Enjarify is a tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications. It is a pure Python 3 application that can be easily run by cloning the repository and executing 'python3 -O -m enjarify.main yourapp.apk'. Wrapper scripts are also provided for Linux and Windows for convenience.
FEATURES
SIMILAR TOOLS
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A sandbox for quickly sandboxing known or unknown families of Android Malware
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.