APKLAB:Android反向工程工作台VS代码
APKLab: Android Reverse-Engineering Workbench for VS Code

原始链接: https://github.com/APKLab/APKLab

APKLAB是直接在IDE内部综合的Android反向工程的VS代码扩展。它集成了Quark-engine,Apktool,Jadx,Uber-Apk-Signer和APK-MITM等工具,提供了简化的工作流程,用于应用程序分析,修改和调试。 关键功能包括APK解码,拆卸(SMALI),分解(Java),恶意软件分析报告,项目的GIT存储库初始化,SMALI语言支持,用于HTTPS检查的MITM补丁,SMALI的APK构建,Debug模式重建,无缝APK签名和直接安装VS Code。 它支持APKTool风格的项目,并提供配置选项,例如工具的自定义路径,用于签名的钥匙店设置以及自动工具更新。它允许清空APKTool Frameworks DIR。用户可以将路径配置为`apktool.jar`,`uber-apk-signer.jar`和`jAdx`目录。可以通过项目的错误跟踪器报告问题。

该黑客新闻线程讨论了APKLAB,这是一个vs代码的Android反向工程工作台。一些用户对这种工具的VS代码存在,但不是Android Studio表示惊讶,尽管由于功能的性质,有些人认为这是故意的。用户强调了APKLAB的MITM(中间人)拦截和分析应用网络流量的功能,并建议使用MITMProxy和HTTP Toolkit(例如,用于易于设置),以及用于易于安装的功能的替代工具,以及针对根系设置和固定的FRIDA设置等功能。另一个用户建议更简单的Android防火墙应用程序用于监视域连接。对Apklab的活动的担忧已经提高,并澄清说,它主要是其他主动更新工具的前端。
相关文章

原文

The ultimate Android RE experience right inside your VS Code.

APKLab seamlessly integrates the best open-source tools: Quark-Engine, Apktool, Jadx, uber-apk-signer, apk-mitm and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE.

Version Download Installs CI

XDA Developers Telegram Matrix

  • Decode all the resources from an APK
  • Disassemble the APK to Dalvik bytecode aka Smali
  • Decompile the APK to Java source
  • Interactive Malware Analysis Report
  • Initialize Project dir as Git repo
  • Excellent Smali language support with Smalise
  • Analyze & Hack effectively with feature-rich VS Code
  • Apply MITM patch for HTTPS inspection
  • Build an APK from Smali and resources
  • Rebuild an APK in Debug mode for dynamic analysis
  • Sign the APK seamlessly during the build
  • Install the APK directly from VS Code
  • Support for Apktool-style projects (apktool.yml)
  • Support for most Apktool CLI arguments
  • Android resource frameworks management (Coming soon!)
  • Support for user-provided keystore for APK signing
  • Download and configure missing dependencies
  • Supports Linux, Windows, and Mac

Open APK or Apktool project

Clean ApkTool frameworks dir

  • Open the Command Palette (Ctrl+Shift+P) ➜ APKLab: Empty ApkTool Framework Dir
Dependency Paths
  • apklab.apktoolPath: Full Path of apktool.jar. If you want to use a different version of it, change it like:

    "apklab.apktoolPath": "/home/oozer/downloads/apktool_2.4.1.jar"

  • apklab.apkSignerPath: Full Path of uber-apk-signer.jar. If you want to use a different version of it, change it like:

    "apklab.apkSignerPath": "/home/oozer/downloads/uber-apk-signer-1.1.0.jar"

  • apklab.jadxDirPath: Full Path of jadx-x.y.z dir. If you want to use a different version of it, change it like:

    "apklab.jadxDirPath": "/home/oozer/downloads/jadx-1.1.0"

Keystore configuration
  • apklab.keystorePath: Put the absolute path of your Java keystore(.jks or .keystore) file here.

    "apklab.keystorePath": "/home/oozer/downloads/debug.keystore"

  • apklab.keystorePassword: Put the password of your keystore here.

  • apklab.keyAlias: Put the alias of the used key in the keystore here.

  • apklab.keyPassword: Put the password of the used key in the keystore here.

Additional configuration
  • apklab.initProjectDirAsGit: Initialize project output directory as Git repository.
  • apklab.updateTools: Whether APKLab should check for tools (for apklab, jadx...) update and show a notification.

Please check our Bug tracker for known issues.

For bug reports, feature requests or simply discussing an idea, please open an issue here. PRs are always welcome.

联系我们 contact @ memedata.com