Here, a new Dalvik bytecode decompiler, GDA(this project started in 2013 and released its first version 1.0 in 2015 at www.gda.wiki:9090) , is proposed and implemented in C++ to provide more sophisticated, fast and convenient decompilation support. GDA is completely self-independent and very stable. It supports APK, DEX, ODEX, oat files, and run without installation and Java VM support.
GDA only takes up 2M of your disk space, and you can use it in any newly installed windows system and virtual machine system without additional configuration. In addition, GDA has more excellent features as follows:
Also Read – Application Inspector : A Source Code Analyzer Built For Surfacing Features Of Interest
shortcut | description |
---|---|
F5 | Switch java to smali, pressing it again for back to java |
F | Trace the args and return value by dataflow analysis |
X | Cross-referencing, locating callers (of strings, classes, methods, field, Smali, Java) |
Esc/<-/Backspace | Back to the last visit |
-> | Forward to the next visit |
G | Jump to somewhere by you inputting offset |
N | Rename the variable/method/class name |
S | Search for all the elements by the given string |
C | Comments. Only supports the Java code |
DoubleClick | The cursor’s placed at the method/str/field/class, and double-click to access objects |
M | the cursor’s placed at the Smali line and pressing the key ‘M’ to edit the instruction |
UP | Press ‘up’ key to access the up-method in the tree control |
Down | Press “down” key to access the down-method in the tree control |
D | Dump the binary data of methods, only supports the Smali window |
Enter | The modification of edit boxes take effect |
H | Show data in Hex |
Ctr+H | Pop searching history window |
Ctr+A | Select all |
Ctr+C | Copy |
Ctr+V | Paste, only for editable boxes |
Ctr+X | Cut |
Ctr+F | Find out the string of the current window |
Ctr+S | Save the modifications into the GDA database file |
Shows
File loading and decompiling:
MalScan, API search, x-ref…
Url,Xml,string x-ref…
variable trace
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…