GDA-android-reversing-Tool v4.04 releases: decompiler written entirely in c++
GDA(GJoy Dex Analysizer)
Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb, and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the conversion of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me…
Here, a new decompiler based on Dalvik bytecode, GDA（this project started in 2013 and released its first version 1.0 in 2015 at www.gda.com: 9090), is proposed and implemented in C++ language to provide more sophisticated, fast, and convenient decompilation support. GDA is completely self-independent. It supports APK, DEX, ODEX, oat files, and run without installation and Java VM support. GDA only takes up 2M of your disk space, and you can use it in any newly installed windows system and virtual machine system. In addition, GDA has more features as follows:
1.cross-references for strings, classes, methods and fields;
2.searching for strings, classes methods and fields;
3.comments for java code;
4.rename for methods,fields and classes;
5.save the analysis results in gda db file.
Utilities for Assisted Analysis:
1.extracting DEX from ODEX;
2.extracting DEX from OAT;
5.device memory dump;
1.Brand new dalvik decompiler in c++ with friendly GUI;
2.Support python script
5.making and loading signature of the method
6.Malicious Behavior Scanning by API chains;
7.taint analysis to preview the behavior of variables;
8.taint analysis to trace the path of variables;
10.API view with x-ref;
11.Association of permissions with modules;
- Optimize the taint propagation analysis engine, the analysis speed has been improved, and the stuck problem has been fixed.
- Fix the error that privacy-leaking cannot be output on the tree.
- Fixed the problem that could not display the colorful header.
- Fixed the jamming problem caused by the introduction of new features in version 4.03.
- Updated vulnerability scanning rules.
- Improve the toolbar and menu bar icons, and adjust the display of analysis results.
- Fix the problem caused by the invalid ‘– no-pause’ parameter in the higher version of Frida. #110
- Fix the de-obfuscation bug. #117
- Add the
attach by pidto the Frida hook. #116
- Improve the dex checker. #114 #115
Copyright  [charles2gan/gjden/GANJIE]