Presented at
REcon 2016,
June 17, 2016, 3 p.m.
(30 minutes).
Despite the multitude of Java decompilers available, we often have the need
to debug or trace malicious or obfuscated Java bytecode. Existing Java
debuggers and tracers are mostly targeted towards Java developers, are
closed-source, and are not meant to handle malicious or obfuscated targets.
We present a new open-source cross-platform framework for debugging Java,
written completely in Python, designed specifically for reverse engineering.
We also present a Java method call tracer as a sample Python application
that utilizes this framework.
Presenters:
Links:
Similar Presentations: