Android Reverse Engineering tools Not the Usual Suspects
Image Description
Common Information
Type Value
UUID ea0e7918-4656-4467-b1c9-d1a25ddf04a6
Fingerprint 9bbcba6598ba032a8b1fefeba1d0dd236e34399d90d9f82f156b1ad27d9034ba
Analysis status DONE
Considered CTI value 0
Text language
Published Oct. 5, 2017, 11:36 a.m.
Added to db April 16, 2024, 7:53 p.m.
Last updated Aug. 31, 2024, 12:14 a.m.
Headline Android Reverse Engineering tools Not the Usual Suspects
Title Android Reverse Engineering tools Not the Usual Suspects
Detected Hints/Tags/Attributes 40/2/34
Attributes
Details Type #Events CTI Value
Details Domain 30
fortinet.com
Details Domain 4129
github.com
Details Domain 2
tools-linux.zip
Details Domain 15
dl.google.com
Details Domain 1
linux.zip
Details Domain 1
jeb2asynctask.py
Details Domain 2
jeb2javaastdecryptstrings.py
Details Domain 1
jeb2javaastdemo.py
Details Domain 4
www.pnfsoftware.com
Details Domain 2
codeinspect.sit.fraunhofer.de
Details Domain 8
r2pipe.open
Details Domain 5
file.py
Details Domain 1
ph0wn.org
Details Email 6
aapvrille@fortinet.com
Details File 2
tools-linux.zip
Details File 1
android_sdk_version-linux.zip
Details File 1
channel.txt
Details File 1
jeb2asynctask.py
Details File 2
jeb2javaastdecryptstrings.py
Details File 1
jeb2javaastdemo.py
Details File 8
self.tar
Details File 13
self.key
Details File 4
self.cs
Details File 1
mitmproxy-ca.cer
Details File 5
file.py
Details Github username 5
cryptax
Details Github username 2
pnfsoftware
Details Url 1
http://github.com/cryptax/androidre
Details Url 1
https://dl.google.com/android/repository/tools_
Details Url 1
https://github.com/pnfsoftware
Details Url 1
http://github.com/cryptax/misc-code
Details Url 1
https://www.pnfsoftware.com
Details Url 1
https://codeinspect.sit.fraunhofer.de
Details Url 1
https://ph0wn.org