Android reverse engineering tool Dare usage (in Mac OS X), android Reverse Engineering
In fact, this log is very simple. Try to finish it in two sentences. Dare is an apk reverse engineering tool released by the computer department of the University of Pennsylvania. Decompile the apk file used in the Android system into a Java Class file. Currently supports Linux and Mac OS X, the use of Mac is particularly simple, on this page: http://siis.cse.psu.edu/dare/downloads.html provides Executable File Download, download and decompress the package in the terminal to enter its directory, input:
bash dare -d apkoutput WeChat_462.apk
The above uses the latest version 5.3 as an example.-d is followed by the Output Folder. After running, the retargeted directory in this folder is the decompiled Java Class file. Next, we can use any Java decompilation tool (such as this) to view its source code (of course, this is obfuscated ). Is a piece of code under the qqpinyin directory.
Is there any reverse engineering tool for Android? What is the effect?
1. Yes.
A) Reverse source code: the android installer apk is a compressed package. You can directly decompress the package using the decompression tool (such as winrar). The most important reason is that there is a dex file (classes. dex, program code in this), you can use dex2jar to reverse the jar file, use jdgui and other tools to view the source code. Generally, the program will be confused, so it is more difficult to read (methods and class names are basically meaningless names such as a, B, and c ).
B) Resource inversion: a gui tool for failover;
2. The effect is not necessarily determined by many aspects.
Differences between Mac OS X and android
Mac OS x is a private system for Apple Computers. android is a private system for mobile phones and tablets. It is a wide range of open-source software.