反编译

java -jar apktool.jar d -f gjyp.apk

android:debuggable="true"

java -jar apktool.jar b -o gjypoutput.apk  gjyp

jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore demo2.keystore F:\down\android\gjypoutput.apk demo2

111111

调试

adb.exe connect 127.0.0.1:62001

adb shell am start -D -n  com.king.gjyp.anfeng/com.game.platform.SplashActivity

adb jdwp

adb forward tcp:5005 jdwp:

IDA搜索PAKEX找到密码

,mc8:I`V!%#|k-9] PAKEX

用aq-xxtea_decrypt-lua解密

adb kill-server

adb start-server

F:\down\android\dex2jar-2.0

.\d2j-dex2jar.bat  classes.dex

通过助手下载的apk保存路径:/data/app

你可能感兴趣的:(反编译)