GDA, an powerful Dalvik bytecode decompiler implemented in C++, which has the advantages of fast analysis and low memory&disk consumption and an stronger ability to decompiling the apk, dex, odex, oat, jar, class, aar files.
GDA is completely native software and works without any Setup and Java VM, it works well in any new windows system and virtual machine system without additional configuration. GDA Decompiler project started in 2013 and its first version 1.0 released in 2015 at GDA website.
GDA is also a powerful and fast reverse analysis platform. Which does not only supports the basic decompiling operation, but also many excellent features like Malicious behavior detection, Privacy leaking detection, Vulnerability detection, Path solving, Packer identification, Variable tracking analysis, Deobfuscation, Python& Java scripts, Device memory extraction, Data decryption and encryption etc.
All the features as follows:
𝕬 Interactive Operation: 1. Cross-references for strings, classes, methods and fields; 2. Searching for strings, classes methods and fields; 3. Comments for java code; 4. Rename methods,fields and classes; 5. Save the analysis results in gda db file. ... 𝕭 Utilities for Assisted Analysis: 1. Extracting DEX from ODEX; 2. Extracting DEX from OAT; 3. XML Decoder (Component filter); 4. Algorithm tool(Support rolling encryption and almost all popular encryption algorithms); 5. Device memory dump(Dump so, odex, dex, oat file); 6. Path solving; 7. Static vulnerability scanner; ... 𝕮 Good Features: 1. Brand new dalvik decompiler in c++ with friendly GUI; 2. Support python script and Java script; 3. Packers Recognition; 4. Multi-DEX supporting; 5. Making and loading signature of the method; 6. Malicious Behavior Scanning by API chains; 7. Taint analysis to preview the behavior of variables; 8. Taint analysis to source the variables; 9. De-obfuscate; 10. API view with x-ref; 11. Association of permissions with modules; 12. Extract all the urls in APK. 13. Apk Forensics Analysis. 14. Static vulnerability scanner based on stack state machine and dynamic rule interpreter.. 15. Smart Rename. 16. Support for .jar files, .class files and .aar files. 17. Dual decompiler mode. 18. Deep URL extraction. 19. Multi-DEX Merge. 20. Personalized and Customizable UI. 21. Privacy leaking scanning. 22. Path solving based on low-level intermediate representation(LIR). 23. Support Frida to hook and call the selected method or class. 24. Support call-graph view. ...
𝕲𝕯𝕬 shortcut key
|F5||Switch java to smali, pressing it again for back to java|
|F||Trace the args and return-value by dataflow analysis|
|X||Cross-referencing, locating callers (of strings, classes, methods, field)|
|Esc/◄/Backspace||Back to the last visit|
|►||Forward to the next visit|
|G||Jump to somewhere by you inputting offset|
|N||Rename the variable/method/class name|
|S||Search for all the elements by the given string|
|C||Comments. Only supports the Java code|
|DoubleClick||The cursor's placed at the method/str/field/class, and double-click to access objects|
|M||The cursor's placed at the Smali line and pressing the key 'M' to edit the instruction|
|▲ UP||Press 'up' key to access the up-method in the tree control|
|▼ Down||Press 'down' key to access the down-method in the tree control|
|D||Dump the binary data of methods, only supports the Smali window|
|Enter||The modification of edit boxes take effect|
|H||Show data in Hex|
|Ctr+H||Pop searching history window|
|Ctr+V||Paste, only for editable boxes|
|Ctr+F||Find out the string of the code area|
|Ctr+S||Save the modifications into the GDA database file|
No installation required, just double-click the bin and you can enjoy it. NOTE： This is not an open source project，at least，in the short term. You can use the free tools and some open source scripts published here.
For copyright protection, GDA is protected by an authorized VMP, which may lead to false positives of some anti-virus software. Please ignore or add GDA to the white list. GDA does not have any malicious behavior.
GDA is embedded with ADB and gdump (used to dump device memory data), as well as vul rules, source-taint rules, api fingerprint etc. so, you will see some file in directory %APPDATA%/GDA. this behavior releasing the other executable files also be identified as a virus by some AVs.
Only for windows
Just drag a file into GDA, that's done.
If your files are
.jar/.class/.aar files, you need the java support the dx tool. Please make sure that the java works properly.
When the analyzed jar file size is too big, it maybe takes a long time to analysize, please be patient.
Only support GDA3.75+, Other version do not use this theme file. Usage:click on menu
Import Color Config,choosing a theme file and reboot GDA.