diff --git a/mobile-apps-pentesting/android-app-pentesting/smali-changes.md b/mobile-apps-pentesting/android-app-pentesting/smali-changes.md index 59a69c194..b76c5be38 100644 --- a/mobile-apps-pentesting/android-app-pentesting/smali-changes.md +++ b/mobile-apps-pentesting/android-app-pentesting/smali-changes.md @@ -6,7 +6,7 @@ Sometimes it is interesting to modify the application code to access hidden info ## Fast Way -Using **Visual Code** and the extension [https://github.com/Surendrajat/APKLab](https://github.com/Surendrajat/APKLab) you can **automatically decompile**, modify and **recompile** the application without executing any command. +Using **Visual Studio Code** and the [APKLab](https://github.com/APKLab/APKLab) extension, you can **automatically decompile**, modify, **recompile**, sign & install the application without executing any command. ## Decompile the APK @@ -28,7 +28,7 @@ If `apktool` has **problems decoding the application** take a look to [https://i ## Change smali code -You can **change** **instructions**, change the **value** of some variables or **add** new instructions. I change the Smali code using [**VisualCode**](https://code.visualstudio.com/), you then download the plugin for the **smali extension** and the editor will tell you if any **instruction is incorrect**. +You can **change** **instructions**, change the **value** of some variables or **add** new instructions. I change the Smali code using [**VS Code**](https://code.visualstudio.com/), you then install the **smalise extension** and the editor will tell you if any **instruction is incorrect**. Some **examples** can be found here: * [Smali changes examples](smali-changes.md)