transferred from: http://blog.csdn.net/vipzjyno1/article/details/21039349/ [Top] Android apk anti-compilation is so simple to explain (drawings)Category: Android2014-03-11 22:06 134039 people read reviews (+) collection report Android obfuscation anti-compilation ApkjarIn learning the process of Android development you, you tend to learn how other people's application is developed, those beautiful anima
the androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside will be a,b,c .... Style naming, so you can find that you want to know the interface code may be very laborious, found the c
Turn from: http://blog.csdn.net/vipzjyno1/article/details/21039349 not triedIn learning the process of Android development you, you tend to learn how other people's application is developed, those beautiful animations and exquisite layout may let you put it down, as a developer, you may want to know how these effects interface is to achieve, at this time, You can then reverse-compile the app's apk. Here is a brief tutorial on some of the articles I've consulted.(Note: Anti-compilation is not to
: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside will be a,b,c .... Style naming, so you can find that yo
, which now provides a graphical anti-compilation tool: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside wi
, which now provides a graphical anti-compilation tool: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside wi
, which now provides a graphical anti-compilation tool: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside wi
opened. Dex2jar.jar file, you can see the source code, the effect is as follows:(The name of the class file and the name of the method inside will be a,b,c ...). Style name):Three, graphical anti-compilation apk (I have not used)Step one or two above describes the command-line anti-compilation apk, which now provides a graphical anti-compilation tool: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe
, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside will be a,b,c .... Style naming, so you can find that you want to know the interface code may be very laborious, found the code may seem to be very laborious, but a general idea will be obtained, with th
)Step one or two above describes the command-line anti-compilation apk, which now provides a graphical anti-compilation tool: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then t
, which now provides a graphical anti-compilation tool: AndroidfbyFirst, download the Anti-compilation toolkit above, open the Androidfby directory, double-click the Android Anti-compilation tool,. exe, you can browse to open the apk you want to decompileWith the anti-compilation, you can learn what the application uses for the 3rd-party library file, how its code is written, and so on.However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside wi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.