Related Tools Download: HTTP://PAN.BAIDU.COM/S/1KTKOICN
First you have to have the Eclipse tool,
ANDROID:ADB Shell: entering the interactive shell
./uiautomatorviewer: Viewing coordinates
Hack app steps:
1, using Apktool, after unpacking can modify the APK internal structure.
Apktool D letvclient_v5.5.1_from_102.apk LeTV
Apktool b LeTV
2. Re-sign the apk file
Instead of the zip suffix, delete the Meta-inf folder, repackage it, and change back to the APK file.
Signing with Jarsigner
Jarsigner-keystore ~/.android/debug.keystore-storepass android-keypass android letvclient_v5.5.1_from_102.apk Androiddebugkey: Signing Process
(Jarsigner-verbose-keystore bxp.keystore-signedjar new.apk letvclient_v5.5.1_from_102.apk bxp.keystore)
To generate a signature file:
Keytool-genkey-keystore bxp.keystore-keyalg rsa-validity 10000-alias bxp.keystore
3, install APK.
ADB install letvclient_v5.5.1_from_102.apk
4. View APK Information
/USERS/VOBILE/DOCUMENTS/APP_TRACKER/ADT-BUNDLE-MAC-X86_64-20140702//SDK/BUILD-TOOLS/ANDROID-4.4W/AAPT Dump badging letv.apk
Other:
Decoding Lua compiled files: Java-jar/users/vobile/documents/app_tracker/luadcgui/unluac.jar file >outfile
Intercept bytes:
DD if=vplayer.wdml Of=vplayer.lua Bs=1 count=71702 skip=425 conv=notrunc
Mac under Android apk hack process