jebscripts
jebscripts copied to clipboard
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
JEB Android decompiler scripts
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
JEB Python scripts
-
HelloWorld.py
- Display message box.
-
ListingMethods.py
- Print all methods in dex.
-
InvokedMethods.py
- Get caret position and print invoked methods from it.
-
RenameObfuscatedClasses.py
- Rename obfuscated class names by using super class name.
-
AlertMarker.py
- Set(unset) alert marker to focused method.
-
getMethodSignatures.py
- Get method signatures from an APK and store them into a text file for parsing it later on. (Use the Java version)
-
getMethodsFromClass.py
- Get method from a class and print them out.
-
ASTRemoveDummySwitch.py
- Remove dummy switches
-
ObadDecrypt.py
- Decrypt Obad strings before performing unreflection
-
ObadUnreflect.py
- Replace reflection calls by direct method calls
-
fixObfousClass.py
-
Rename obfuscated class name with source name. (fr0zenrain)
Recover android dex's class name obfouscator by proguard with "-keepattributes SourceFile". Most app need save the crash log, so the do not clear source name,maybe some nest class can not fix.
-
JEB Java scripts
-
DeCluster.java
- Renaming obfuscated class/methods/fields names (@jcase)
-
DeClusterMod.java
- Renaming obfuscated class/methods/fields names with filter and string format added
-
DexGuardStringDecoder.java
- Decrypt DexGuard encrypted Strings (Anton Kosterin)
-
getMethodSignatures.java
- Get method signatures from an APK and store them into a text file for parsing it later on.
Extra Python scripts
-
grepDeobfuscationRoutines.py
- Filter possible obfuscator routines from a method signatures list (First use getMethodSignatures.java)
JEB Sample Scripts
Sample automation scripts for JEB(Android Interactive Decompiler).
Usage
Usage of JEB automation is here.
JEB API reference is here.