Radare2 is an opensource reverse engineering framework which provides a set of tools to disassemble, debug, analyze, and manipulate binary files: http://radare.org/y/?p=features
Ever wanted to look at the smali code of a suspicious apk, solve a crackme, or disassemble something directly on your phone or tablet? Wait no more! Radare2 for Android is the reverser's swiss army knife at the palm of your hand!
Radare2 for Android is available on arm, mips and x86 architectures. You can choose to install the latest stable version or the nightly build from the development branch.
On rooted phones you can also automatically symlink radare binaries to xbin so it will be available in the default system PATH.
Check menu->settings for other options like automatic updates and external storage install.
Radare2 for Android comes in two flavors: radare2 web & radare2 console
[✔] Radare2 web uses a local webserver on your phone and launches a webview to help you work with your binary file from your phone's browser, you can also enable 'public http server' in the settings menu to analyze the file on your phone from your desktop computer via wifi. Click on the radare2 logo to access the help & example commands.
[✔] Radare2 console launches radare2 in Android Terminal Emulator, ready to analyze the file using the radare2 prompt. Type '?' for a quick list of available commands. Please note that if you want to use Radare2 console, Android Terminal Emulator must be installed on your phone *before* installing Radare2 for Android. We also recommend installing Hackers Keyboard to have the best command line experience.
Happy reversing! :D
 Android Terminal Emulator:
 Hackers Keyboard:
Tags: radare2 , radare2 instaling , radare2 tools list , reverse engineering , 안드로이드 disassembly debug , keyword