AndroidProjectCreator-bin : Decompile an APK to an Android Studio Project ( https://github.com/ThisIsLibra/AndroidProjectCreator )
androguard : Read Android's binary format for XML files (AXML) and a decompiler for DEX ( https://github.com/androguard/androguard )
android-sdk-build-tools : Android SDK Build Tools ( https://developer.android.com/studio/releases/build-tools )
apktool : A tool for reengineering 3rd party, closed, binary Android apps ( https://ibotpeaches.github.io/Apktool/ )
appmon : Monitoring and tampering API calls of MacOS and iOS/Android apps ( https://dpnishant.github.io/appmon/ )
catalyst : Release metatool used for creating releases based on Gentoo Linux ( https://wiki.gentoo.org/wiki/Catalyst )
collabreate : A plugin for IDA Pro designed to provide collaborative reverse engineering ( http://www.idabook.com/collabreate/ https://sourceforge.net/projects/collabreate/ )
dependency-check-bin : A utility that detects vulnerabilities in application dependencies ( https://www.owasp.org/index.php/OWASP_Dependency_Check )
dex2jar : Tools to work with android .dex and java .class files ( https://github.com/pxb1988/dex2jar/ )
dwarf-debugger : Full featured multi arch/os debugger built on top of PyQt5 and frida ( https://github.com/iGio90/Dwarf )
electron-bin : Cross platform application development framework based on web technologies ( https://electronjs.org/ )
electron-packager : Six Degrees of Domain Admin ( https://github.com/electron-userland/electron-packager )
frida-tools : Frida CLI tools ( https://github.com/frida/frida-tools )
ghidra : A software reverse engineering framework ( https://ghidra-sre.org/ )
jadx-bin : A standalone graphical utility that displays Java source codes of .class file ( https://github.com/skylot/jadx )
jd-cli : Command line Java Decompiler ( https://github.com/kwart/jd-cli )
jd-cli-bin : Command line Java Decompiler ( https://github.com/kwart/jd-cli )
jd-gui : A standalone Java Decompiler GUI ( http://jd.benow.ca/ )
jnitrace : A Frida based tool that traces usage of the JNI API in Android apps. ( https://github.com/chame1eon/jnitrace )
kaleido-bin : Static image export for web-based visualization libraries ( https://github.com/plotly/Kaleido )
lief : Library to instrument executable formats ( https://lief.quarkslab.com/ )
memfetch : A simple utility to dump all memory of a running process ( https://lcamtuf.coredump.cx/ )
mobsf : Automated, all-in-one mobile application (Android/iOS/Windows) pen-testing ( https://github.com/MobSF/Mobile-Security-Framework-MobSF )
objection : Runtime mobile exploration ( https://github.com/sensepost/objection )
plasma : An interactive disassembler for x86/ARM/MIPS ( https://github.com/plasma-disassembler/plasma )
qark : A tool to look for Android application vulnerabilities ( https://github.com/linkedin/qark/ )
recaf-bin : A modern Java bytecode editor ( https://col-e.github.io/Recaf/ )
reflutter : Flutter apps reverse engineering ( https://github.com/ptswarm/reFlutter )
retdec : RetDec is a retargetable machine-code decompiler based on LLVM. ( https://github.com/avast-tl/retdec )
semgrep-core-bin : Lightweight static analysis for many languages ( https://github.com/returntocorp/semgrep )
soapui : The Swiss-Army Knife for SOAP Testing ( https://www.soapui.org/ )
sonarqube-bin : SonarQube Community Edition is an open platform to manage code quality ( https://www.sonarqube.org/ )
sonarscanner-bin : SonarQube Command-Line Scanner ( https://www.sonarqube.org/ )
valabind : Valabind is a tool to parse vala or vapi files to transform them into swig files ( https://github.com/radare/valabind )
Add an ebuild in portage :
The ebuild is now in the portage tree.
You can also use layman : emerge layman then layman -a pentoo
For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage
If you have a problem : ycarus(-at-)zugaina.org