Please sign in to comment.
- Loading branch information...
|@@ -7,7 +7,7 @@ A simple tool to help finding JNI calls in a x86/ARM disassembly listing.|
|Originally presented in this article http://www.thebugmagazine.org/magazine/bug04/0x02-engenharia-reversa-em-apps-java.txt, the script has been modified in order to support both x86 syntaxes as well as ARM.|
|-Thus, it can be used for debugging/reverse engineering android native libraries.|
|+Thus, it can be used for debugging/reverse engineering Android native libraries using JNI.|