Skip to content
Browse files

readme fixed

  • Loading branch information...
1 parent 05d8d0d commit 623738283adaf34b1eb6810cbbf4c3f32529f950 maaaaz committed Aug 6, 2012
Showing with 10 additions and 10 deletions.
  1. +10 −10 README.md
View
20 README.md
@@ -3,10 +3,10 @@ JNI Analyzer
Description
-----------
-A simple tool to help finding JNI calls in a x86/ARM disassembly listing
-
-Originally presented here http://www.thebugmagazine.org/magazine/bug04/0x02-engenharia-reversa-em-apps-java.txt, this script has been modified in order to support both x86 syntaxes and ARM.
-Thus, it can be used for debugging/reverse engineering android native libraries.
+A simple tool to help finding JNI calls in a x86/ARM disassembly listing.
+
+Originally presented here http://www.thebugmagazine.org/magazine/bug04/0x02-engenharia-reversa-em-apps-java.txt, this script has been modified in order to support both x86 syntaxes and ARM.
+Thus, it can be used for debugging/reverse engineering android native libraries.
Features
--------
@@ -15,19 +15,19 @@ Features
Usage
-----
-Pass the ARM and x86 (AT&T or Intel syntax) disassembly listing via stdin.
-This was particulary designed for the objdump output.
-The processed text can be collected at stdout.
+Pass the ARM and x86 (AT&T or Intel syntax) disassembly listing via stdin.
+This was particulary designed for the objdump output.
+The processed text can be collected at stdout.
-* x86 AT&T syntax libraries
+* x86 AT&T syntax
```
$ objdump -d mylib.so | python jnianalyzer.py -a x86
```
-* x86 intel syntax libraries
+* x86 intel syntax
```
$ objdump -M intel -d mylib.so | python jnianalyzer.py -a x86
```
-* ARM libraries
+* ARM
```
$ tools/arm-linux-androideabi-objdump -d mylib.so | python jnianalyzer.py -a arm
```

0 comments on commit 6237382

Please sign in to comment.
Something went wrong with that request. Please try again.