Are the users able to convert the apk file of my application back to the actual code? If they do - is there any way to prevent this?
This question is related to
android
obfuscation
apk
decompiling
dex
ApkTool to view resources inside APK File
apktool.bat d sampleApp.apk
Using dex2jar
dex2jar sampleApp.apk
Decompiling .jar using JD-GUI
Download this jadx tool https://sourceforge.net/projects/jadx/files/
Unzip it and than in lib folder run jadx-gui-0.6.1.jar file now browse your apk file. It's done. Automatically apk will decompile and save it by pressing save button. Hope it will work for you. Thanks
Yes, there are tons of software available to decompile a .apk file.
Recently, I had compiled an ultimate list of 47 best APK decompilers on my website. I arranged them into 4 different sections.
I hope this collection will be helpful to you.
Sometimes you get broken code, when using dex2jar
/apktool
, most notably in loops. To avoid this, use jadx, which decompiles dalvik bytecode into java source code, without creating a .jar
/.class
file first as dex2jar
does (apktool uses dex2jar I think). It is also open-source and in active development. It even has a GUI, for GUI-fanatics. Try it!
I may also add, that nowadays it is possible to decompile Android application online, no software needed!
Here are 2 options for you:
Are the users able to convert the apk file of my application back to the actual code?
yes.
People can use various tools to:
FDex2
to dump out dex
file
dex2jar
to convert to jar
jadx
to conver to java
source codeIf they do - is there any way to prevent this?
yes. Several (can combined) ways to prevent (certain degree) this:
ProGuard
More details can refer my Chinese tutorial: ??????????
Source: Stackoverflow.com