Androguard : reverse engineering tool for Android applications

“Always Ready Always There”


Androguard is a great tool written in Python to analyse/reverse Android applications.

Developed by Anthony Desnos and Geoffroy Gueguen, Androguard is released under Apache License 2.0


Features

  • Map and manipulate DEX/ODEX/APK/AXML/ARSC format into full Python objects
  • Diassemble/Decompilation/Modification of DEX/ODEX/APK format
  • Decompilation with the first native (directly from dalvik bytecodes to java source codes) dalvik decompiler (DAD)
  • Access to the static analysis of the code (basic blocks, instructions, permissions and create your own static analysis tool
  • Analysis a bunch of android apps
  • Analysis with ipython/Sublime Text Editor
  • Measure the efficiency of obfuscators
  • Determine if your application has been pirated (plagiarism/similarities/rip-off indicator)
  • Detection of ad/open source libraries
  • Risk indicator of malicious application
  • Decompile Android’s binary xml
  • Integration with external decompilers (JAD+dex2jar/DED/fernflower/jd-gui…)

https://www.youtube.com/v/q4D9-1XJpsk


Download

https://github.com/androguard/androguard/releases

Comments