mirror of
https://github.com/Z4nzu/hackingtool
synced 2024-11-15 04:05:29 +00:00
57 lines
1.7 KiB
Python
57 lines
1.7 KiB
Python
|
# coding=utf-8
|
||
|
import subprocess
|
||
|
|
||
|
from core import HackingTool
|
||
|
from core import HackingToolsCollection
|
||
|
|
||
|
|
||
|
class AndroGuard(HackingTool):
|
||
|
TITLE = "Androguard"
|
||
|
DESCRIPTION = "Androguard is a Reverse engineering, Malware and goodware " \
|
||
|
"analysis of Android applications and more"
|
||
|
INSTALL_COMMANDS = ["sudo pip install -U androguard"]
|
||
|
PROJECT_URL = "https://github.com/androguard/androguard "
|
||
|
|
||
|
def __init__(self):
|
||
|
super(AndroGuard, self).__init__(runnable = False)
|
||
|
|
||
|
|
||
|
class Apk2Gold(HackingTool):
|
||
|
TITLE = "Apk2Gold"
|
||
|
DESCRIPTION = "Apk2Gold is a CLI tool for decompiling Android apps to Java"
|
||
|
INSTALL_COMMANDS = [
|
||
|
"sudo git clone https://github.com/lxdvs/apk2gold.git",
|
||
|
"cd apk2gold;sudo bash make.sh"
|
||
|
]
|
||
|
PROJECT_URL = "https://github.com/lxdvs/apk2gold "
|
||
|
|
||
|
def run(self):
|
||
|
uinput = input("Enter (.apk) File >> ")
|
||
|
subprocess.run(["sudo", "apk2gold", uinput])
|
||
|
|
||
|
|
||
|
class Jadx(HackingTool):
|
||
|
TITLE = "JadX"
|
||
|
DESCRIPTION = "Jadx is Dex to Java decompiler.\n" \
|
||
|
"[*] decompile Dalvik bytecode to java classes from APK, dex," \
|
||
|
" aar and zip files\n" \
|
||
|
"[*] decode AndroidManifest.xml and other resources from " \
|
||
|
"resources.arsc"
|
||
|
INSTALL_COMMANDS = [
|
||
|
"sudo git clone https://github.com/skylot/jadx.git",
|
||
|
"cd jadx;./gradlew dist"
|
||
|
]
|
||
|
PROJECT_URL = "https://github.com/skylot/jadx"
|
||
|
|
||
|
def __init__(self):
|
||
|
super(Jadx, self).__init__(runnable = False)
|
||
|
|
||
|
|
||
|
class ReverseEngineeringTools(HackingToolsCollection):
|
||
|
TITLE = "Reverse engineering tools"
|
||
|
TOOLS = [
|
||
|
AndroGuard(),
|
||
|
Apk2Gold(),
|
||
|
Jadx()
|
||
|
]
|