ClassyShark Logo

ClassyShark

0
Free
Visit Website

ClassyShark is a standalone binary inspection tool for Android developers. It can reliably browse any Android executable and show important info such as class interfaces and members, dex counts and dependencies. ClassyShark supports multiple formats including libraries (.dex, .aar, .so), executables (.apk, .jar, .class) and all Android binary XMLs: AndroidManifest, resources, layouts etc. Useful links: - User guide - Command-line reference - Gradle sample - Vision and Strategy Download: To run, grab the latest JAR and run java -jar ClassyShark.jar. Export data in text format Exporter API finder 🚧 work in progress Develop: - Clone the repo - Open in your favorite IDE/editor - Build options: IntelliJ - builds automatically when exporting the project - Gradle script RetroBuild Arch Linux: If you're running Arch Linux you can install the latest prebuilt jar from the AUR. Dependencies: - dexlib2 by jesusfreke - guava by Google - ASM by OW2 - ASMDEX by OW2 - java-binutils by jawi - BCEL by Apache Support: If you've found an error, please file an issue: https://github.com/google/android-classyshark/issues Patches are encouraged, and may be submitted by forking this project and submitting a pull re

FEATURES

ALTERNATIVES

YARA syntax highlighting for Gtk-based text editors

Interactive incremental disassembler with data/control flow analysis capabilities.

Collection of malware persistence information and techniques

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

A Python script that converts shellcode into a PE32 or PE32+ file.

GuardDog is a CLI tool for identifying malicious PyPI and npm packages through heuristics and Semgrep rules.

A backend agnostic debugger frontend for debugging binaries without source code access.