Hmily 发表于 2011-11-9 15:04

Android Reverse Engineering (A.R.E.)

Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.

Tools currently found on A.R.E. are:
Androguard
Android sdk/ndk
APKInspector
Apktool
Axmlprinter
Ded
Dex2jar
DroidBox
Jad
Smali/Baksmali
Download Link:

http://www.honeynet.org/downloads/Android.tar.gz

Note: You must extract the virtual machine...

tar xvzf Android.tar.gz
...and load it with VirtualBox by adding a new virtual machine.

Ted.

快雪时晴 发表于 2011-11-9 15:38

标记下
安卓 Android 逆向 破解

sfqspclz77 发表于 2011-11-9 16:22

请介绍下作何用?

lei27028 发表于 2011-11-9 20:18

一个汉字都不用 我一句没看懂

Alar30 发表于 2011-11-10 15:19

安卓系统逆向的吧
最近很火哦

White 发表于 2011-11-11 13:08

嗯 标记下呢

lxj520dyn 发表于 2011-11-12 13:34

对不起。。。老师。。我真的一个字都没看懂
页: [1]
查看完整版本: Android Reverse Engineering (A.R.E.)