hacktricks/mobile-pentesting/android-app-pentesting/apk-decompilers.md
2024-02-11 02:13:58 +00:00

85 lines
5.5 KiB
Markdown

# Wadecompilers wa APK
<details>
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PR kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
</details>
**Kwa maelezo zaidi kuhusu kila chombo angalia chapisho halisi kutoka [https://eiken.dev/blog/2021/02/how-to-break-your-jar-in-2021-decompilation-guide-for-jars-and-apks/#cfr](https://eiken.dev/blog/2021/02/how-to-break-your-jar-in-2021-decompilation-guide-for-jars-and-apks/#cfr)**
### [JD-Gui](https://github.com/java-decompiler/jd-gui)
Kama decompiler ya kwanza ya GUI ya Java, **JD-Gui** inakuwezesha kuchunguza nambari ya Java ndani ya faili za APK. Ni rahisi kutumia; baada ya kupata APK, tuifungue na JD-Gui ili tuchunguze nambari.
### [Jadx](https://github.com/skylot/jadx)
**Jadx** inatoa kiolesura rahisi cha mtumiaji kwa kudecompile nambari ya Java kutoka kwenye programu za Android. Inapendekezwa kwa urahisi wake wa matumizi kwenye majukwaa tofauti.
- Ili kuzindua GUI, nenda kwenye saraka ya bin na tekeleza: `jadx-gui`
- Kwa matumizi ya mstari wa amri, kudecompile APK na: `jadx app.apk`
- Ili kubainisha saraka ya pato au kurekebisha chaguo za kudecompile: `jadx app.apk -d <njia ya saraka ya pato> --no-res --no-src --no-imports`
### [GDA-android-reversing-Tool](https://github.com/charles2gan/GDA-android-reversing-Tool)
**GDA**, chombo kinachofanya kazi tu kwenye Windows, kinatoa huduma nyingi za kurekebisha programu za Android. Sakinisha na endesha GDA kwenye mfumo wako wa Windows, kisha pakia faili ya APK kwa uchambuzi.
### [Bytecode-Viewer](https://github.com/Konloch/bytecode-viewer/releases)
Kwa kutumia **Bytecode-Viewer**, unaweza kuchambua faili za APK kwa kutumia decompilers kadhaa. Baada ya kupakua, endesha Bytecode-Viewer, pakia APK yako, na chagua decompilers unayotaka kutumia kwa uchambuzi wa wakati mmoja.
### [Enjarify](https://github.com/Storyyeller/enjarify)
**Enjarify** inabadilisha bytecode ya Dalvik kuwa bytecode ya Java, kuruhusu zana za uchambuzi wa Java kuchambua programu za Android kwa ufanisi zaidi.
- Ili kutumia Enjarify, tekeleza: `enjarify app.apk`
Hii inazalisha bytecode ya Java inayolingana na APK iliyotolewa.
### [CFR](https://github.com/leibnitz27/cfr)
**CFR** inaweza kudecompile vipengele vya kisasa vya Java. Tumia kama ifuatavyo:
- Kwa kudecompile kawaida: `java -jar ./cfr.jar "app.jar" --outputdir "saraka_ya_pato"`
- Kwa faili kubwa za JAR, rekebisha ugawaji wa kumbukumbu ya JVM: `java -Xmx4G -jar ./cfr.jar "app.jar" --outputdir "saraka_ya_pato"`
### [Fernflower](https://github.com/JetBrains/intellij-community/tree/master/plugins/java-decompiler/engine)
**Fernflower**, decompiler ya uchambuzi, inahitaji kujengwa kutoka chanzo. Baada ya kujenga:
- Kudecompile faili ya JAR: `java -jar ./fernflower.jar "app.jar" "saraka_ya_pato"`
Kisha, chukua faili za `.java` kutoka kwenye JAR iliyozalishwa kwa kutumia `unzip`.
### [Krakatau](https://github.com/Storyyeller/Krakatau)
**Krakatau** inatoa udhibiti wa kina juu ya kudecompile, haswa kwa kushughulikia maktaba za nje.
- Tumia Krakatau kwa kubainisha njia ya maktaba ya kawaida na faili ya JAR ya kudecompile: `./Krakatau/decompile.py -out "saraka_ya_pato" -skip -nauto -path "./jrt-extractor/rt.jar" "app.jar"`
### [procyon](https://github.com/mstrobel/procyon)
Kwa kudecompile rahisi na **procyon**:
- Kudecompile faili ya JAR kwenye saraka iliyoainishwa: `procyon -jar "app.jar" -o "saraka_ya_pato"`
<details>
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
Njia nyingine za kusaidia HackTricks:
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PR kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
</details>