Androguard 3.3.2 releases: Reverse engineering, Malware and goodware analysis of Android applications - TechnoExploit

Breaking

Post Top Ad

Post Top Ad

Sunday, January 27, 2019

Androguard 3.3.2 releases: Reverse engineering, Malware and goodware analysis of Android applications



Reverse engineering, Malware and goodware analysis of Android applications … and more (ninja !)

Features



Androguard is a full python tool to play with Android files.

  • DEX, ODEX
  • APK
  • Android’s binary xml
  • Android resources
  • Disassemble DEX/ODEX bytecodes
  • Decompiler for DEX/ODEX files.
Changelog v3.3.2

Some bugfixes and (re-)adding functions:


  • Added  is_valid() to AXMLPrinter and AXMLParser
  • allow packages in app name for example when parsing framework-res.apk
  • Adding functions to get interfaces, parent class and name on ClassAnalysis

Installation

git clone https://github.com/androguard/androguard.git
cd androguard
pip install .

Tool

androarsc

Usage: androarsc.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT filename input (APK or android resources(arsc)) -p PACKAGE, --package=PACKAGE select the package (optional) -l LOCALE, --locale=LOCALE select the locale (optional) -t TYPE, --type=TYPE select the type (string, interger, public, ...) -o OUTPUT, --output=OUTPUT filename output -v, --version version of the API

androauto

Usage: androauto.py [options] Options: -h, --help show this help message and exit -d DIRECTORY, --directory=DIRECTORY directory input -v, --verbose add debug



androaxml


Usage: androaxml.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT filename input (APK or android's binary xml) -o OUTPUT, --output=OUTPUT filename output of the xml -v, --version version of the API

androdd


Usage: androdd.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT file : use this filename -o OUTPUT, --output=OUTPUT base directory to output all files -d DECOMPILER, --decompiler=DECOMPILER choose a decompiler -j, --jar output jar file -f FORMAT, --format=FORMAT write the method in specific format (png, ...) -l LIMIT, --limit=LIMIT limit analysis to specific methods/classes by using a regexp

androdis



Usage: androdis.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT file : use this filename (DEX/ODEX) -o OFFSET, --offset=OFFSET offset to disassemble -s SIZE, --size=SIZE size

androgui


usage: androgui.py [-h] [-d] [-i INPUT_FILE] [-p INPUT_PLUGIN] Androguard GUI optional arguments: -h, --help show this help message and exit -d, --debug -i INPUT_FILE, --input_file INPUT_FILE -p INPUT_PLUGIN, --input_plugin INPUT_PLUGIN

androlyze



androlyze is a tool that spawns an IPython shell.

Copyright (C) 2012 – 2016, Anthony Desnos (desnos at t0t0.fr) All rights reserved.
Source: https://github.com/androguard/

No comments:

Post a Comment

Post Top Ad