Dex-Oracle ~ Dalvik deobfuscator which uses limited execution to improve semantic analysis .

Dex-Oracle ~ Dalvik deobfuscator which uses limited execution to improve semantic analysis .

How it Works Dex-Oracle?
Oracle takes Android apps (APK), Dalvik executables (DEX), and Smali files as inputs. First, if the input is an APK or DEX, it is disassembled into Smali files. Then, the Smali files are passed to various plugins which perform analysis and modifications. Plugins search for patterns which can be transformed into something easier to read. In order to understand what the code is doing, some Dalvik methods are actually executed with and the output is collected. This way, some method calls can be replaced with constants. After that, all of the Smali files are updated. Finally, if the input was an APK or a DEX file, the modified Smali files are recompiled and an updated APK or DEX is created.

Method execution is performed by the Driver. The input APK, DEX, or Smali is combined with the Driver into a single DEX using dexmerge and is pushed onto a device or emulator. Plugins can then use Driver which uses Java reflection to execute methods from the input DEX. The return values can be used to improve semantic analysis beyond mere pattern recognition. This is especially useful for many string decryption methods, which usually take an encrypted string or some byte array. One limitation is that execution is limited to static methods.

dex-oracle

Dependencies:
– ruby-2.3.0
– apktools, smali and baksmali.

Install Latest apktools and Smali / Baksmali:

Usage:

Source: https://github.com/CalebFenton