Dangee framework provides information of elements (function, variable etc.) in android binaries. Users can therefore, use these information to construct the analysis, find potential malicious activites or security vulnerabilities.
pip install -U Dangee
from dangee.core import Dangee
d = Dangee("Roaming_Mantis.dex")
- Show all method
d.value
- Show Android native API
d.isNative().value
- Show self-defined method
d.isSelfDefine().value
- Matching method by case-insensitive words
d.isNative().match("package").value
Multi-level match
d.isNative().match("package").match("UsageStats").value
- Crossreferences (XREFs)
# XREFs FROM:
m1 = d.isNative().match("usage")
m1.get_xref_from().value
# XREFs TO:
m2 = d.isSelfDefine().match("getTopActivityName$loader_release")
m2.get_xref_to().value
- Data flow check
m1 = d.isNative().match("usage")
m2 = d.isNative().match("package")
m1.dataFlowto(m2)
list[ {tuple(method1, method2) : result_of_data_flow_to_found } ]