Android逆向分析常用方法
一、Android的反混淆工具2
二、一键反编译apk/aar/dex/jar3
(1)、Windows环境配置使用TTDeDroid3
(2)、Ubuntu环境配置使用TTDeDroid4
三、Apk脱壳后合并多个dex并使用jadx/JEB/JEB3分析合并后的Apk4
四、常用的Android逆向分析工具
一、Android的反混淆工具
git clone --recursive https://github.com/CalebFenton/simplify.git
git submodule update --init --recursive
./gradlew fatjar
gradlew.bat fatjar
java -jar simplify/build/libs/simplify-1.2.1.jar -h
java -jar simplify/build/libs/simplify.jar -it 'org/cf/obfuscated' -et 'MainActivity' simplify/obfuscated-app.apk
java -jar simplify/build/libs/simplify-1.2.1.jar -it 'org/cf' G:\workspace\simplify\simplify\src\test\resources\obfuscated-example -o g:\example.dex
二、一键反编译 apk/aar/dex/jar
git clone https://github.com/tp7309/TTDeDroid.git
(1)、Windows环境配置使用TTDeDroid
把H:\SecurityAnalysis\TTDeDroid\bin添加到环境变量,如图所示:
(2)、Ubuntu环境配置使用TTDeDroid
把export PATH=$PATH:/home/gyp/gyp/SecurityAnalysis/TTDeDroid/bin添加到~/.bashrc中,如图所示:
vim ~/.bashrc
source ~/.bashrc
chmod a+x /home/gyp/gyp/SecurityAnalysis/TTDeDroid/bin/showjar
showjar test.apk
三、Apk脱壳后合并多个dex并使用jadx/JEB/JEB3分析合并后的Apk
https://github.com/Simp1er/AndroidSec.git
python3 dex2apk.py -a ****.apk -i dex_unpack/ -o ****-output.apk
四、常用的Android逆向分析工具
apktool
https://bitbucket.org/iBotPeaches/apktool/downloads/
XJad
https://www.lanzous.com/i2vvdvi
Smali2JavaUI
https://forum.xda-developers.com/showthread.php?t=2430413
jadx
https://github.com/skylot/jadx/releases
JEB
https://www.pnfsoftware.com/
JEB3
https://www.pnfsoftware.com/blog/jeb3-alpha-is-available/
https://www.pnfsoftware.com/blog/category/jeb3/
GDA
http://www.gda.wiki:9090/
IDA
https://www.hex-rays.com/products/ida/news/
https://www.hex-rays.com/products/ida/
https://ida2020.org/
欢迎各位关注公众号