Reverse Android Application
how to reverse engineer an Android Application and what tools you can use to achieve this - even without owning an Android Phone. - The EPIC.blog
- Android Tampering and Reverse Engineering
- How to reverse engineer Unity3D Games?
- Reverse engineering a Unity-based Android game
- Deep dive into UnityFS: structure and implementation - UnityFS was a new asset bundle format introduced in Unity 5.
- UnityPack - A library to deserialize Unity3D Assets and AssetBundles files (*.unity3d).
- Extract Images and Textures from Unity Games
- UABE - Asset Bundle Extractor
Where is main() in Android?
Find a class which is a subclass of Activity
and which is set as a LAUNCHER to start the execution of the application from its onCreate()
method.
Activty are listed in the AndroidManifest.xml
file.
Tools
-
JADX (flatpak) - CLI GUI. It can run directly on APK / DEX combo without the extra step. It has also magical ability to deal with deobfuscation and from what I can tell the best full text search, declaration jumping and usage lookup. - Apktool -
apktool d -r -s [your game].apk
Unity
Latest version of C#code are transpilled to cpp.
- Il2CppDumper / linux
- dnSpy - a debugger and .NET assembly editor (windows)
- ILSpy - the open-source .NET assembly browser and decompiler.
Android Crackmes
see also
Written on February 18, 2023, Last update on August 2, 2024
reverse
android
blog