dexmod Logo

dexmod

0
Free
Visit Website

dexmod is a tool written in python to exemplify patching Dalvik bytecode in a DEX (Dalvik Executable) file, and assist in the static analysis of Android applications. It allows researchers to: Find methods in the application based on bytecode patterns Add new strings to the application Patch methods with custom bytecode Download and Usage: Download the dexmod code, and modify the editBytecode.py skeleton code to include custom bytecode patching logic based on analyzed samples. Run the following command, where DEX_FILE_NAME is the name of the DEX file to be patched: python dexmod.py [DEX_FILE_NAME] The tool will generate a patched DEX file with the name

FEATURES

ALTERNATIVES

A comprehensive checklist for securing Android apps

Leveraging WebDAV features for covert communication and payload delivery.

A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.

NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.

Inspeckage is a dynamic analysis tool for Android applications offering insights into app behavior and real-time monitoring capabilities.

Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.

An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.

Repository for apps to be used in Shuffle with compatibility instructions.