Redexer Logo

Redexer

0
Free
Visit Website

Redexer is a reengineering tool that manipulates Android app binaries. This tool is able to parse a DEX file into an in-memory data structure; to infer with which parameters the app uses certain permissions (we name this feature RefineDroid); to modify and unparse that data structure to produce an output DEX file (we name these features Dr. Android, which stands for Dalvik Rewriting for Android). Publications Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications. Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12), Oct 2012. Requirements OCaml and Ruby This tool is tested under OCaml 4.09.0 and Ruby 1.8.6(7), so you need to install them (or higher versions of them). OCaml package/library manager and SHA library To manipulate a SHA-1 signature (hash) in the DEX format, we utilize OCaml SHA library via ocamlfind/findlib, an OCaml library manager. The easiest way to install both is using OPAM, an OCaml package manager, which has both packages---OPAM ocamlfind and OPAM sha. You can also build and/

FEATURES

ALTERNATIVES

A program to manage yara ruleset in a database with support for different databases and configuration options.

A Scriptable Android Debugger for reverse engineers and developers.

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

A tool for hacking and security testing of JWT

A simple Python script to test for a hypothetical JWT vulnerability

Studying Android malware behaviors through Information Flow monitoring techniques.

A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.

A command-line program for finding secrets and sensitive information in textual data and Git history.