dex2jar | Tools to work with android .dex and java .class files | Plugin library

 by   pxb1988 Java Version: v2.2-SNAPSHOT-2021-10-31 License: Apache-2.0

kandi X-RAY | dex2jar Summary

kandi X-RAY | dex2jar Summary

dex2jar is a Java library typically used in Plugin, Gradle applications. dex2jar has no bugs, it has no vulnerabilities, it has build file available, it has a Permissive License and it has high support. You can download it from GitHub.

Tools to work with android .dex and java .class files.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              dex2jar has a highly active ecosystem.
              It has 10926 star(s) with 1984 fork(s). There are 443 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 385 open issues and 162 have been closed. On average issues are closed in 425 days. There are 6 open pull requests and 0 closed requests.
              OutlinedDot
              It has a negative sentiment in the developer community.
              The latest version of dex2jar is v2.2-SNAPSHOT-2021-10-31

            kandi-Quality Quality

              dex2jar has 0 bugs and 0 code smells.

            kandi-Security Security

              dex2jar has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              dex2jar code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              dex2jar is licensed under the Apache-2.0 License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              dex2jar releases are available to install and integrate.
              Build file is available. You can build the component from source.
              dex2jar saves you 18435 person hours of effort in developing the same functionality from scratch.
              It has 36026 lines of code, 2248 functions and 329 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed dex2jar and discovered the below as its top functions. This is intended to give you an instant insight into dex2jar implemented functionality, and help decide if they suit your requirements.
            • Build the interpreter .
            • or if there are no bad ops
            • Rebuild instructions for LDC .
            • Execute a given instruction .
            • Generate the class visitor .
            • Wrap a class visitor .
            • Make a reference to a local variable .
            • Makes sure all arrays have been assigned to all arrays .
            • Collect class information .
            • Builds an IRMethod object from the MethodNode .
            Get all kandi verified functions for this library.

            dex2jar Key Features

            No Key Features are available at this moment for dex2jar.

            dex2jar Examples and Code Snippets

            No Code Snippets are available at this moment for dex2jar.

            Community Discussions

            QUESTION

            Using R8 and proguard to remove logging, but turn off everything else
            Asked 2022-Mar-22 at 14:44

            I am trying to use R8 and proguard to remove logging from the release build. The catch is that I need to this be minimally invasive at the moment, so I would like to enable R8/proguard to remove logs, but turn off everything else. IE minifcation, obfuscation, etc.

            build.gradle:

            ...

            ANSWER

            Answered 2022-Mar-22 at 14:44

            Please remove debuggable true line from release block that's why you are seeing logs in build.

            Source https://stackoverflow.com/questions/71443326

            QUESTION

            Proguard method optimization
            Asked 2021-Feb-22 at 20:27

            When using Proguard some methods bodies are replaced by this:

            ...

            ANSWER

            Answered 2021-Feb-22 at 17:36

            There is no difference in what ProGuard does between these two methods.

            The difference is in the tool you're using to read ProGuard's output: what bytecode it can and can't decompile to make it look like normal Java source.

            Source https://stackoverflow.com/questions/66320587

            QUESTION

            Can't find native libraries used by apk on my phone
            Asked 2020-Jul-13 at 17:51

            First of all, sorry for my english. This is not my native language. This is the first time I do something like that so i learn on the go.

            Context: I try to understand how the game I installed from the Play store communicates with the server. More precisely, how a specific parameter is set on a every POST request to the server.
            This HTTP parameter called 'secret' cannot be reversed engineer easily as it is a kind of hash of the others parameters to check the integrity of the request.

            What i've done:

            1. I extracted the .dex files from the .apk
            2. I used d2j-dex2jar to extract the .class files.
            3. I used jd-gui tool to analyse the source code

            What i've found: This is the source code that generates the value for the 'secret' parameter:

            ...

            ANSWER

            Answered 2020-Jul-13 at 17:51

            Answer to question 1:

            I found that multiple .apk were installed for the game. My error was to trust the app Apk Extractor that gave me only the base .apk

            I connect through SSH to my phone and list all the .apk installed. Several .apk were installed in the /data/app/ folder of my game !

            • One was dedicated to the base source code (the one i got from Apk Extractor)
            • One .apk that store only the native libraries (libMain.so)

            Answer to question 2:

            I used the command readelf -s libMain.so | grep ' to retrieve the function address. The output was something like that 00000000003c69b4

            readelf -h libMain.so : gave me the architecture in which the library has been built aka AArch64.

            I downloaded the same toolchain that has been used to compile the binary:
            $> sudo apt-get install binutils-aarch64-linux-gnu

            And then used it with this command:
            $> aarch64-linux-gnu-objdump -d libMain.so --start-address=0x3c69b4
            The start-adress value is set with the return value of the first command

            And now i have assembly code that i need to reverse engineer !

            Source https://stackoverflow.com/questions/62851705

            QUESTION

            unkowen classes after decompile using jdax/dex2jar
            Asked 2020-May-27 at 01:23

            I get random classes and object within real classes after decompile using jdax or dex2jar for example in this class I found inside more than 4 unknown object pb4,w64,mb4,f84,h84

            ...

            ANSWER

            Answered 2020-May-27 at 01:04

            This is the result of Obfuscate progress when app is build. The idea of Obfuscate is Making the code become hard to read, understanding after decompiling. For more information, you should search the keywords Obfuscate

            Source https://stackoverflow.com/questions/62033804

            QUESTION

            Frida: Replace string literal in class method
            Asked 2020-May-01 at 12:56

            I ran an APK through dex2jar and JD-GUI and found the class I'm interested in:

            ...

            ANSWER

            Answered 2020-May-01 at 12:56

            This call in Java:
            .\u0971("www.google.com", new String[] {"sha256/asdIa1tHg96AnzarJ6GJLu6JiogJla3UDsPWMDICs=" })
            is found in smali at:
            invoke-virtual {v1, v2, v3}, Lo/bdq$if;->ॱ(Ljava/lang/String;[Ljava/lang/String;)Lo/bdq$if;

            The Java class is o.bdq$if (class if is nested inside o.bdq). The method name is

            Source https://stackoverflow.com/questions/61526059

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install dex2jar

            You can download it from GitHub.
            You can use dex2jar like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the dex2jar component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries