Enjarify Logo

Enjarify

0
Free
Visit Website

Enjarify is a tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications. Usage and installation Enjarify is a pure python 3 application, so you can just git clone and run it. To run it directly, assuming you are in the top directory of the repository, you can just do python3 -O -m enjarify.main yourapp.apk For normal use, you'll probably want to use the wrapper scripts and set it up on your path. Linux For convenience, a wrapper shell script is provided, enjarify.sh. This will try to use Pypy if available, since it is faster than CPython. If you want to be able to call Enjarify from anywhere, you can create a symlink from somewhere on your PATH, such as ~/bin. To do this, assuming you are inside the top level of the repository, ln -s "$PWD/enjarify.sh" ~/bin/enjarify Windows A wrapper batch script, enjarify.bat, is provided. To be able to call it from anywhere, just add the root directory of the repository to your PATH. The batch script will always invoke python3 as interpreter. If you want to use pypy, just edit the script. Usage Assuming you set up the script on your path correctly, you can call

FEATURES

ALTERNATIVES

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Detect capabilities in executable files and identify potential behaviors.

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

Fuzzilli is a JavaScript engine fuzzer that helps identify vulnerabilities in JavaScript engines.

A collection of YARA rules for public use, built from intelligence profiles and file work.

A tool for identifying and analyzing Java serialized objects in network traffic

A write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition

Tool for fingerprinting malware HTTP requests.

PINNED