This project attempts to create a valid Java source code from disassembled code used by Dalvik
Main goal of this project is to validate how well your obfuscation strategy works, and what the attacker would be able to gather from your source.
Read the specification here: https://source.android.com/devices/tech/dalvik/dalvik-bytecode.html
Why would you need it if there are tools like https://bytecodeviewer.com/?
- You can recreate an entire application with a single command
- Allows you to use other command line tools on the output
- Go 1.18+
go build
First, you'll need an APK that you want to decompile
brew install apktool
apktool d ./<your_apk>
You'll get a directory, which contains among others a directory called smali
Now you can run Smali2Java on this directory:
smali2java -path_to_smali=<smali_directory>
The resulting Java files will be put beside the Smali ones.
The tool doesn't distinguish between Java and Kotlin. Decompile results will always be Java files.
MIT