Are you interested in Dalvik virtual machine and/or DEX bytecode? As you may know, Android application is eventually compiled into DEX bytecodes running on Dalvik virtual machine.
Here are several interesting starting points you must know particularly if you like to hack Android applications.
Here are several interesting starting points you must know particularly if you like to hack Android applications.
- Dalvik virtual machine
- DEX bytecode
- DEX assembler/disassembler (Smali/Baksmali)
- DEX bytecode examples (Java/Java bytecode/Dex bytecode)
- http://lazyswamp.blogspot.kr/2013/08/this-is-post-to-help-to-understand-how.html
- http://lazyswamp.blogspot.kr/2013/08/java-java-bytecode-and-dalvik-bytecode-2.html
- DEX Info
- dexdump (included in Android SDK)
- dedexer http://dedexer.sourceforge.net/
- Tools
- DEX bytecode => Java bytecode
- undx : http://sourceforge.net/projects/undx/
- dex2jar : http://code.google.com/p/dex2jar/
- Java bytecode => DEX bytecode
- dx : http://developer.android.com/guide/developing/building/index.html#detailed-build
- (Included in Android SDK)
- Java bytecode => Java
- jd-gui : http://jd.benow.ca/
No comments:
Post a Comment