DexKraft

Specialized Android security auditing tool for deep DEX file analysis and binary deconstruction.

Android Security Analysis

DexKraft is a high-performance utility designed for reverse engineers. It allows for the extraction, decomposition, and auditing of Android bytecode, helping researchers identify malicious patterns, unintended data leaks, and weak encryption implementations.

  • Deep DEX/Dalvik bytecode disassembly and Smali reconstruction
  • Automated manifest vulnerability scanning and permission auditing
  • String extraction, entropy analysis, and obfuscation detection
  • Multi-threaded APK decomposition for rapid large-scale audits
dexkraft --audit app.apk

[INIT] Loading APK: app.apk (Size: 42.5 MB)

[INFO] Unzipping resources... [SUCCESS]

[INFO] Decompiling classes.dex -> smali/...

[ANALYSIS] Scanning 'com.app.core.NetworkHandler'...

[VULN] Found: Insecure Cryptography (AES/ECB usage)

[WARN] High Entropy detected in /assets/libcore.so

[VULN] Found: Cleartext Traffic permitted in Manifest

[INFO] Reconstructing Call Graph... [1,422 nodes]

[INFO] Audit complete. Generated results/report.json

Heuristic Engine

Our proprietary heuristic engine detects common malware behaviors even in highly obfuscated codebases.

Control Flow

Full reconstruction of modern Android control flows to identify hidden entry points or backdoors.

PII Leak Audit

Automatically traces data flows to identify potential leaks of Personally Identifiable Information.

Advanced Audit Modules

Static Taint Analysis

DexKraft tracks sensitive source data (IMEI, Contacts, GPS) through the application logic to see where it exits (Network, SMS, Logs), revealing hidden spyware behaviors.

Crypto-Misuse Detection

Scans for weak hashing algorithms (MD5, SHA1), static seeds, and insecure block modes that make an application's data vulnerable to decryption.

Reflective Code Analysis

Specialized tracking for Java Reflection and Dynamic Class Loading—common techniques used by advanced malware to hide their payload.

Technical Specs

Extraction DEX, ODEX, VDEX, APK, AAB
Analysis Core High-Concurrency Rust/C++ Engine
OS Support Linux, macOS, Windows (WSL)
Output Formats JSON, XML, Markdown, Interactive HTML
Integration CI/CD Hooks & VS Code Extension

The Audit Workflow

01

Ingest

Upload APK or source directory for initial structure indexing.

02

Deconstruct

Unpack resources and translate DEX bytecode into readable Smali/Java.

03

Scan

Run heuristic, static, and flow modules against the reconstructed code.

04

Report

Generate prioritized vulnerability lists with remediation steps.

Start the Audit

Download on GitHub
function toggleMobileMenu() { const menu = document.getElementById('mobile-menu'); menu.classList.toggle('hidden'); } if ('serviceWorker' in navigator) { window.addEventListener('load', () => { navigator.serviceWorker.register('sw.js'); }); }