Lect_5 - Deekshith19/Android_Security GitHub Wiki
Reverse Engineering of Android App
- APK Tool
Decomiplation: Trying to reach to Source Code From Executable File. Here .dex means Dalvik Executable Code Format
apktool d .\app-debug.apk -o test
We observe that the testsample directory does not contain the classes.dex and resources.arsc files previously present in the ZIP file. We observe that there is a apktool.yml file created in the directory. We also observe that there is another AndroidManifest.xml in a new directory called original. We also observe that there is a new directory called smali which was decompiled from the classes.dex file present in the original APK ZIP archive.
Now Jadx Tool
jadx is a Dex to Java decompiler. It is a command line and GUI tools for producing Java source code from Android Dex and Apk files
The decompiled JAVA source code is seen in the JADX window.
We can save the decompiled JAVA source code as a Gradle project.