Connor Tumbleson 8254764c6c More robust ResFileValue detection
Previously in 4882396163f978884256e008fc7fae9201f156b4, strings that
resembled a filepath (ie res/foo/file), would be assigned to a
ResFileValue, which when attempted to be casted to ResScalarValue would
error out.

Attempting to check the filesystem for such files, slowed apktool's
execution majorly. In order to prevent this, the ClassCastException
and other checks related to checking ResFileValue when type is string
was added.

This allows bogus strings such as (res/foo/file) to be added, but the
exception is caught and allows decoding to continues. Fixes #921.
2015-05-14 13:27:22 -05:00
2015-03-14 08:02:57 -05:00
2015-03-14 08:02:57 -05:00
2015-05-01 09:15:56 -05:00
2015-03-14 08:02:57 -05:00
2014-11-02 07:48:56 -06:00
2015-05-02 06:59:36 -05:00
2015-03-30 08:06:18 -05:00
2015-03-14 08:02:57 -05:00
2015-03-14 08:02:57 -05:00
2015-03-18 11:05:55 -05:00
2014-10-23 17:43:37 -05:00

Apktool

This is the repository for Apktool. If you are looking for the Apktool website. Click here.

Build Status Software License Project Status

It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.

It is NOT intended for piracy and other non-legal uses. It could be used for localizing, adding some features or support for custom platforms and other GOOD purposes. Just try to be fair with authors of an app, that you use and probably like.

Support

Description
A tool for reverse engineering Android apk files
Readme 306 MiB
Languages
Java 98.6%
Shell 0.7%
Smali 0.5%
Batchfile 0.2%