Join us for the Honeynet Workshop 2024: May 27th–29th, Copenhagen, Denmark

Android Reverse Engineering (A.R.E.) Virtual Machine available for download now!

01 Nov 2011 Christian Seifert android

The Honeynet Project is happy to announce the release of the Android Reverse Engineering (A.R.E.) Virtual Machine.

Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.

Tools currently found on A.R.E. are:

  • Androguard
  • Android sdk/ndk
  • APKInspector
  • Apktool
  • Axmlprinter
  • Ded
  • Dex2jar
  • DroidBox
  • Jad
  • Smali/Baksmali

You can download A.R.E. for free from http://redmine.honeynet.org/projects/are/wiki.