[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
Server started on : 8000
/home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:46
intentFilter.actions.push(new AndroidCmp.IntentCriteria(e));
^
TypeError: AndroidCmp.IntentCriteria is not a constructor
at /home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:46:43
at Array.forEach (<anonymous>)
at /home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:42:30
at Array.forEach (<anonymous>)
at AndroidManifestParser.parseIntents (/home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:32:31)
at /home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:83:16
at Array.forEach (<anonymous>)
at AndroidManifestParser.parseApplication (/home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:79:24)
at /home/dexcalibur/dexcalibur/src/AndroidManifestParser.js:225:39
at Array.forEach (<anonymous>)
use docker