Skip to content
/ YADD Public

Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code structure visualization.

Notifications You must be signed in to change notification settings

ZSShen/YADD

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Build Status

Objective

YADD is designed to be a complex disassembler for static Android app analysis, which supports bytecode-level class and method signature extraction and offers an easy-to-use interface for reverse engineering.

As a reverse engineering toolkit, YADD should basically support:

  • Code block differentiation and control flow visualization.
  • Symbolic level def-use chain to highlight the data dependency between instructions.

Current Progress

YADD is now relying on the Dex file parsing and the instruction decoding algorithm provided by Android Open Source Project. It can now be built as a independent executable for Dex code disassembling and signature extraction. More features about control and data flow analysis will be updated in the near future.

Installation

Clone the project to your working directory.
In the working directory, type the following commands.

$ ./clean.py --rebuild
$ cd build
$ cmake ..
$ make

Done! And the executable should locate at: /PATH/TO/YOUR/WORKING/DIRECTORY/bin/dumper

Usage

Usage: dumper [options]
    Example: dumper --granularity=instruction --input=/PATH/TO/MY/DEX --output=PATH/TO/MY/LOG

  --granularity=(class|method|instruction): For data granularity
    class      : List class names only
    method     : List method signatures only
    instruction: Full dump

  --input=<classes.dex>: Specify the input dex pathname

  --output=<dump.txt>: Specify the output dump pathname

Contact

Any problems? please contact me via the mail: [email protected]

About

Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code structure visualization.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published