Skip to content

Instantly share code, notes, and snippets.

View pierreherbelin's full-sized avatar

Pierre HERBELIN pierreherbelin

View GitHub Profile
@pierreherbelin
pierreherbelin / android_reverse_tools.md
Last active May 20, 2020 08:11
Android reverse engineering tools

Apktool: Used for decompile and recompile an apk in order to modify it.

Dex2jar: Transform .dex file into a readable .jar file.

JADX: Read transformed .jar file.

Frida: Dynamic instrumentation toolkit (mostly use to inject javascritp code in the targeted app.This tool can be used not only on Android but also on on Mac, iOS, linux and Windows.

MobSF: Pentesting, malware and code analysis framework.

Keybase proof

I hereby claim:

  • I am pierreherbelin on github.
  • I am kraker (https://keybase.io/kraker) on keybase.
  • I have a public key ASC_-6MOHmPoXBhHd6A9XrOZtFni7yMK0WgH0A1WcnJiAAo

To claim this, I am signing this object: