[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
This commit introduces a new page which lists the packages found on the device. It is a rather early phase and definitely needs some styling :D
On this page it should mark the current active project as "Current Workspace". Further, it allows you to pull packages from the device and analyse it. If you pull a package, it automatically reinitialises dexcalibur to point to the new workspace. If there are multiple projects in the dexcalibur workspace, the package-manager allows you to change between them
I put some loading blob to indicate the processing.
This commit introduces a new page which lists the packages found on the device. It is a rather early phase and definitely needs some styling :D
On this page it should mark the current active project as "Current Workspace". Further, it allows you to pull packages from the device and analyse it. If you pull a package, it automatically reinitialises dexcalibur to point to the new workspace. If there are multiple projects in the dexcalibur workspace, the package-manager allows you to change between them
I put some loading blob to indicate the processing.