Reverse engineering and pentesting for Android applications
-
Updated
Dec 7, 2025 - Python
Reverse engineering and pentesting for Android applications
Android virtual machine and deobfuscator
DCC (Dex-to-C Compiler) is method-based aot compiler that can translate DEX code to C code.
Android Reverse-Engineering Workbench for VS Code
💉 ReVanced Patcher used to patch Android applications
The OpenSource Disassembler
🏆Explore Android performance optimization in depth(continuous updating ...)
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Droidefense: Advance Android Malware Analysis Framework
The Redexer binary instrumentation framework for Dalvik bytecode
A Program Analysis Toolkit for Android
Android reverse-engineering tool / smali editor
Run arbitrary code by patching OAT files
Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.
Add a description, image, and links to the dalvik topic page so that developers can more easily learn about it.
To associate your repository with the dalvik topic, visit your repo's landing page and select "manage topics."