Tag

Smali

1 views collected around this technical thread.

37 Interactive Technology Team
37 Interactive Technology Team
May 8, 2023 · Information Security

Android Reverse Engineering: Process, Tools, and Code Examples

Android reverse engineering involves extracting an APK, decompiling it with tools like apktool, dex2jar, or JADX, analyzing and modifying Smali or Java code, recompiling and signing the package with jarsigner, and testing the changes, while using adb commands to retrieve the original file and emphasizing deeper analysis for robust security.

APKAPKToolAndroid
0 likes · 10 min read
Android Reverse Engineering: Process, Tools, and Code Examples
Baidu Intelligent Testing
Baidu Intelligent Testing
Jun 19, 2018 · Information Security

Comprehensive Guide to Android App Security, Reverse Engineering, and Protection Techniques

This article presents a detailed overview of Android app security threats, the essential components of an Android project, the full APK build and decompilation process, and a range of reverse‑engineering tools and protection strategies—including Smali analysis, SO manipulation, and signing bypass—to help developers safeguard their applications against piracy and data tampering.

APKAndroidReverse Engineering
0 likes · 13 min read
Comprehensive Guide to Android App Security, Reverse Engineering, and Protection Techniques