Our website uses necessary cookies to enable basic functions and optional cookies to help us to enhance your user experience. Learn more about our cookie policy by clicking "Learn More".
Accept All Only Necessary Cookies
Disassembler icon

2.1.4 by KYHSGeekCode


Apr 29, 2021

About Disassembler

Software reverse engineering toolkit in your pocket!

Android-Disassembler - Analyze your malicious app on your phone

Disassemble ANY files including android shared libraries (aka .so files) (NDK, JNI), windows PE files(EXE, DLLs, SYSs, etc..), linux executables, object files, ANY files you want like pictures, audios, etc(for fun) entirely on Android. Capstone-based disassembler application on android.

** Latest pre-release is available here: https://github.com/KYHSGeekCode/Android-Disassembler/releases

Version 1.5.0 release!

What's new : Search for strings, data analysis, online help

Features

Shows details of elf files.

Shows symbol table(functions or objects' ,... names) of elf files.

Disassembles the code sections.

Has various export options of the disassembly. (Reloadable raw file, compilable txt file, analytic text files, json, and reloadable database)

Supports projects.

Supports directly launching from file browsers.

Supports many ABIs(arm,x86,x64,MIPS,PowerPC,...)

Jump to address by symbols' names, or a hex address.

Syntax colorizing.

Support PE and other bin formats.

Sort symbols if needed.

No need to press Disassemble button!

Colorize PUSH/POP instructions.

Colorize ARM arch instructions better.

Added Follow Jump menu for jump instructions.(With BackStack)

Can override auto parse setup

You can copy an instruction to the clipboard.

It now parses IAT, EAT of PE headers.

You can now choose the columns to view.

Supports analyzing system files(which are not accessible without root permission) for rooted phones.

Friendlier message for non-parsable files.

The storage chooser now retains the session, so that it remembers the last browsed folder.

Choose binary from installed apks

Analyze bytes to determine if the binary is encrypted

Search for strings in the binary within a given length range

Good themes usually help you recognize some important instructions easily.

Usuage

1. Choose a file to analyze.

2. To change chooser, go to settings and change.

Theme management -> Invalid!! Now it is automated!

You can download the theme.zip from https://github.com/KYHSGeekCode/Android-Disassembler/releases/download/v1.4.1/themes.zip

Unzip it to /storage/emulated/0/themes/ or /sdcard/themes/.

Done. You can now use this in settings menu(in app)

To rename/remove themes, just rename/remove the files.

Feature requests are welcomed!

This app used

Capstone

Storage-Chooser

Colorpickerview

Java-binutils

PECOFF4J.

Root File Chooser

TODO

Show prototypes of NDK/C standard APIs in the symbols tab.

More sophisticated colorizing

Generate more useful comments

Provide assembly tutorials.

Add pseudo-virtual machine to help debugging.

Allow users to analyze active processes.

Add arrow beside the disassembly.

Row selection

Better support for thumb assemblies

Support .NET assemblies

Add compatibility for OllyDbg's .udd/.bak files

Add compatibility for IDA's produce files.

Add more utilities.

For more information, please visit https://github.com/KYHSGeekCode/Android-Disassembler

What's New in the Latest Version 2.1.4

Last updated on Apr 29, 2021

- Play store developer policy
- Fix crash for file management

Translation Loading...

Additional APP Information

Latest Version

Request Disassembler Update 2.1.4

Uploaded by

محمد الشامي

Requires Android

Android 4.4+

Show More

Disassembler Screenshots

Comment Loading...
Subscribe to APKPure
Be the first to get access to the early release, news, and guides of the best Android games and apps.
No thanks
Sign Up
Subscribed Successfully!
You're now subscribed to APKPure.
Subscribe to APKPure
Be the first to get access to the early release, news, and guides of the best Android games and apps.
No thanks
Sign Up
Success!
You're now subscribed to our newsletter.