MARA is a Mobile Application Reverse engineering and Analysis Framework.

(515 views)

MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in testing mobile applications against the OWASP mobile security threats. Its objective is to make this task easier and friendlier to mobile application developers and security professionals. MARA is developed and maintained by @xtian_kisutsa and @iamckn. It is in its very early stages of development and there is a lot more to come, in line with our roadmap. Any contributions and suggestions to the tool will be highly appreciated. Features supported APK Reverse Engineering Disassembling Dalvik bytecode to smali bytecode via baksmali and apktool Disassembling Dalvik bytecode to java bytecode via enjarify Decompiling APK to Java source code via jadx APK Deobfuscation APK deobfuscation via [apk-deguard.com] (https://www.apk-deguard.com/) APK Analysis Parsing smali files for analysis via smalisca Dump apk assets, libraries, and resources....

June 19, 2020
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.