CodeInspect says “Hello World”: A new Reverse-Engineering Tool for Android and Java Bytecode
Posted on 2014/12/26 by Siegfried Rasthofer
We are very happy to announce a new tool in our toolchain: CodeInspect - A Jimple-based Reverse-Engineering framework for Android and Java applications.
Developing an Android application in an IDE is very convenient since features like code completion, “Open Declaration“, renaming variables, searching files etc. help the developer a lot. Especially code-debugging is a very important feature in IDEs. Usually, all those features are available for the source code and not for the bytecode, since they support the developer not a reverse-engineer. Well, but all those features would be be also very helpful for reverse-engineering Android or Java applications. This is the reason why we came up with a new reverse-engineering framework that works on the intermediate representation Jimple and supports all the features above and a lot more. In the following we give a detailed description about CodeInspect and its features.
CodeInspect supports as input format a complete Android Application Package (apk), just the Android bytecode (dex-file) or a jar-file. In the following we will describe the different features based on a malicious Android apk.
大体意思就是 反编译后直接就可以变成java字节码 不用再看坑爹的smali了
http://sseblog.ec-spride.de/2014/12/codeinspect/
https://github.com/Sable/soot
|
|