Honeynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released

Published: 2011-11-01. Last Updated: 2011-11-01 04:41:09 UTC
by Russ McRee (Version: 1)
2 comment(s)

Christian (@cseifert) of the Honeynet Project advised us that they've released A.R.E, the Android Reverse Engineering Virtual Machine.

This VirtualBox-ready VM includes the latest Android malware analysis tools as follows:

  • Androguard
  • Android sdk/ndk
  • APKInspector
  • Apktool
  • Axmlprinter
  • Ded
  • Dex2jar
  • DroidBox
  • Jad
  • Smali/Baksmali

A.R.E. is freely available from http://redmine.honeynet.org/projects/are/wiki

Given the probable exponential growth in mobile malware, A.R.E. presents an opportunity to test, learn, and analyze.

Russ McRee

Twitter

2 comment(s)

Comments

Christian is aware of the issues some were having earlier with download speeds. He says torrents will be up soon (and I personally am seeing a 10x increase in download speed from what I was seeing this morning). Also, the wiki page has been updated with SHA256 and SHA512 hashes for the .tar.gz file.
Note that the default keyboard layout is AZERTY, in case of confusion.

Diary Archives