This inspector hooks Android internals methods involved into dynamic bytecode loading, class loading and dynamic calls using Reflection API.
It collects and analyse automatically additional Dex file or bytecode loaded at runtime. It is usefull when the application is obfuscated and hides its function calls.
Files or data loaded at runtime are copied into the local workspace ([project_workspace]/runtime/bytecode
folder).
Copied files are automatically analysed statically at runtime and when dexcalibur starts. These files can be flushed from project settings menu.
The table below lists all unique method invoked dynamically. If a method has never been yet discovered, it is tagged with the new label.
- | Method | Flags | Action |
---|
The table below lists all Dex files gathered at runtime and decompiled dynamically.
- | Name | Filepath | Action |
---|
The table below lists all elements discovered (string, class, method, field, array, ...).
- | Type | Object | Action |
---|