Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add APKLab for Android #2177

Merged
merged 8 commits into from
Aug 18, 2022
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions Document/0x05c-Reverse-Engineering-and-Tampering.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ If you want to look directly into Java source code on a GUI, simply open your AP

Android decompilers go one step further and attempt to convert Android bytecode back into Java source code, making it more human-readable. Fortunately, Java decompilers generally handle Android bytecode well. The above mentioned tools embed, and sometimes even combine, popular free decompilers such as:

- [APKLab](https://github.com/APKLab/APKLab "APKLab")
cpholguera marked this conversation as resolved.
Show resolved Hide resolved
- [JD](http://jd.benow.ca/ "JD")
- [JAD](http://www.javadecompilers.com/jad "JAD")
- [jadx](https://github.com/skylot/jadx "jadx")
Expand Down
10 changes: 10 additions & 0 deletions Document/0x08a-Testing-Tools.md
Original file line number Diff line number Diff line change
Expand Up @@ -1109,6 +1109,16 @@ For more information on what this tool can be used for, check out:
- [APKiD: PEiD for Android Apps](https://github.com/enovella/cve-bio-enovella/blob/master/slides/bheu18-enovella-APKID.pdf)
- [APKiD: Fast Identification of AppShielding Products](https://github.com/enovella/cve-bio-enovella/blob/master/slides/APKiD-NowSecure-Connect19-enovella.pdf)

### APKLab

[APKLab](https://github.com/APKLab/APKLab "APKLab") is a Visual Studio Code extension that can unpack APKs, decompile DEX, apply patch, and rebuild APKs.
Internally it uses [apktool](https://github.com/iBotPeaches/Apktool "apktool") and [jadx](https://github.com/skylot/jadx "jadx"), so you can use those features in Visual Studio Code.
fujiokayu marked this conversation as resolved.
Show resolved Hide resolved

In addition, APKLab provides various features such as signing APKs, MITM Patch, and more.
fujiokayu marked this conversation as resolved.
Show resolved Hide resolved
For more information, you can refer to the following documentation.

- APKLab - <https://apklab.surendrajat.xyz/>
fujiokayu marked this conversation as resolved.
Show resolved Hide resolved

### Apktool

[Apktool](https://github.com/iBotPeaches/Apktool) is used to unpack Android app packages (APKs). Simply unzipping APKs with the standard `unzip` utility leaves some files unreadable. `AndroidManifest.xml` is encoded into binary XML format which isn’t readable with a text editor. Also, the app resources are still packaged into a single archive file.
Expand Down