Peter Retzlaff 05f81f9dd0 Change zero-byte-file tests so they test the correct behavior.
* The empty test file needs to be STORED in the testapp, so put it on
  the initial doNotCompress list.
* It needs to have a file extension that matches the NO_COMPRESS_PATTERN.
* assertNotSame tests for object equality, which doesn't work for String
  comparisons.
2020-06-09 07:05:43 -04:00
2017-09-15 08:07:20 -04:00
2020-02-29 17:34:52 -08:00
2019-07-13 07:52:37 -04:00
2019-09-05 15:32:54 -07:00
2019-09-05 15:32:54 -07:00
2016-02-27 20:20:53 -05:00
2019-07-14 08:09:21 -04:00
2016-02-27 20:20:53 -05:00

Apktool

This is the repository for Apktool. If you are looking for the Apktool website. Click here.

Join the chat at https://gitter.im/iBotPeaches/Apktool Build Status Software License

It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.

It is NOT intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms and other GOOD purposes. Just try to be fair with authors of an app, that you use and probably like.

Support

Sponsored by

  • Sourcetoad - helping with a weekly sponsorship for continued improvement and maintenance of the project.

IDE of Choice

JetBrains IntelliJ

Security Vulnerabilities

If you discover a security vulnerability within Apktool, please send an e-mail to Connor Tumbleson at connor.tumbleson(at)gmail.com. All security vulnerabilities will be promptly addressed.

Description
A tool for reverse engineering Android apk files
Readme 340 MiB
Languages
Java 98.6%
Shell 0.7%
Smali 0.5%
Batchfile 0.2%