dex2jar | Tools to work with android .dex and java .class files | Plugin library
kandi X-RAY | dex2jar Summary
kandi X-RAY | dex2jar Summary
Tools to work with android .dex and java .class files.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Build the interpreter .
- or if there are no bad ops
- Rebuild instructions for LDC .
- Execute a given instruction .
- Generate the class visitor .
- Wrap a class visitor .
- Make a reference to a local variable .
- Makes sure all arrays have been assigned to all arrays .
- Collect class information .
- Builds an IRMethod object from the MethodNode .
dex2jar Key Features
dex2jar Examples and Code Snippets
Community Discussions
Trending Discussions on dex2jar
QUESTION
I am trying to use R8 and proguard to remove logging from the release build. The catch is that I need to this be minimally invasive at the moment, so I would like to enable R8/proguard to remove logs, but turn off everything else. IE minifcation, obfuscation, etc.
build.gradle:
...ANSWER
Answered 2022-Mar-22 at 14:44Please remove debuggable true line from release block that's why you are seeing logs in build.
QUESTION
When using Proguard some methods bodies are replaced by this:
...ANSWER
Answered 2021-Feb-22 at 17:36There is no difference in what ProGuard does between these two methods.
The difference is in the tool you're using to read ProGuard's output: what bytecode it can and can't decompile to make it look like normal Java source.
QUESTION
First of all, sorry for my english. This is not my native language. This is the first time I do something like that so i learn on the go.
Context: I try to understand how the game I installed from the Play store communicates with the server. More precisely, how a specific parameter is set on a every POST request to the server.
This HTTP parameter called 'secret' cannot be reversed engineer easily as it is a kind of hash of the others parameters to check the integrity of the request.
What i've done:
- I extracted the .dex files from the .apk
- I used d2j-dex2jar to extract the .class files.
- I used jd-gui tool to analyse the source code
What i've found: This is the source code that generates the value for the 'secret' parameter:
...ANSWER
Answered 2020-Jul-13 at 17:51Answer to question 1:
I found that multiple .apk were installed for the game. My error was to trust the app Apk Extractor that gave me only the base .apk
I connect through SSH to my phone and list all the .apk installed. Several .apk were installed in the /data/app/ folder of my game !
- One was dedicated to the base source code (the one i got from Apk Extractor)
- One .apk that store only the native libraries (libMain.so)
Answer to question 2:
I used the command readelf -s libMain.so | grep '
to retrieve the function address. The output was something like that 00000000003c69b4
readelf -h libMain.so
: gave me the architecture in which the library has been built aka AArch64.
I downloaded the same toolchain that has been used to compile the binary:
$> sudo apt-get install binutils-aarch64-linux-gnu
And then used it with this command:
$> aarch64-linux-gnu-objdump -d libMain.so --start-address=0x3c69b4
The start-adress value is set with the return value of the first command
And now i have assembly code that i need to reverse engineer !
QUESTION
I get random classes and object within real classes after decompile using jdax or dex2jar for example in this class I found inside more than 4 unknown object pb4,w64,mb4,f84,h84
...ANSWER
Answered 2020-May-27 at 01:04This is the result of Obfuscate progress when app is build. The idea of Obfuscate is Making the code become hard to read, understanding after decompiling. For more information, you should search the keywords Obfuscate
QUESTION
I ran an APK through dex2jar
and JD-GUI
and found the class I'm interested in:
ANSWER
Answered 2020-May-01 at 12:56This call in Java:
.\u0971("www.google.com", new String[] {"sha256/asdIa1tHg96AnzarJ6GJLu6JiogJla3UDsPWMDICs=" })
is found in smali at:
invoke-virtual {v1, v2, v3}, Lo/bdq$if;->ॱ(Ljava/lang/String;[Ljava/lang/String;)Lo/bdq$if;
The Java class is o.bdq$if
(class if
is nested inside o.bdq
). The method name is ॱ
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install dex2jar
You can use dex2jar like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the dex2jar component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page