APKLab – Android Reverse Engineering WorkBench For VS Code

APKLab seamlessly integrates the finest open up-source tools: Apktool, Jadx, uber-apk-signer and additional to the great VS Code so you can concentrate on app examination and get it finished with no leaving the IDE.
Options
- Decode all the means from an APK
- Disassemble the APK to Dalvik bytecode aka Smali
- Decompile the APK to Java supply
- Examine & Hack correctly with attribute-prosperous VS Code
- Develop an APK from Smali and sources
- Rebuild an APK in Debug manner for dynamic analysis
- Indication the APK seamlessly in the course of the create
- Install the APK instantly from VS Code
- Assistance for Apktool-fashion initiatives (
apktool.yml
) - Aid for most Apktool CLI arguments
- Android useful resource frameworks management (Coming soon!)
- Help for person-provided keystore for APK signing
- Down load and configure lacking dependencies
- Great Smali language guidance with Smalise
- Supports Linux, Windows, and Mac
Acquiring Started off
Open APK or Apktool venture
-
Open up the Command Palette (Ctrl+Shift+P) ➜ APKLab: Open up an APK
-
Or Just open an present Apktool project folder
ReBuild and Signal APK
-
Appropriate-Simply click on or within
apktool.yml
file ➜ APKLab: Rebuild the APK
Set up APK to system
-
Right-Simply click on
.apk
file (indist
listing) ➜ APKLab: Set up the APK
Demands
-
JDK 8+
Operate
java -variation
in your Shell, if not observed down load from below. -
adb
Operate
adb gadgets
in your Shell, if not located test this tutorial. -
Smalise (advisable)
It makes functioning with
smali
files a breeze.
Credits
- Feimaomii for the great symbol
- Aman Sharma for enhanced Windows aid
- iBotPeaches, brutall and JesusFreke for Apktool & Smali
- patrickfav for uber-apk-signer
- skylot for Jadx