Android Reverse Engineering

Visit the front pageVisit your profilePublish a blog post

The release of Android Reverse Engineering (A.R.E.) Virtual Machine is announced by volunteer organization The Honeynet Project.

The Honeynet Project engages broader security community via Google Summer of Code (GSoC) and other efforts to expand security tool development, volunteers collaborate on security research efforts covering data analysis approaches, unique security tool development and gathering data about attackers and malicious software they use .
Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine is here to help. A.R.E. combines the latest Android malware analysis tools.
Tools on A.R.E.
  • Androguard
  • Android sdk/ndk
  • APKInspector
  • Apktool
  • Axmlprinter
  • Ded
  • Dex2jar
  • DroidBox
  • Jad
  • Smali/Baksmali
 download A.R.E. for free: http://redmine.honeynet.org/projects/are/wiki.

Published by:

siavash's picture

Name
siavash

Country
NL