A tool for reverse engineering Android apk files
Go to file
2024-01-20 06:37:17 -05:00
.github build(deps): bump actions/setup-java from 3 to 4 (#3454) 2023-12-04 06:08:40 -05:00
brut.apktool test: run path traversal test on Windows 2024-01-20 06:37:17 -05:00
brut.j.common
brut.j.dir Prevent arbitrary file writes with malicious resource names. (#3484) 2024-01-05 06:28:07 -05:00
brut.j.util fix: tighten up detectPossibleDirectoryTraversal for Windows 2024-01-20 06:37:12 -05:00
gradle build(deps): bump commons-io:commons-io from 2.15.0 to 2.15.1 (#3453) 2023-12-04 06:07:01 -05:00
scripts Update Windows helper script to handle /c properly. (#2973) 2023-10-06 07:22:31 -04:00
.editorconfig
.gitattributes
.gitignore
.jitpack.yml
build.gradle.kts build: version bump (2.9.2) 2024-01-05 06:29:04 -05:00
CONTRIBUTORS.md
gradlew feat: Upgrade gradle to v8.4 (#3376) 2023-10-08 14:59:26 -04:00
gradlew.bat
INTERNAL.md Android 14 - Support for Grammatical Inflection (#3374) 2023-10-08 06:38:10 -04:00
LICENSE.md
README.md build: remove docker (#3423) 2023-11-08 06:44:46 -05:00
ROADMAP.md
SECURITY.md
settings.gradle.kts build: migrate towards "libs.versions.toml" (#3353) 2023-10-01 06:08:47 -04:00

Apktool

This is the repository for Apktool. If you are looking for the Apktool website. Click here.

CI Software License

It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.

It is NOT intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms and other GOOD purposes. Just try to be fair with authors of an app, that you use and probably like.

Support

Security Vulnerabilities

If you discover a security vulnerability within Apktool, please send an e-mail to Connor Tumbleson at connor.tumbleson(at)gmail.com. All security vulnerabilities will be promptly addressed.

Sponsors

Special thanks goes to the following sponsors:

Sourcetoad

Sourcetoad is an award-winning software and app development firm committed to the co-creation of technology solutions that solve complex business problems, delight users, and help our clients achieve their goals.

Emerge Tools

Emerge Tools is a suite of revolutionary products designed to supercharge mobile apps and the teams that build them.