dex2jar | Tools to work with android .dex and java .class files | Plugin library

 by   gcacace Java Version: Current License: No License

kandi X-RAY | dex2jar Summary

kandi X-RAY | dex2jar Summary

dex2jar is a Java library typically used in Plugin, Gradle applications. dex2jar has no vulnerabilities, it has build file available and it has high support. However dex2jar has 34 bugs. You can download it from GitHub.

Tools to work with android .dex and java .class files. ###Looking for help Please send email to dex2jar@googlegroups.com or post at dex2jar-google-group.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              dex2jar has a highly active ecosystem.
              It has 6 star(s) with 1 fork(s). There are 1 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 27 open issues and 214 have been closed. There are no pull requests.
              OutlinedDot
              It has a negative sentiment in the developer community.
              The latest version of dex2jar is current.

            kandi-Quality Quality

              OutlinedDot
              dex2jar has 34 bugs (10 blocker, 0 critical, 8 major, 16 minor) and 1548 code smells.

            kandi-Security Security

              dex2jar has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              dex2jar code analysis shows 0 unresolved vulnerabilities.
              There are 24 security hotspots that need review.

            kandi-License License

              dex2jar does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              dex2jar releases are not available. You will need to build from source code and install.
              Build file is available. You can build the component from source.
              dex2jar saves you 10725 person hours of effort in developing the same functionality from scratch.
              It has 21767 lines of code, 1361 functions and 218 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed dex2jar and discovered the below as its top functions. This is intended to give you an instant insight into dex2jar implemented functionality, and help decide if they suit your requirements.
            • Print class
            • Print an annotation value
            • Create a string representation of the given access code
            • Prints the given object
            • Transform a set of statements into their equivalent form
            • Execute a value
            • Calculate the expression for a given statement
            • Overrides the visitor to reset the local variable location
            • Overrides the visitor to look for a local variable
            • Transforms an IRMethod into a constant type
            • Determines the command line
            • Main entry point to test
            • Transforms the given IRMethod recursively
            • Assembles the command line
            • Analyze the local phi
            • Accessor for the class
            • Do nothing
            • Transform the local variables
            • Visits a method
            • Do the output
            • Builds a direct jump list
            • Converts a utf - 8 encoded byte array into a String
            • Visit a binary opcode
            • Signs a file and writes it to a file
            • Do not overwrite access
            • Output the class information
            Get all kandi verified functions for this library.

            dex2jar Key Features

            No Key Features are available at this moment for dex2jar.

            dex2jar Examples and Code Snippets

            No Code Snippets are available at this moment for dex2jar.

            Community Discussions

            QUESTION

            Using R8 and proguard to remove logging, but turn off everything else
            Asked 2022-Mar-22 at 14:44

            I am trying to use R8 and proguard to remove logging from the release build. The catch is that I need to this be minimally invasive at the moment, so I would like to enable R8/proguard to remove logs, but turn off everything else. IE minifcation, obfuscation, etc.

            build.gradle:

            ...

            ANSWER

            Answered 2022-Mar-22 at 14:44

            Please remove debuggable true line from release block that's why you are seeing logs in build.

            Source https://stackoverflow.com/questions/71443326

            QUESTION

            Proguard method optimization
            Asked 2021-Feb-22 at 20:27

            When using Proguard some methods bodies are replaced by this:

            ...

            ANSWER

            Answered 2021-Feb-22 at 17:36

            There is no difference in what ProGuard does between these two methods.

            The difference is in the tool you're using to read ProGuard's output: what bytecode it can and can't decompile to make it look like normal Java source.

            Source https://stackoverflow.com/questions/66320587

            QUESTION

            Can't find native libraries used by apk on my phone
            Asked 2020-Jul-13 at 17:51

            First of all, sorry for my english. This is not my native language. This is the first time I do something like that so i learn on the go.

            Context: I try to understand how the game I installed from the Play store communicates with the server. More precisely, how a specific parameter is set on a every POST request to the server.
            This HTTP parameter called 'secret' cannot be reversed engineer easily as it is a kind of hash of the others parameters to check the integrity of the request.

            What i've done:

            1. I extracted the .dex files from the .apk
            2. I used d2j-dex2jar to extract the .class files.
            3. I used jd-gui tool to analyse the source code

            What i've found: This is the source code that generates the value for the 'secret' parameter:

            ...

            ANSWER

            Answered 2020-Jul-13 at 17:51

            Answer to question 1:

            I found that multiple .apk were installed for the game. My error was to trust the app Apk Extractor that gave me only the base .apk

            I connect through SSH to my phone and list all the .apk installed. Several .apk were installed in the /data/app/ folder of my game !

            • One was dedicated to the base source code (the one i got from Apk Extractor)
            • One .apk that store only the native libraries (libMain.so)

            Answer to question 2:

            I used the command readelf -s libMain.so | grep ' to retrieve the function address. The output was something like that 00000000003c69b4

            readelf -h libMain.so : gave me the architecture in which the library has been built aka AArch64.

            I downloaded the same toolchain that has been used to compile the binary:
            $> sudo apt-get install binutils-aarch64-linux-gnu

            And then used it with this command:
            $> aarch64-linux-gnu-objdump -d libMain.so --start-address=0x3c69b4
            The start-adress value is set with the return value of the first command

            And now i have assembly code that i need to reverse engineer !

            Source https://stackoverflow.com/questions/62851705

            QUESTION

            unkowen classes after decompile using jdax/dex2jar
            Asked 2020-May-27 at 01:23

            I get random classes and object within real classes after decompile using jdax or dex2jar for example in this class I found inside more than 4 unknown object pb4,w64,mb4,f84,h84

            ...

            ANSWER

            Answered 2020-May-27 at 01:04

            This is the result of Obfuscate progress when app is build. The idea of Obfuscate is Making the code become hard to read, understanding after decompiling. For more information, you should search the keywords Obfuscate

            Source https://stackoverflow.com/questions/62033804

            QUESTION

            Frida: Replace string literal in class method
            Asked 2020-May-01 at 12:56

            I ran an APK through dex2jar and JD-GUI and found the class I'm interested in:

            ...

            ANSWER

            Answered 2020-May-01 at 12:56

            This call in Java:
            .\u0971("www.google.com", new String[] {"sha256/asdIa1tHg96AnzarJ6GJLu6JiogJla3UDsPWMDICs=" })
            is found in smali at:
            invoke-virtual {v1, v2, v3}, Lo/bdq$if;->ॱ(Ljava/lang/String;[Ljava/lang/String;)Lo/bdq$if;

            The Java class is o.bdq$if (class if is nested inside o.bdq). The method name is

            Source https://stackoverflow.com/questions/61526059

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install dex2jar

            You can download it from GitHub.
            You can use dex2jar like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the dex2jar component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/gcacace/dex2jar.git

          • CLI

            gh repo clone gcacace/dex2jar

          • sshUrl

            git@github.com:gcacace/dex2jar.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link