<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>apk</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1317/feed"/>
    <updated>2026-04-30T23:28:54+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1317/feed</id>
            <entry>
            <id>https://links.biapy.com/links/11597</id>
            <title type="text"><![CDATA[🕹️ apk.sh]]></title>
            <link rel="alternate" href="https://github.com/ax/apk.sh" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11597"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Makes reverse engineering Android apps easier, automating repetitive tasks like pulling, decoding, rebuilding and patching an APK. 

apk.sh is a Bash script that makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.

Related contents:

- [apk.sh - Le couteau suisse qui simplifie le reverse engineering Android @ Korben :fr:](https://korben.info/apk-sh-reverse-engineering-android.html).]]>
            </summary>
            <updated>2026-01-26T08:16:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1868</id>
            <title type="text"><![CDATA[Apktool]]></title>
            <link rel="alternate" href="https://apktool.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1868"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A tool for reverse engineering Android apk files.

Apktool is a tool for reverse engineering third-party, closed, binary, Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes it possible to debug smali code step-by-step. It also makes working with apps easier thanks to project-like file structure and automation of some repetitive tasks such as building apk, etc.

- [Apktool @ GitHub](https://github.com/iBotPeaches/Apktool).]]>
            </summary>
            <updated>2025-08-28T21:08:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5014</id>
            <title type="text"><![CDATA[AMAnDe]]></title>
            <link rel="alternate" href="https://github.com/StackeredSAS/AMAnDe" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5014"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Extract, gather and analyze information from an Android Manifest file or an APK.

AMAnDe stands for Android Manifest Anomaly Detector. It&amp;#039;s a new tool whose objective is to extract and gather information from an Android Manifest. When we deal with huge Manifests, it is often difficult to get all relevant datas (like deeplink URIs, exported provider, etc.) With AMAnDe all of this information is deeply analyzed and presented to you in a simple manner.]]>
            </summary>
            <updated>2025-08-29T05:52:19+00:00</updated>
        </entry>
    </feed>
