Two tools are required to decompile and view the source code: Dex2jar and Jdgui
Dex2jar (Google Code)
Jdgui (Google code), the latest version please see the official
The operation is simple and the steps are as follows:
1. Copy the APK (e.g. guessstock.apk) to the Dex2jar directory and execute it under cmd:
C:\users\raozf\desktop\dex2jar-0.0.9.15>d2j-dex2jar.bat guessstock.apk
Dex2jar guessstock.apk-Guessstock-dex2jar.jar
Will get Guessstock-dex2jar.jar
2. Jdgui open the file to view the source code.
See more: http://blog.csdn.net/ithomer/article/details/6727581
I use this method to decompile a number of popular apps, in addition to Sogou input method anti-compilation failure, Baidu map, QQ browser, mobile phone QQ, Youku, cool and so on have been successful.
Look at their code, some of the code to do obfuscation (Baidu map, mobile phone QQ), some seem to deal with the less clean (Youku, cool)-class name, method name, variable name and even token can be seen, of course, is not very important code. It's a bit strange anyway.
Android APK anti-compilation and code obfuscation