Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime.
Currently, the application supports only Android libapp.so. Also, the application currently works only against recent Dart versions.
This application uses the C++20 Formatting Library. It requires a very recent C++ compiler, such as g++ >=13 or Clang >=15.
I recommend using Linux OS (only tested on Deiban SD) because it is easy to setup.
apt install python3-pyelftools python3-requests git cmake ninja-build \
build-essential pkg-config libicu-dev libcapstone-dev
python scripts\init_env_win.py
brew install llvm@15 cmake ninja pkg-config icu4c capstone
pip3 install pyelftools requests
Extract “lib” directory from apk file
python3 blutter.py path/to/app/lib/arm64-v8a out_dir
The blutter.py file will automatically detect the Dart version from the flutter engine and call the executable of blutter to get the information from libapp.so.
If the Blutter executable for the required Dart version does not exist, the script will automatically checkout the Dart source code and compile it.
I use Visual Studio to develop Blutter on Windows. --vs-sln
Options can be used to generate a Visual Studio solution.
python blutter.py path\to\lib\arm64-v8a build\vs --vs-sln
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…