soulqert.blogg.se

Dex online reverse directory
Dex online reverse directory










dex online reverse directory

Android-Disassemblerĭisassemble ANY files including android shared libraries (aka. ( Disclaimer: I 'm the developer) Version 1.4.2 release.

Dex online reverse directory apk#

You can also reverse-engineer APK files directly on an android device. Prepare for many long nights if you're unexperienced. so file to to get a disassembled file, if you don't want to install a gcc toolchain.īeware, though, in all of these cases, you need a thorough understanding of the ARM processor architecture, assembler language, JNI conventions, and compiler ABI to make any sense of the disassembly. There might be gcc toolchains for ARM targets that run on windows as well, but i never tried. If you have access to a linux system, get a gcc toolchain for ARM that includes objdump, and use objdump -disassemble to get a huge text file containing disassembled code.so for different hardware, and if it has a library for android on x86, you can use the free IDA 5.1 version to disassemble it. This is expensive, but by far the best tool to work with unknown object code. The demo versions will not do, as they can't disassemble ARM code. Buy the commercial version of IDA pro.

dex online reverse directory

And of course, if i want to hide how some part of my application works, writing that in C and compiling it to a. In some cases, there is existing C code and it's just easier for the programmer to build a JNI interface to call the library from java in other cases, the programmer wants the speed advantage that compiled C has over java. so file is a compiled library, in most cases from C or C++ source code.so stands for Shared Object, it doesn't have anything to do with obfusation, it just means someone wrote parts of the app in C.












Dex online reverse directory