APKLab – Android Reverse Engineering WorkBench For VS Code

APKLab - Android Reverse Engineering WorkBench For VS Code

APKLab seamlessly integrates the finest open up-source tools: Apktool, Jadx, uber-apk-signer and additional to the great VS Code so you can concentrate on app examination and get it finished with no leaving the IDE.

Options

  • Decode all the means from an APK
  • Disassemble the APK to Dalvik bytecode aka Smali
  • Decompile the APK to Java supply
  • Examine & Hack correctly with attribute-prosperous VS Code
  • Develop an APK from Smali and sources
  • Rebuild an APK in Debug manner for dynamic analysis
  • Indication the APK seamlessly in the course of the create
  • Install the APK instantly from VS Code
  • Assistance for Apktool-fashion initiatives (apktool.yml)
  • Aid for most Apktool CLI arguments
  • Android useful resource frameworks management (Coming soon!)
  • Help for person-provided keystore for APK signing
  • Down load and configure lacking dependencies
  • Great Smali language guidance with Smalise
  • Supports Linux, Windows, and Mac

Acquiring Started off

Open APK or Apktool venture

  • Open up the Command Palette (Ctrl+Shift+P) ➜ APKLab: Open up an APK

  • Or Just open an present Apktool project folder

ReBuild and Signal APK

  • Appropriate-Simply click on or within apktool.yml file ➜ APKLab: Rebuild the APK

Set up APK to system

  • Right-Simply click on .apk file (in dist listing) ➜ APKLab: Set up the APK

Demands

  • JDK 8+

    Operate java -variation in your Shell, if not observed down load from below.

  • adb

    Operate adb gadgets in your Shell, if not located test this tutorial.

  • Smalise (advisable)

    It makes functioning with smali files a breeze.

Credits

Graphic and Write-up Resource backlink

Browse Extra on Pentesting Resources

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *