A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
-
Updated
Feb 7, 2016 - Java
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Version control game state in Kerbal Space Program.
WebService-EJB example inside a structure ear/web/api/ejbimpl/bl/deps/wsclient
A very minimalist smali emulator that could be used to "decrypt" obfuscated strings
Android Security Resources.
Python 3 bridge to the JEB reverse engineering tool's Python environment
Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.
Reverse engineer: Download effects and extract all arfx links from Instagram on Android
Plugins for reversing android apps in JEB
Create customized callgraph directly from your favorite IDE
Add a description, image, and links to the jeb topic page so that developers can more easily learn about it.
To associate your repository with the jeb topic, visit your repo's landing page and select "manage topics."