- platform overview (owasp)
- apktool (reverse engineering apk files)
- androbugs framework (vulnerability scanner)
- enjarify (tools for working with dalvik)
Why not dex2jar? Dex2jar is an older tool that also tries to translate Dalvik to Java bytecode. It works reasonably well most of the time, but a lot of obscure features or edge cases will cause it to fail or even silently produce incorrect results. By contrast, Enjarify is designed to work in as many cases as possible, even fo
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def cg_add(leftindex, rightindex): | |
global tempcount | |
### check for and free temporary variables | |
if symbol[leftindex].startswith('.t'): | |
tempcount -= 1 | |
if symbol[rightindex].startswith('.t'): | |
tempcount -= 1 | |
### check for constants |