A tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.
It is NOT intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms, analyzing applications and much more.
Features Disassembling resources to nearly original form (including resources.arsc, classes.dex, 9.png. and XMLs) Rebuilding decoded resources back to binary APK/JAR Organizing and handling APKs that depend on framework resources Smali Debugging (Removed in 2.1.0 in favor of IdeaSmali) Helping with repetitive tasks
Authors: Connor Tumbleson – Current Maintainer Ryszard Wiśniewski – Original Creator What’s New: – Commits on Jul 4, 2021 Merge pull request #2605 from IgorEisberg/master style: return DexFile interface from SmaliDecoder – Commits on Jul 3, 2021 Determine minSdkVersion with baksmali for JARs + don’t compress webp Merge pull request #2604 from IgorEisberg/master correction: don’t clear resource table if it was already loaded style: organize some using statements for consistency clean: get rid of useless throws fix: pass opcodes=null for baksmali to auto-determine by dex version Avoid abuse of getResTable calls and unneeded checks clean: setTargetSdkVersion used before manifest was decoded Handle setAnalysisMode properly style: rename vars for consistency https://github.com/iBotPeaches/Apktool/commits/master