Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Apktool | 16,372 | 10 hours ago | 3 | February 26, 2022 | 96 | apache-2.0 | Java | |||
A tool for reverse engineering Android apk files | ||||||||||
Apkleaks | 3,782 | a month ago | 11 | August 10, 2021 | 13 | apache-2.0 | Python | |||
Scanning APK file for URIs, endpoints & secrets. | ||||||||||
Apk Mitm | 2,730 | 21 hours ago | 43 | February 28, 2022 | 40 | mit | TypeScript | |||
🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection | ||||||||||
Apkstudio | 2,354 | a year ago | 28 | lgpl-3.0 | C++ | |||||
Open-source, cross platform Qt based IDE for reverse-engineering Android application packages. | ||||||||||
Apk.sh | 2,322 | a month ago | 4 | gpl-3.0 | Shell | |||||
apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK. | ||||||||||
Awesome Mobile Security | 1,684 | 2 years ago | 4 | |||||||
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it. | ||||||||||
Wechatspellbook | 1,409 | 2 | 5 years ago | 6 | May 24, 2018 | 22 | mit | Kotlin | ||
Wechat Spellbook 是一个使用Kotlin编写的开源微信插件框架,底层需要 Xposed 或 VirtualXposed 等Hooking框架的支持,而顶层可以轻松对接Java、Kotlin、Scala等JVM系语言。让程序员能够在几分钟内编写出简单的微信插件,随意揉捏微信的内部逻辑。 | ||||||||||
Dexcalibur | 929 | 4 months ago | 18 | September 27, 2021 | 30 | apache-2.0 | JavaScript | |||
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform. | ||||||||||
Andromeda | 679 | 3 years ago | apache-2.0 | C++ | ||||||
Andromeda - Interactive Reverse Engineering Tool for Android Applications | ||||||||||
Reverseapk | 631 | 5 months ago | 1 | Shell | ||||||
Quickly analyze and reverse engineer Android packages |
This is the repository for Apktool. If you are looking for the Apktool website. Click here.
It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.
It is NOT intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms and other GOOD purposes. Just try to be fair with authors of an app, that you use and probably like.
If you discover a security vulnerability within Apktool, please send an e-mail to Connor Tumbleson at connor.tumbleson(at)gmail.com. All security vulnerabilities will be promptly addressed.