Android Reverse-Engineering Workbench for VS Code
-
Updated
Apr 6, 2026 - TypeScript
Android Reverse-Engineering Workbench for VS Code
The repo contains a series of challenges for learning Frida for Android Exploitation.
一键反编译工具(不需要手动安装Python) One key for quickly decompile apk/aar/dex/jar, support by jadx/dex2jar/enjarify.
An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
🔥 Decompile APK(反编译APK)
Android Security Resources.
Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .smali, .zip, .aar, .arsc, .aab, .jadx.kts).
📖 从 0 到 1,系统化学习 Android 逆向,让学习变得有趣、好玩、易上手!
Jarida (Jadx + Frida) is a Jadx GUI plugin that lets you trace and optionally patch Java method return values at runtime using Frida, directly from Jadx’s decompiled view.
Type diagram plugin for JADX decompiler
run java method of Android in Jadx without Android device.
DeAPK is an open-source, online APK decompiler which lets you upload an APK and then decompile it to Smali or Java sources. It is built using Laravel, Vue.js, Bootstrap, FontAwesome, Pusher, Redis, MySQL, apktool, jadx and hosted atop Oracle cloud platform.
Notes taken from Android App Hacking - Black Belt Edition (UDEMY - Roman Stuehler)
A Pure-Java MCP Server for JaDX Android Reverse Engineering Tool
面向移动安全分析场景的 6 阶段总控 Skill。用于统一调度 APK 静态侦察、流量与代码对齐、SO/JNI 深度分析、加密与漏洞综合分析、验证设计与报告交付流程。支持 JADX MCP、Burp/Yakit MCP、IDA/Ghidra MCP。
Add a description, image, and links to the jadx topic page so that developers can more easily learn about it.
To associate your repository with the jadx topic, visit your repo's landing page and select "manage topics."