Welcome to the CoderBoard Community!

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to exclusive download links, post topics, communicate privately with other members (conversations), respond to polls, share content and access many other special features.
Registration is fast, simple and absolutely FREE so please, join our community today!

Click Here to Sign Up Now!

Android Reverse Engineering 101 Series

Discussion in 'Android Development Discussion' started by beastie, Dec 2, 2015.

  1. beastie

    beastie Well-Known Member

    Joined:
    Dec 1, 2015
    Messages:
    495
    Likes Received:
    6,922
    In this series I will cover the anatomy of the APK and AAR package formats and few tools commonly used to reverse engineering or inspecting applications: aapt, dex2jar, apktool and Androguard.
    Code:
    http://www.fasteque.com/android-reverse-engineering-101-part-1/
    http://www.fasteque.com/android-reverse-engineering-101-part-2/
    http://www.fasteque.com/android-reverse-engineering-101-part-3/
    http://www.fasteque.com/android-reverse-engineering-101-part-4/
     
    #1

Share This Page