![]() ![]() The storage chooser now retains the session, so that it remembers the last browsed folder. Friendlier message for non-parsable files. Supports analyzing system files(which are not accessible without root permission) for rooted phones. Added Follow Jump menu for jump instructions.(With BackStack) Can override auto parse setup You can copy an instruction to the clipboard. No need to press Disassemble button! Colorize PUSH/POP instructions. Supports many ABIs(arm,x86,圆4,MIPS,PowerPC.) Jump to address by symbols' names, or a hex address. Supports directly launching from file browsers. (Reloadable raw file, compilable txt file, analytic text files, json, and reloadable database) Supports projects. Has various export options of the disassembly. Shows symbol table(functions or objects'. Capstone-based disassembler application on android.** Latest pre-release is available here: 1.5.0 release!What's new : Search for strings, data analysis, online helpFeatures Shows details of elf files. so files) (NDK, JNI), windows PE files(EXE, DLLs, SYSs, etc.), linux executables, object files, ANY files you want like pictures, audios, etc(for fun) entirely on Android. Android-Disassembler - Analyze your malicious app on your phoneDisassemble ANY files including android shared libraries (aka.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |