AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers. It uses the same interfaces as Android's Eclipse debugging plugin, the Java Debug Wire Protocol (JDWP) and Dalvik Debug Monitor (DDM) to permit users to hook Dalvik methods, examine process state, and even perform changes. Unlike Google's own Android Software Development Kit debugging tools, AndBug does not require or expect source code. It does, however, require that you have some level of comfort with Python, as it uses a concept of scripted breakpoints, called 'hooks', for most nontrivial tasks. If you just want to dump loaded classes, methods, or threads, there are example scripts for that. AndBug is very much a program in flux, as I separate one-off scripts I have written at IOActive for various tasks from customer and IOActive-proprietary contexts. I do not recommend installation at this time, as you will want to update it frequently afterwards. AndBug runs very nicely from its own source directory with very little setup. Install the Android Software Development Kit.
Common questions about AndBug including features, pricing, alternatives, and user reviews.
AndBug is A Scriptable Android Debugger for reverse engineers and developers. It is a Application Security solution designed to help security teams with Reverse Engineering, Android Security.
AndBug is a free Application Security tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/swdunlop/AndBug/ for download and installation instructions.
Popular alternatives to AndBug include:
Compare these tools and more at https://cybersectools.com/categories/application-security
AndBug is for security teams and organizations that need Reverse Engineering, Android Security. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Application Security tools can be found at https://cybersectools.com/categories/application-security
Training course for Android and iOS mobile app security testing and exploitation