Questions tagged [androguard]

Androguard is mainly a reverse engineering tool written in python to play with : Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation), APK (Android application) (.apk), Android's binary xml (.xml), Android Resources (.arsc). Androguard is available for Linux/OSX/Windows (python powered).

Androguard is mainly a tool written in python to play with :

Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompilation),
APK (Android application) (.apk),
Android's binary xml (.xml),
Android Resources (.arsc). 

Androguard is available for Linux/OSX/Windows (python powered).

More Details

33 questions
0
votes
1 answer

How to track a local variable by Androguard

I want to track all the Intent objects, but I cannot find the API. I want to know where a component start another in an application.Also, I want to know how does it happen, like if the Intent is a explicit Intent or if it has a Data. For example, a…
Q.YI
  • 1
  • 3
-1
votes
1 answer

How to decompile a sequence of bytes from dex file using androgurad (or any other python tool)?

I have a sequence of bytes extracted from dex file, and I want to decompile it using androguard or any other python package My sequence looks like: b'\x17\x8a\\\x05{\x00p\x00\x00\x00xV4\x12\x00\x00\x00\x00\x00\x00\x00\x00\x80\x04'
Lukas
  • 403
  • 5
  • 11
-1
votes
1 answer

Androguard - huge APK analysis resulting in error `MemoryError`

I've been trying to use Androguard to analyze an APK file. My code is quite simple: from androguard import misc from androguard import session APK_TO_ANALYZE_PATH = r"file.apk" a, d, dx = misc.AnalyzeAPK(APK_TO_ANALYZE_PATH) print(" [*]…
0xAK
  • 230
  • 2
  • 15
1 2
3