Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime.
Currently, the application supports only Android libapp.so. Also, the application currently works only against recent Dart versions.
This application uses the C++20 Formatting Library. It requires a very recent C++ compiler, such as g++ >=13 or Clang >=15.
I recommend using Linux OS (only tested on Deiban SD) because it is easy to setup.
apt install python3-pyelftools python3-requests git cmake ninja-build \
build-essential pkg-config libicu-dev libcapstone-dev
python scripts\init_env_win.py
brew install llvm@15 cmake ninja pkg-config icu4c capstone
pip3 install pyelftools requests
Extract “lib” directory from apk file
python3 blutter.py path/to/app/lib/arm64-v8a out_dir
The blutter.py file will automatically detect the Dart version from the flutter engine and call the executable of blutter to get the information from libapp.so.
If the Blutter executable for the required Dart version does not exist, the script will automatically checkout the Dart source code and compile it.
I use Visual Studio to develop Blutter on Windows. --vs-sln
Options can be used to generate a Visual Studio solution.
python blutter.py path\to\lib\arm64-v8a build\vs --vs-sln
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…