Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked GDA-android-reversing-Tool v3.78 - decompiler written entirely in c++


itsMe

Recommended Posts

This is the hidden content, please

GDA(GJoy Dex Analysizer)

Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me…

New features:
1.Brand new dalvik decompiler in c++ with friendly GUI;
2.Support python script
3.packers Recognition;
4.Multi-DEX supporting;
5.making and loading signature of the method
6.Malicious Behavior Scanning by API chains;
7.taint analysis to preview the behavior of variables;
8.taint analysis to trace the path of variables;
9.de-obfuscate;
10.API view with x-ref;
11.Association of permissions with modules;

Changelog v3.78

    A lot of bugs fixed, GDAE Professional Edition was released.
    Provide the option of method Merge mode and separation mode.
    Fix the problem that the memory module cannot be dump in 64-bit system.
    Implement the vulnerability detection based on rule expression.
    Fix the aspect ratio of the window .
    Change and optimize color management to support various topics.
    Optimize the GUI, adjust the internal layout of some windows, and repair some GUI problems, making the operation more comfortable.
    Add the search function (Ctrl + F) to the dump device.
    Merge the multi Dex in the tree box.
    The default combination mode on the class display can be switched to separate mode by right-clicking.
    Add line number, module tag, and jump tag (under SmalI). Right-click to switch.
    Strengthen the structured algorithm to make the code more readable.
    De-duplicate the results of malscan.
    Adapt to the widescreen.
    Add basic information to view.

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.