Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/reverse_engineering.py
1269 views
1
# coding=utf-8
2
import subprocess
3
4
from core import HackingTool
5
from core import HackingToolsCollection
6
7
8
class AndroGuard(HackingTool):
9
TITLE = "Androguard"
10
DESCRIPTION = "Androguard is a Reverse engineering, Malware and goodware " \
11
"analysis of Android applications and more"
12
INSTALL_COMMANDS = ["sudo pip3 install -U androguard"]
13
PROJECT_URL = "https://github.com/androguard/androguard "
14
15
def __init__(self):
16
super(AndroGuard, self).__init__(runnable = False)
17
18
19
class Apk2Gold(HackingTool):
20
TITLE = "Apk2Gold"
21
DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java"
22
INSTALL_COMMANDS = [
23
"sudo git clone https://github.com/lxdvs/apk2gold.git",
24
"cd apk2gold;sudo bash make.sh"
25
]
26
PROJECT_URL = "https://github.com/lxdvs/apk2gold "
27
28
def run(self):
29
uinput = input("Enter (.apk) File >> ")
30
subprocess.run(["sudo", "apk2gold", uinput])
31
32
33
class Jadx(HackingTool):
34
TITLE = "JadX"
35
DESCRIPTION = "Jadx is Dex to Java decompiler.\n" \
36
"[*] decompile Dalvik bytecode to java classes from APK, dex," \
37
" aar and zip files\n" \
38
"[*] decode AndroidManifest.xml and other resources from " \
39
"resources.arsc"
40
INSTALL_COMMANDS = [
41
"sudo git clone https://github.com/skylot/jadx.git",
42
"cd jadx;./gradlew dist"
43
]
44
PROJECT_URL = "https://github.com/skylot/jadx"
45
46
def __init__(self):
47
super(Jadx, self).__init__(runnable = False)
48
49
50
class ReverseEngineeringTools(HackingToolsCollection):
51
TITLE = "Reverse engineering tools"
52
TOOLS = [
53
AndroGuard(),
54
Apk2Gold(),
55
Jadx()
56
]
57
58