-- Leo's gemini proxy

-- Connecting to freeshell.de:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

androguard


> Reverse engineering tool for Android applications. Written in Python.

More information.


Display Android app manifest:

androguard axml {path/to/app.apk}

Display app metadata (version and app ID):

androguard apkid {path/to/app.apk}

Decompile Java code from an app:

androguard decompile {path/to/app.apk} --output {path/to/directory}


> Copyright © 2014—present the tldr-pages team and contributors.

> This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).

CC-BY



-- Response ended

-- Page fetched on Tue May 21 07:02:19 2024