APKLab - Android Reverse Engineering WorkBench For VS Code


APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE.


Features
  • Decode all the resources from an APK
  • Disassemble the APK to Dalvik bytecode aka Smali
  • Decompile the APK to Java source
  • Analyze & Hack effectively with feature-rich VS Code
  • Build an APK from Smali and resources
  • Rebuild an APK in Debug mode for dynamic analysis
  • Sign the APK seamlessly during the build
  • Install the APK directly from VS Code
  • Support for Apktool-style projects (apktool.yml)
  • Support for most Apktool CLI arguments
  • Android resource frameworks management (Coming soon!)
  • Support for user-provided keystore for APK signing
  • Download and configure missing dependencies
  • Excellent Smali language support with Smalise
  • Supports Linux, Windows, and Mac

Getting Started

Open APK or Apktool project
  • Open the Command Palette (Ctrl+Shift+P) ➜ APKLab: Open an APK


  • Or Just open an existing Apktool project folder


ReBuild and Sign APK
  • Right-Click on or inside apktool.yml file ➜ APKLab: Rebuild the APK


Install APK to device
  • Right-Click on .apk file (in dist directory) ➜ APKLab: Install the APK


Requirements
  • JDK 8+

    Run java -version in your Shell, if not found download from here.

  • adb

    Run adb devices in your Shell, if not found check this guide.

  • Smalise (recommended)

    It makes working with smali files a breeze.


Credits


APKLab - Android Reverse Engineering WorkBench For VS Code APKLab - Android Reverse Engineering WorkBench For VS Code Reviewed by Zion3R on 5:30 PM Rating: 5