Recommended in the past
Signature verification of "xx Bank"
Jeb debugging ctf (Crack the key)
"Sichuan News Observation" protocol analysis (cannot catch the packet)
Practical analysis of the HTTPS protocol of 43XX
Friends who need relevant information, can [join here to get it in a package]
The jadx tool is a decompiler tool that supports both command line and graphical interface. It can complete the decompilation of apk in the easiest way.
One: jadx toolkit download
It is recommended that students use the jadx toolkit provided in the tutorial.
Two: Understand the common functions of the jadx tool
1. After the download is complete, find the place where the file is located and find that it is an exe file, then it is an executable file, just double-click to open it, as shown in the figure below.
2. The next thing you see is the main panel, which displays options such as open files, open historical files, save, and exit, as shown in the figure below.
3. There is a row of toolbars below, as shown in the figure below.
4. Click the option of the last small wrench in the toolbar to set the font, as shown in the figure below.
Then pull it to the bottom and see the options for font settings. Set a more comfortable font according to your preferences, as shown in the figure below.
summary
Mainly shared the use of jadx tools and other menu bar applications, some commonly used toolbars, such as search, save, and these shortcut keys. Open the jadx tool and drag the APK directly into it.
If you are also interested in Android reverse engineering. You can join the group below to discuss issues together, or scan the QR code below to follow the official account, follow the reply "Android Reverse" to get a free tutorial
Android reverse communication learning Q group: 876526335
vx: yijin_LX