecode Decompiler - A modified version of CFIDE's.
• Hex Viewer - Powered by JHexPane.
• Each Decompiler/Editor/Viewer is toggleable, you can also select what will display on each pane.
• Fully Featured Search System - Search through strings, functions, variables and more!
• A Plugin System With Built In Plugins - (Show All Strings, Malicious Code Scanner, String Decrypters, etc)
• Fully Featured Scripting System That Supports Groovy.
• EZ-Inject - Graphically insert hooks and debugging code, invoke main and start the program.
• Recent Files & Recent Plugins.
• And more! Give it a try for yourself!
Source Code: https://github.com/konloch/bytecode-viewer
Java Docs: https://the.bytecode.club/docs/bytecode-viewer/
License (Copyleft): https://raw.githubusercontent.com/Konloch....LICENSE
Report Bugs (or below): https://github.com/Konloch/bytecode-viewer/issues
Discussion Forum: https://the.bytecode.club/forumdisplay.php?fid=69
Скачать: Bytecode Viewer v2.9.11
26 Awesome Android Reverse Engineering Tools 
5. ANDROID FRAMEWORK FOR EXPLOITATION
6. BYPASS SIGNATURE AND PERMISSION CHECKS FOR IPCS (Android-KillPermAndSigChecks)
7. ANDROID OPENDEBUG
23. SIMPLIFY ANDROID DEOBFUSCATOR (Generic Android Deobfuscator)
24. BYTECODE VIEWER
26. JEB FOR ANDROID
Скачать: 26 Awesome Android Reverse Engineering Tools
GDA Android Reversing Tool v3.65 
GDA - is a new decompiler written entirely in c++, so it does not rely on the Java platform, which is succinct, portable and fast, and supports APK, DEX, ODEX, oat.
GDA(GJoy Dex Analysizer)
Most reverse engineers mainly use Java decompiler, commercial dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on Smali code. They have their own shortcomings, such as Java decompiler depends on convert of dex2jar. For complex, obfuscated or packed apks, there are problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing large-sized APP with the Multidex, and it is very expensive...
Here, a new decompiler based on Dalvik bytecode, GDA, is proposed and implemented in C++ language to provide more sophisticated, fast and convenient decompilation support. GDA is completely self-independent. It supports APK, DEX, ODEX, oat files, and run without installation and Java VM support. GDA only takes up 2M of your disk space, and you can use it in any newly installed windows system and virtual machine system. In addition, GDA has more features as follows:
1.cross-references for strings, classes, methods and fields;
2.searching for strings, classes methods and fields;
3.comments for java code;
4.rename for methods,fields and classes;
5.save the analysis results in gda db file.
Practical Tools for Assisted Analysis:
1.extracting DEX from ODEX;
2.extracting DEX from OAT;
5.device memory dump;
1.Brand new dalvik decompiler in c++ with friendly GUI;
2.Support python script
5.making and loading signature of the method
6.Malicious Behavior Scanning by API chains;
7.taint analysis to preview the behavior of variables;
8.taint analysis to trace the path of variables;
10.API view with x-ref;
11.Association of permissions with modules;
not yet, just double-click the bin and you can enjoy it.
Only for windows
brief guide: https://github.com/charles2gan/GDA-android-reversing-Tool/wiki
python script: https://github.com/charles....scripts
Скачать: GDA Android Reversing Tool v3.65
Android Multitool v3.5.2
JEB - The Interactive Android Decompiler 1.4