AndroidProjectCreator-bin : Decompile an APK to an Android Studio Project ( https://github.com/ThisIsLibra/AndroidProjectCreator )
androguard : Read Android's binary format for XML files (AXML) and a decompiler for DEX ( https://github.com/androguard/androguard )
android-sdk-build-tools : Android SDK Build Tools ( https://developer.android.com/studio/releases/build-tools )
apkInspector : A tool designed to provide detailed insights into the zip structure of APK files ( https://github.com/erev0s/apkInspector )
apktool : A tool for reengineering 3rd party, closed, binary Android apps ( https://ibotpeaches.github.io/Apktool/ )
appmon : Monitoring and tampering API calls of MacOS and iOS/Android apps ( https://dpnishant.github.io/appmon/ )
catalyst : Release metatool used for creating releases based on Gentoo Linux ( https://wiki.gentoo.org/wiki/Catalyst )
chipsec : Platform Security Assessment Framework ( https://github.com/chipsec/chipsec )
dependency-check-bin : A utility that detects vulnerabilities in application dependencies ( https://www.owasp.org/index.php/OWASP_Dependency_Check )
dex2jar : Tools to work with android .dex and java .class files ( https://github.com/pxb1988/dex2jar/releases )
electron-bin : Cross platform application development framework based on web technologies ( https://electronjs.org/ )
electron-packager : Six Degrees of Domain Admin ( https://github.com/electron-userland/electron-packager )
frida-tools : Frida CLI tools ( https://github.com/frida/frida-tools )
ghidra : A software reverse engineering framework ( https://ghidra-sre.org/ )
itstool : Translation tool for XML documents that uses gettext files and ITS rules ( http://itstool.org/ )
jadx-bin : A standalone graphical Java Decompiler ( https://github.com/skylot/jadx )
jd-cli : Command line Java Decompiler ( https://github.com/kwart/jd-cli )
jd-cli-bin : Command line Java Decompiler ( https://github.com/kwart/jd-cli )
jd-gui : A standalone Java Decompiler GUI ( http://jd.benow.ca/ )
jd-gui-bin : A standalone Java Decompiler GUI ( http://jd.benow.ca/ )
jnitrace : A Frida based tool that traces usage of the JNI API in Android apps. ( https://github.com/chame1eon/jnitrace )
jnitrace-engine : Engine used by jnitrace to intercept JNI API calls. ( https://github.com/chame1eon/jnitrace-engine )
kaleido-bin : Static image export for web-based visualization libraries ( https://github.com/plotly/Kaleido )
lief : Library to instrument executable formats ( https://lief.quarkslab.com/ )
memfetch : A simple utility to dump all memory of a running process ( https://lcamtuf.coredump.cx/ )
mobsf : Automated, all-in-one mobile application (Android/iOS/Windows) pen-testing ( https://github.com/MobSF/Mobile-Security-Framework-MobSF )
objection : Runtime mobile exploration ( https://github.com/sensepost/objection )
pentoo-udev-rules : udev rules to assist in some way with hardware commonly used in pentoo ( https://github.com/pentoo/pentoo-overlay )
plasma : An interactive disassembler for x86/ARM/MIPS ( https://github.com/plasma-disassembler/plasma )
qark : A tool to look for Android application vulnerabilities ( https://github.com/linkedin/qark/ )
recaf-bin : A modern Java bytecode editor ( https://col-e.github.io/Recaf/ )
reflutter : Flutter apps reverse engineering ( https://github.com/Impact-I/reFlutter )
semgrep-core-bin : Lightweight static analysis for many languages ( https://github.com/returntocorp/semgrep )
soapui : The Swiss-Army Knife for SOAP Testing ( https://www.soapui.org/ https://github.com/SmartBear/soapui )
sonarqube-bin : SonarQube Community Edition is an open platform to manage code quality ( https://www.sonarqube.org/ )
sonarscanner-bin : SonarQube Command-Line Scanner ( https://www.sonarqube.org/ )
valabind : Valabind is a tool to parse vala or vapi files to transform them into swig files ( https://github.com/radare/valabind )
Add an ebuild in portage :
The ebuild is now in the portage tree.
You can also use layman : emerge layman then layman -a pentoo
For Paludis use this rsync : rsync://gentoo.zugaina.org/pentoo-portage
If you have a problem : ycarus(-at-)zugaina.org