{"id":4231,"date":"2016-11-19T13:39:54","date_gmt":"2016-11-19T05:39:54","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4231"},"modified":"2016-11-19T13:40:05","modified_gmt":"2016-11-19T05:40:05","slug":"androguard-reverse-engineering-malware-analysis-for-android","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/11\/androguard-reverse-engineering-malware-analysis-for-android\/","title":{"rendered":"Androguard – Reverse Engineering & Malware Analysis For Android"},"content":{"rendered":"

Androguard is a toolkit built in Python which provides reverse engineering and malware analysis for Android.<\/p>\n

\"Androguard<\/p>\n

It’s buyilt to examine * Dex\/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation), * APK (Android application) (.apk), * Android’s binary xml (.xml) and * Android Resources (.arsc).<\/p>\n

Androguard is available for Linux\/OSX\/Windows (Python powered).<\/p>\n

Features<\/h3>\n