bdbe1384bf
* Supports ASRC with null renamed package. * Rework ASRC Chunk parser to a loop to break assumption of order of chunks * Break out unknown skips for alignment to ResourceTypes.h * Add verbose information for file skips * Add test for protected apk sample * Rework chunk parsing for StringBlock * Refactor AXML Parser to support proper header reading * Fix parsing if attribute size reported does not align to actual size |
||
---|---|---|
.github | ||
brut.apktool | ||
brut.j.common | ||
brut.j.dir | ||
brut.j.util | ||
gradle | ||
scripts | ||
.editorconfig | ||
.gitattributes | ||
.gitignore | ||
.jitpack.yml | ||
build.gradle | ||
CONTRIBUTORS.md | ||
gradlew | ||
gradlew.bat | ||
INTERNAL.md | ||
LICENSE.md | ||
README.md | ||
ROADMAP.md | ||
SECURITY.md | ||
settings.gradle |
Apktool
This is the repository for Apktool. If you are looking for the Apktool website. Click here.
It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.
It is NOT intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms and other GOOD purposes. Just try to be fair with authors of an app, that you use and probably like.
Support
Sponsored by
- Sourcetoad - helping with a weekly sponsorship for continued improvement and maintenance of the project.
IDE of Choice
Security Vulnerabilities
If you discover a security vulnerability within Apktool, please send an e-mail to Connor Tumbleson at connor.tumbleson(at)gmail.com. All security vulnerabilities will be promptly addressed.