Tag

APKTool

0 views collected around this technical thread.

37 Interactive Technology Team
37 Interactive Technology Team
May 8, 2023 · Information Security

Android Reverse Engineering: Process, Tools, and Code Examples

Android reverse engineering involves extracting an APK, decompiling it with tools like apktool, dex2jar, or JADX, analyzing and modifying Smali or Java code, recompiling and signing the package with jarsigner, and testing the changes, while using adb commands to retrieve the original file and emphasizing deeper analysis for robust security.

APKAPKToolAndroid
0 likes · 10 min read
Android Reverse Engineering: Process, Tools, and Code Examples
Baidu Intelligent Testing
Baidu Intelligent Testing
Mar 15, 2017 · Information Security

Comprehensive Guide to Android Application Security Scanning and Reverse Engineering

This article provides a step‑by‑step tutorial on setting up the development environment, installing essential tools, and performing APK reverse engineering and security analysis on Android applications, covering JDK, SDK, NDK, Apktool, Dex2jar, JD‑GUI, IDA, WinHex, and Eclipse.

APKAPKToolAndroid
0 likes · 16 min read
Comprehensive Guide to Android Application Security Scanning and Reverse Engineering
360 Quality & Efficiency
360 Quality & Efficiency
Aug 29, 2016 · Information Security

Android Security Testing Guide

This guide explains how to use APKTool to decompile Android apps, inspect the AndroidManifest.xml for exposed components, and employ the Drozer framework to enumerate packages, assess component exposure, detect content provider leaks, SQL injection, file traversal, and service vulnerabilities.

APKToolAndroidDrozer
0 likes · 5 min read
Android Security Testing Guide