Enjarify Logo

Enjarify

0
Free
Visit Website

Enjarify is a tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications. Usage and installation Enjarify is a pure python 3 application, so you can just git clone and run it. To run it directly, assuming you are in the top directory of the repository, you can just do python3 -O -m enjarify.main yourapp.apk For normal use, you'll probably want to use the wrapper scripts and set it up on your path. Linux For convenience, a wrapper shell script is provided, enjarify.sh. This will try to use Pypy if available, since it is faster than CPython. If you want to be able to call Enjarify from anywhere, you can create a symlink from somewhere on your PATH, such as ~/bin. To do this, assuming you are inside the top level of the repository, ln -s "$PWD/enjarify.sh" ~/bin/enjarify Windows A wrapper batch script, enjarify.bat, is provided. To be able to call it from anywhere, just add the root directory of the repository to your PATH. The batch script will always invoke python3 as interpreter. If you want to use pypy, just edit the script. Usage Assuming you set up the script on your path correctly, you can call

FEATURES

ALTERNATIVES

OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.

A GitHub repository for fuzzing and testing file formats

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities

Checksec is a bash script to check the properties of executables like PIE, RELRO, Canaries, ASLR, Fortify Source.

A strings statistics calculator for YARA rules to aid malware research.

A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.

A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.