Andromeda makes initial reverse engineering work of Android applications bit faster and easier. Compared to other alternatives, it's written in C/C++ and has a noticeable performance advantage. DEMO The tool is in the early development stage Building Requirements clang: apt install clang libzip: apt install libz-dev openssl: apt install libssl-dev make ./bin/andromeda android_app.apk Commands Author Lasha Khasaia (@_qaz_qaz) Note I've very limited experience with Android, so if you have time please contribute. TODO Document the tool
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A program to manage yara ruleset in a database with support for different databases and configuration options.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.