- platform overview (owasp)
- apktool (reverse engineering apk files)
- androbugs framework (vulnerability scanner)
- enjarify (tools for working with dalvik)
Why not dex2jar? Dex2jar is an older tool that also tries to translate Dalvik to Java bytecode. It works reasonably well most of the time, but a lot of obscure features or edge cases will cause it to fail or even silently produce incorrect results. By contrast, Enjarify is designed to work in as many cases as possible, even for code where Dex2jar would fail. Among other things, Enjarify correctly handles unicode class names, constants used as multiple types, implicit casts, exception handlers jumping into normal control flow, classes that reference too many constants, very long methods, exception handlers after a catchall handler, and static initial values of the wrong type.
- dex2jar (tools for working with dalvik)
- qark
- drozer
- platform overview (owasp)
https://github.com/insidersec/insider