Skip to content
#

decompiler

Here are 281 public repositories matching this topic...

GDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption, and encryption, etc.

  • Updated Jun 30, 2022
  • Java
jstaursky
jstaursky commented Nov 10, 2020

pdgsd does not seem to process PUSH EBP very well, the p-code semantics show up as

    (unique,0x12f0,4) = COPY EBP
    ESP = INT_SUB ESP, 0x4
    (unique,0x12f0,4) = STORE ram[ESP]

which doesn't make sense. Last line should be STORE ram[ESP] = (unique,0x12f0,4)

the raw p-code will show you:

STORE (const,0x55fef11636d0,8) (register,ESP,4) (unique,0x1b50,4)

and the

good first issue
Govorunb
Govorunb commented Dec 22, 2018

Currently, creating a new script and/or adding variables through the GUI is a thousand-step process that could really see some improvement.

Adding a Variable

First of all, the most critical issue - creating an UndertaleVariable through the context menu is currently not possible due to them not being an UndertaleNamedResource (so when the editor tries to read the name of the newly created vari

help wanted good first issue

Improve this page

Add a description, image, and links to the decompiler topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the decompiler topic, visit your repo's landing page and select "manage topics."

Learn more