I got pretty tired of decompiling Android apps with a bunch of steps that I had to remember all the time. It involved a lot of apktool, dex2jar, and jd-gui; it still confuses me. Further, even after these steps were complete (usually a combination of dex2jar and JD-GUI), I would be left with disparate sources of information; the decompiled Java would be over here in this directory, while the un-DEXed content would be somewhere else (Really bad for importing into Eclipse!) I basically wanted to make this generate a tree and source as close as possible to what the original Android developer sees. One thing that existing decompilers don't do is regenerate R references; this tool includes a script that makes an attempt to do this. Which gives you more insight when you're reading source code? View v = inflater.inflate(217994357, container, false); or View v = inflater.inflate(R.layout.result_panel, container, false); Now you can easily see and search for what resource is doing what, without needing to file-search R.java for some opaque int. Note: This process relies on guesses and
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.
A simple Python script to test for a hypothetical JWT vulnerability
VxSig is a tool to automatically generate AV byte signatures from similar binaries.
Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.
A script to detect and remove Canary Tokens with simple signature-based detections.
A powerful tool for detecting and identifying malware using a rule-based system.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.