Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

readme fixed

  • Loading branch information...
commit 7f41c8dcfd053947e0a310daa3c2d8cf84fea28f 1 parent cf82fff
maaaaz authored

Showing 1 changed file with 1 addition and 1 deletion. Show diff stats Hide diff stats

  1. +1 1  README.md
2  README.md
Source Rendered
@@ -7,7 +7,7 @@ A simple tool to help finding JNI calls in a x86/ARM disassembly listing.
7 7
8 8 Originally presented in this article http://www.thebugmagazine.org/magazine/bug04/0x02-engenharia-reversa-em-apps-java.txt, the script has been modified in order to support both x86 syntaxes as well as ARM.
9 9
10   -Thus, it can be used for debugging/reverse engineering android native libraries.
  10 +Thus, it can be used for debugging/reverse engineering Android native libraries using JNI.
11 11
12 12 Features
13 13 --------

0 comments on commit 7f41c8d

Please sign in to comment.
Something went wrong with that request. Please try again.