Commands
Detailed information about all available commands for RevEngiBot.
Start
The /start
command is the default command that displays the bot's start page, nothing special but a must for every bot to interact with users.
Help
The /help
command is used to display the help page, which contains all the commands that the bot has.
AAB to APK Conversion
No need for additional tools! Convert AAB files to APK format directly with the /aab2apk
command, simplifying the process for developers and testers.
Status: All test passed ✅
Usage:
Use this cmd while replying to a .aab
file to convert that to .apk
file.
NOTE
The converted apk file is not signed.
APK Analysis
APK Analysis provides a comprehensive way to interact with APK files. You can extract resources, permissions, activities, services, and more. This feature is essential for reverse engineers and developers working with Android applications.
Status: All tests passed ✅
This command allows you to interact with APK files.
NOTE
You must register an APK before doing anything. To register an APK, reply to
an APK file by sending /apk
.
Commands:
- Get APK Info:
This will give you basic information about the APK, such as package name, version, etc. for example:
- Get Permissions:
This will give you a list of permissions requested by the APK. For example:
- Get Activities:
This will give you a list of accessible activities in the APK. For example:
- Get Signature Information:
This will you the information on Signing Block of the APK. For example:
- Get Decompiled
AndroidManifest.xml
File:
This will give you the decompiled AndroidManifest.xml
file. For example:
- Get Decompiled
resources.arsc
File:
This will give you XML decompiled resources.arsc
file. For example:
- Get Decompiled Source of the APK (using jadx):
This command will decompile the APK using jadx and return the decompiled source code.
- Unregister APK:
This command will unregister the APK from the bot.
NOTE
All APK files will be unregistered after 30 minutes.
APKiD
You can use this command to identify the packer, protector, obfuscator, or oddities used in an APK file.
Smali Grammar
This command allows you to fetch detailed information about Smali instructions, helping you understand their syntax, usage, and behavior.
Usage:
Example:
Detailed Information
When you use the /smali
command, the bot will guide you through the process of retrieving information about the specified Smali instruction. Here’s how it works:
-
Exact Match vs. Partial Match:
- The bot will first ask whether you want to perform an exact match or a partial match.
- Exact Match: If you choose an exact match, the bot will provide detailed information about the specified instruction.
- Partial Match: If you choose a partial match, the bot will provide a list of instructions that contain the specified string. You can then select one of the instructions from the list to get detailed information about it.
-
Interactive Selection:
- After choosing the type of match, you will be presented with relevant options.
- For an exact match, you will receive comprehensive details about the instruction.
- For a partial match, you will see a list of matching instructions, and you can select one to get detailed information.
- If no response is received within 20 seconds, task will be cancelled.
Example Workflow
-
Command Execution:
-
Bot Prompt:
-
User Choice:
- If you choose Exact Match, the bot will provide detailed information about the
invoke-virtual
instruction: - If you choose Partial Match, the bot will list instructions that contain the string
invoke-virtual
, allowing you to select one for detailed information.
- If you choose Exact Match, the bot will provide detailed information about the
APK Protector
This command allows you to protect your APK files using various tools, packers, obfuscators, and techniques. Currently, the following tools are supported:
More tools will be added in the future.
APK Signer
This command signs an APK file using various signing schemes. The command must be used as a reply to an .apk
file.
Usage:
Options:
v1
: Signs the APK with the v1 signing scheme.v2
: Signs the APK with the v2 signing scheme.v3
: Signs the APK with the v3 signing scheme.- (None) or
v1+v2+v3
: Signs the APK with all v1, v2, and v3 signing schemes. This is the default if no options are specified. - Combinations: You can combine options using
+
to specify multiple signing schemes. For example:v1+v2
: Signs with v1 and v2.v1+v3
: Signs with v1 and v3.v2+v3
: Signs with v2 and v3.
Examples:
/apksign [in reply to an APK file]
(Signs with v1, v2, and v3)/apksign v1 [in reply to an APK file]
(Signs with only v1)/apksign v2+v3 [in reply to an APK file]
(Signs with v2 and v3)
ASK AI
This command allows you to interact with an AI model. You can start a conversation, reset it, or exit it.
Starting a Conversation:
Use the following command to begin a conversation with the AI:
Example:
Subsequent messages you send will be treated as part of the ongoing conversation with the AI. The AI's responses will be displayed as replies to your messages.
Important Considerations:
- The AI will ignore messages that resemble commands (those starting with
/
or!
). - In groups, only
/askai
prefixed messages will be sent to the AI.
Managing Your Conversation:
- Resetting the Conversation: To start a fresh conversation, use:
/askai_new
- Exiting the Conversation: To end the current conversation, use:
/askai_exit
- Changing the AI Model: Use
/askai_model
to (potentially) change the underlying AI model. Available models are:Gemini
,Cohere
andGroq
.
Group Usage:
- Enabling/Disabling: This feature is disabled in groups by default. Group admins can enable it using
/askai_enable
and disable it using/askai_disable
. - Group Restrictions: Within groups, you must use the
/askai
prefix for all AI queries.
Timeout:
Conversations will automatically end after 10 minutes of inactivity.
ASM
This command converts assembly code to various ARM assembly hexadecimal representations.
Usage:
Use the following command to convert your assembly code:
Example:
/asm mov r0, r1
Output:
The command will return a response containing hexadecimal representations for different ARM architectures:
NOTE
The specific output formats may vary depending on the input assembly code and its compatibility with different architectures.
DISASM
This command disassembles ARM assembly hexadecimal code into its corresponding assembly instructions.
Usage:
Use the following command to disassemble your hex code:
Example:
/disasm 0100A0E1
Output:
The command will return a response containing disassembled assembly instructions for different ARM architectures, where possible:
NOTE
The disassembled output may vary depending on the provided hexadecimal code and its compatibility with different ARM architectures.
Base Converter
This command allows you to convert numbers between different bases.
Usage:
The command supports several formats depending on the type of conversion you need.
1. Base 10 to Common Bases:
Convert a base 10 number to binary, octal, decimal, and hexadecimal.
Examples:
2. Other Base to Common Bases:
Convert a number from a specified base to common bases (binary, octal, decimal, hexadecimal).
Examples:
3. Other Base to Another Base:
Convert a number from one specified base to another specified base.
Examples:
4. String to Base64/Base32 Encoding:
Encode a string to Base64 or Base32.
Examples:
5. Base64/Base32 to String Decoding:
Decode a Base64 or Base32 encoded string back to its original string representation.
Examples:
NOTE
Ensure that the input number and encoded strings are correctly formatted for the specified base. Errors may occur if the input is invalid.
Blutter Integration
Blutter Integration facilitates quick analysis of Flutter APKs and .so
files. Detect Dart versions, extract necessary files, and generate detailed analysis reports within seconds.
Usage:
This command extracts Dart code from an APK, ZIP, or 7Z file. Use it as a reply to the file.
Basic Extraction:
To extract Dart code without compression, reply to the file with:
Custom ZIP Filename:
To extract Dart code to a custom ZIP filename, reply to the file with:
Replace <zip_filename>
with your desired filename. The .zip
extension is optional; you can omit it. If no filename is provided, the output will be named out.zip
.
Examples:
/blutter
(Extracts Dart code toout.zip
)/blutter my_dart_code.zip
(Extracts Dart code tomy_dart_code.zip
)/blutter my_analysis
(Extracts Dart code tomy_analysis.zip
)
Note
The input file must be an APK, ZIP, or 7Z file containing libflutter.so
&
libapp.so
.
Control Flow Flattening (Obfuscation)
This command applies control flow flattening obfuscation to DEX files using BlackObfuscator. This makes reverse engineering more difficult.
Usage:
This command must be used as a reply to a DEX file.
Arguments:
Arguments specify classes and packages to include or exclude from obfuscation.
+ <package_or_class>
: Includes the specified package or class.- <package_or_class>
: Excludes the specified package or class.
Examples:
/cff +com.example.app -com.example.app.debug
: Includes everything incom.example.app
except thecom.example.app.debug
package./cff +com.example.app.MainActivity
: Only obfuscates theMainActivity
class within thecom.example.app
package./cff +com.my.app
: Obfuscates the entirecom.my.app
package.
Important Notes:
- Reply to DEX: This command must be used as a reply to a DEX file.
- Case Sensitivity: Package names are case-sensitive. Incorrect casing will lead to unexpected results.
Cocos2d JSC Decryption
This command decrypts a Cocos2d .jsc
(encrypted JavaScript) file to a .js
(plain JavaScript) file.
Usage:
This command requires the decryption key and must be used as a reply to the .jsc
file.
Replace <key>
with the correct decryption key for the .jsc
file.
Example:
Important
You must know the correct decryption key for this command to work. Providing an incorrect key will result in failure.
DEX to Java
This command converts DEX (Dalvik Executable) files to Java source code. It supports multiple decompilers to allow you to choose the best option for your needs.
Usage:
This command must be used as a reply to a DEX file.
Decompiler Selection:
After sending the command, the bot will prompt you to select a decompiler from the available options.
Important
The success and quality of the conversion depend heavily on the chosen decompiler and the complexity of the DEX file. Some decompilers may produce better results than others for specific DEX files.
Dex Repair
It fixes the DEX magic number and updates the checksum and signature in the DEX header.
Usage:
This command must be used as a reply to a DEX file.
Frida Script Compilation & Obfuscation
This command compiles and obfuscates JavaScript Frida scripts into a Frida-compatible bytecode format.
Note
This feature is under development and is not yet suitable for real-world or production use. Results may be unpredictable, and the output may not always be compatible with all Frida versions.
Hash Generator
This command generates various cryptographic hashes for input text or files.
Usage:
For Text Input:
For Files: Use this command as a reply to the file you want to hash.
Output:
The command will return a list of hashes, including:
- MD5
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- SHA3_224
- SHA3_256
- SHA3_384
- SHA3_512
- SHAKE_128 (with length 64)
- SHAKE_256 (with length 64)
- BLAKE2B
- BLAKE2S
- CRC32
- Adler32
Note
The output will vary depending on the input text or file. For large files, processing time may increase.
Java/Smali Conversion
With Java to Smali and Smali to Java conversions, you can seamlessly transition between these two languages.
Usage:
For Java to Smali:
For Smali to Java:
Note
These commands must be used as a reply to the corresponding file.
Regex Maker
Regex Maker allows you to craft complex regular expressions for Smali code. Whether for searching or extracting data, this tool simplifies regex creation.
Usage:
Either use it with an input:
OR reply to a message with the command:
Smali2Frida
This command generates Frida hooks directly from .smali
files, simplifying the process of setting up dynamic analysis.
Usage:
Reply to a .smali
file with the following command:
Important
This command must be used as a reply to a .smali
file. The output will be
Frida script(s) designed to interact with the functions defined in the
provided .smali
code.
JNI Function Information
This command extracts and displays JNI (Java Native Interface) function signatures from an APK file.
Usage:
Reply to an APK file with the command:
The bot will then process the APK and return a list of identified JNI function signatures.
Important
This command requires an APK file as input and must be used as a reply to that file. The accuracy of the results depends on the structure and complexity of the APK.
MT Enhanced Hook
This command generates an MT enhanced hook for APK files. This is typically used for bypassing signature checks during application analysis or modification.
Usage:
Reply to an APK file with the command:
Warning
Modifying APK files in this way can have unintended consequences and may lead to instability or malfunction of the application. Use this command cautiously and only on APKs you have permission to modify.
APK Scan
This command scans an APK file to assess its security posture using third-party tools.
Usage:
This command can be used in two ways:
Method 1: Specifying the Scanner
Use this method to explicitly select the scanner you wish to use.
Replace <scanner_name>
with one of the following:
androbugs
: Uses AndroBugs for the scan.deeplens
: Uses APKDeepLens for the scan.
Method 2: Replying to an APK File
Reply to an APK file with the /scan
command. The bot will then prompt you to select the scanner you wish to use from a list of available options.
Examples:
/scan androbugs
(Scans using AndroBugs)/scan deeplens
(Scans using APKDeepLens)
Important
This command must be used as a reply to an APK file.. The accuracy and detail of the results will depend on the capabilities of the chosen scanner and the complexity of the APK.
APK Converter
This command converts various Android application package formats (.apks
, .xapk
, .apkm
) to the standard .apk
format.
Usage:
Reply to a .apks
, .xapk
, or .apkm
file with the command:
The bot will process the input file and generate a corresponding .apk
file.
Important
The resulting .apk
file will not be signed. You will need to sign it
separately before installing or distributing it. This command must be used as
a reply to a supported package file.
XML Tools
This command provides tools for interacting with XML and AXML (Android XML) files.
Current Functionality:
-
AXML Decompilation: Decompile an AXML file into a standard XML format.
Use this command as a reply to an AXML file.
-
XML Compilation: Compile an XML file into the AXML format.
Use this command as a reply to an XML file.
Note
This command requires an AXML or XML file as input and should be used as a reply to that file. Additional XML manipulation tools will be added in future updates.
Credits
This command lists the third-party libraries used in this project. You can also view this information by using the command /credits
.
Core Functionality & Plugins: