Androguard: Reverse engineering and pentesting for Android applications
Androguard
Androguard is a full Python tool to play with Android files. It is designed to work with Python 3 only.
Features
Androguard is a full Python tool to play with Android files.
- DEX, ODEX
- APK
- Android’s binary xml
- Android resources
- Disassemble DEX/ODEX bytecodes
- Basic Decompiler for DEX/ODEX files
- Frida support for easy dynamic analysis
- SQLite database to save the session
Tools
-
- androguard – The swiss army knife: the new tool, which combines all the other tools into a single command line interface application.
- androguard analyze – Androguard Shell: a tool that spawns an IPython shell
- androguard cg – Create Call Graph from APK: create files that can be read using graph visualization software, for example gephi.
- androguard gui – Androguard GUI
- androguard sign – Print Certificate Fingerprints: Get the fingerprints of the signing certificates inside an APK.
- androguard axml – AndroidManifest.xml parser: Parse the AndroidManifest.xml from an APK and show/save the XML file.
- androguard arsc – resources.arsc parser: Parse the resources.arsc file from an APK and print human readable XML
- androguard decompile – Decompile APKs and create CFG: a tool to create a decompiled version of an APK using the available decompilers
- androguard dissassemble – Disassembler for DEX: a disassembler for DEX files.
Install & Use
Copyright (C) 2012 – 2024, Anthony Desnos (desnos at t0t0.fr) All rights reserved.