Displaying 1 to 20 from 21 results

Apktool - A tool for reverse engineering Android apk files

This is the repository for Apktool. If you are looking for the Apktool website. Click here. It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.

Eclipse Model Development Tools

The Model Development Tools (MDT) project provide exemplary tools for developing models based on those metamodels. It supports creating UML diagram, Reverse engineer UML diagram from code, and lot more.

ArgoUML - UML modeling tool

ArgoUML is the leading open source UML modeling tool and includes support for all standard UML 1.4 diagrams. It supports Class diagram, Statechart diagram, Activity diagram, Use Case diagram, Collaboration diagram, Deployment diagram and Sequence diagram. The diagram could be exported to GIF, PNG, PS, EPS, PGML and SVG. It generates code for Java, C++, C# and PHP. It also supports reverse engineering, generates code from diagram.

simplify - Generic Android Deobfuscator

Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what the specific type of obfuscation is used. The code on the left is a decompilation of an obfuscated app, and the code on the right has been deobfuscated.

whatsapp-web-reveng - Reverse engineering WhatsApp Web.

This project intends to provide a complete description and re-implementation of the WhatsApp Web API, which will eventually lead to a custom client. WhatsApp Web internally works using WebSockets; this project does as well. Before starting the application for the first time, run npm install -f to install all Node and pip install -r requirements.txt for all Python dependencies.

UMLGraph - Automated Drawing of UML Diagrams

UMLGraph allows the declarative specification and drawing of UML class and sequence diagrams. The current features are part of an ongoing effort aiming to provide support for all types UML diagrams. Running the UmlGraph doclet on the specification will generate a Graphviz diagram specification that can be automatically processed to create Postscript, GIF, SVG, JPEG, fig, or Framemaker drawings.

Green - Create UML diagram from code

green is a LIVE round-tripping editor, meaning that it supports both software engineering and reverse engineering. You can use green to create a UML class diagram from code, or to generate code by drawing a class diagram. green supports exporting files to both jpg and gif format, so that you can share you diagrams without any issues!

ModelGoon - UML for Java

ModelGoon provides support to create UML diagram from Java source. It provides support to build packages dependencies diagram, Class Diagram from existing sources, Build Sequence Diagram from a Java method, Shows the dependencies between user selected packages and lot more. ModelGoon is not a UML modeler, but just an UML point of view above the Java source code. It still uses UMLet for drawing purpose and the Eclipse Modeling Tools for implementing full MDA platforms.

XprobePlugin - Live Memory Browser for Apps & Xcode

In the simulator, the memory sweeper is loaded from a bundle inside the plugin using lldb requiring no changes to the app's project source. To use the plugin, build this project and restart Xcode. Once your application is running, use menu item "Product/Xprobe/Load" to load the initial view of the memory sweep of your app. If you are a plugin developer you use "Product/Xprobe/Xcode" to inspect the objects of the Xcode application itself. You can then filter the objects listed into the app or their methods using a pattern. If there are no objects matching the pattern and it is a class name it will be displayed. Patterns prefixed with '+' or '-' will search all classes linked into the application for methods matching the pattern. A raw pointer prefixed with "0x" can be entered to inspect an object passed as an argument to a trace. You can also enter an object "path" starting "seed." from the paths logged as you browse your application so you can find your way back to objects easily.

JRemapper - A remapping tool for compiled java programs.

An easy to use GUI for remapping classes, methods, and fields of compiled java programs.For information on how to use JRemapper and other details about it, check out the wiki.

CircuitBreaker - Nintendo Switch hacking toolkit

This is Circuit Breaker, a Nintendo Switch hacking toolkit. It is heavily based upon the PegaSwitch toolkit and the ReSwitched team deserves a huge amount of credit for their work, without which this project would be impossible. Make sure you have all the ruby gems installed. Installing ruby and bundler are outside of the scope of this document.

idajava - Java integration for Hex-Rays IDA Pro

IdaJava is a plugin for IDA Pro that allows to write IDA plugins in Java. In other words: IdaJava is to Java like IDAPython is to Python... The plugin creates an in-process Java VM and looks for JAR files in IDA's plugins directory. Each Java based plugin gets their own menu item in Edit|Plugins. NOTE (2017): This is old code that will likely no longer work. It's mainly here for reference. I don't plan on making further changes.

vstools - Toolset for Vagrant Story (2000, Square), written in JavaScript with Three.js

Runs in browsers supporting WebGL, like Chrome or Firefox. The viewer opens individual files obtained from a CD image which have to be extracted first from your copy of Vagrant Story. This code is developed for the US Version of Vagrant Story but should work with any.

Bytecode-Modification-Framework - A bytecode modification library

BMF is an alternative JVM bytecode modification framework that (if desired) will hide nothing about the class structure behind abstraction (But in the future abstraction will certainly be an option). Renaming classes and their members is designed currently to function given a jar file.

frida-scripts - A collection of my Frida

A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.

apkfile - Android app analysis and feature extraction library

ApkFile is a library which creates a representation of an APK composed of Java objects which can be easily inspected for analysis or serialized into JSON. The goal of the library is to provide a robust way to inspect hostile malware samples, but it's general purpose enough to be used for other stuff too. This library and APKiD provide the machine learning feature extraction for Judge, an Android malware detection engine.