[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
If you put unescaped spaces in Dexcalibur's project UID, it fails then to load your APK (Linux path issue IMHO):
For example :
cmd: 'java -jar /home/axelle/dexcaliburWS/.dxc/bin/apktool.jar decode -f -m /home/axelle/dexcaliburWS/Tous Anti Covid_0/app.apk -o /home/axelle/dexcaliburWS/Tous Anti Covid_0/apk',
stdout: '',
stderr: 'Input file (Covid_0/apk) was not found or was not readable.\n'
To reproduce
Dexcalibur
Create a new project
In project UUID, set a name with spaces.
Expected behavior
I think it would be valid to say UUID can't have spaces or any silly characters ;-)
Desktop (please complete the following information):
OS: Linux Mint 20
Node JS version: 12.20.0
Dexcalibur version (see 'package.json' or output) : 0.7.3
If you put unescaped spaces in Dexcalibur's project UID, it fails then to load your APK (Linux path issue IMHO):
For example :
To reproduce
Expected behavior I think it would be valid to say UUID can't have spaces or any silly characters ;-)
Desktop (please complete the following information):