Key Details of Disassembler

  • Android-Disassembler - Analyze your malicious app on your phone...
  • Last updated on
  • There have been 4 updates
  • Also available on
  • Virus scan status:

    Clean (it's extremely likely that this software program is clean)


Enlarged image for Disassembler
Disassembler 0/4

Developer's Description

Android-Disassembler - Analyze your malicious app on your phone...

Android-Disassembler - Analyze your malicious app on your phone

Disassemble ANY files including android shared libraries (aka .so files) (NDK, JNI), windows PE files(EXE, DLLs, SYSs, etc..), linux executables, object files, ANY files you want like pictures, audios, etc(for fun) entirely on Android. Capstone-based disassembler application on android.

** Latest pre-release is available here: https://github.com/KYHSGeekCode/Android-Disassembler/releases

Version 1.5.0 release!

What's new : Search for strings, data analysis, online help

Features

Shows details of elf files.

Shows symbol table(functions or objects' ,... names) of elf files.

Disassembles the code sections.

Has various export options of the disassembly. (Reloadable raw file, compilable txt file, analytic text files, json, and reloadable database)

Supports projects.

Supports directly launching from file browsers.

Supports many ABIs(arm,x86,x64,MIPS,PowerPC,...)

Jump to address by symbols' names, or a hex address.

Syntax colorizing.

Support PE and other bin formats.

Sort symbols if needed.

No need to press Disassemble button!

Colorize PUSH/POP instructions.

Colorize ARM arch instructions better.

Added Follow Jump menu for jump instructions.(With BackStack)

Can override auto parse setup

You can copy an instruction to the clipboard.

It now parses IAT, EAT of PE headers.

You can now choose the columns to view.

Supports analyzing system files(which are not accessible without root permission) for rooted phones.

Friendlier message for non-parsable files.

The storage chooser now retains the session, so that it remembers the last browsed folder.

Choose binary from installed apks

Analyze bytes to determine if the binary is encrypted

Search for strings in the binary within a given length range

Good themes usually help you recognize some important instructions easily.

Usuage

1. Choose a file to analyze.

2. To change chooser, go to settings and change.

Theme management -> Invalid!! Now it is automated!

You can download the theme.zip from https://github.com/KYHSGeekCode/Android-Disassembler/releases/download/v1.4.1/themes.zip

Unzip it to /storage/emulated/0/themes/ or /sdcard/themes/.

Done. You can now use this in settings menu(in app)

To rename/remove themes, just rename/remove the files.

Feature requests are welcomed!

This app used

Capstone

Storage-Chooser

Colorpickerview

Java-binutils

PECOFF4J.

Root File Chooser

TODO

Show prototypes of NDK/C standard APIs in the symbols tab.

More sophisticated colorizing

Generate more useful comments

Provide assembly tutorials.

Add pseudo-virtual machine to help debugging.

Allow users to analyze active processes.

Add arrow beside the disassembly.

Row selection

Better support for thumb assemblies

Support .NET assemblies

Add compatibility for OllyDbg's .udd/.bak files

Add compatibility for IDA's produce files.

Add more utilities.

For more information, please visit https://github.com/KYHSGeekCode/Android-Disassembler



Explore More


Full Specifications

GENERAL
Release
Latest update
Version
2.1.4
OPERATING SYSTEMS
Platform
Android
Operating System
Android 13.0
POPULARITY
Total Downloads
3
Downloads Last Week
1

Report Software

Related Software