○ Useful Site
Description : Androguard is mainly a tool written in python to play with :
* Dex/Odex (Dalvik virtual machine) (.dex) (disassemble, decompliation), * APK (Android application)
(.apk), *Android's binary xml (.xml), * Android Resources (.arsc). Androguard is avilable for
Linux/OSX/Windows (python powered).
Description : JPlag is a system that finds similarities among multiple sets of
source code files. This way it can detect software plagiarism. JPlag does not merely compare bytes of text, but is
aware of programming language syntax and program structure and hence is robust against many kinds of attempts to disguise
similarities between plagiarized files. JPlag currently supports Java, C#, C, C++,
Scheme and natural language text.
Description : Moss (for a Measure Of Software Similarity) is an automatic system for determining
the similarity of programs. To date, the main application of Moss has been in detecting plagiarism in programming classes.
Since its development in 1994, Moss has been very effective in this role.
The algorithm behind moss is a significant improvement over other cheating detection algorithm.
Frida (Dynamic Binary Instrumentation Framework) (https://www.frida.re/)
Description : It’s Greasemonkey for native apps, or, put in more technical terms,
macOS, GNU/Linux, iOS, Android, and QNX. Frida also provides you with some simple tools built on top of the Frida API.
These can be used as-is, tweaked to your needs, or serve as examples of how to use the API.
Description : PEDA - Python Exploit Development Assistance for GDB
Description : This tool takes x86 or x64 assembly instructions and converts them to their binary representation
(machine code). It can also go the other way, taking a hexadecimal string of machine code and transforming it into a human-readable
representation of the instructions. It uses GCC and objdump behind the scenes.
You can use this tool to learn how x86 instructions are encoded or to help with shellcode development.