androguard
Reverse engineering tool for Android applications. Written in Python.
- Display Android app manifest:
androguard axml {path/to/app.apk}
- Display app metadata (version and app ID):
androguard apkid {path/to/app.apk}
- Decompile Java code from an app:
androguard decompile {path/to/app.apk} --output {path/to/directory}
Copyright © 2014—present the tldr-pages team and contributors.
This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).