Open the JD-GUI application that you downloaded because it is now time to decode the JAR and packaged class files. To make the extraction process easier to understand, let’s start by creating a fresh native Android project: JD-GUI will read JAR files and decompile the class files found in them. If you’re unfamiliar with these tools, dex2jar will read Dalvik Executable files and convert them to the standard JAR format. My personal favorites when it comes to tools are dex2jar and JD-GUI. The source code of a native Android application is not difficult to obtain, but it does require extra tools that are compatible with Windows, Mac, and Linux. Extracting the source from a native Android application Use the information found here to better protect yourself from malicious users. Developers work hard on their applications, so please do not take advantage of them. NOTE: Do not use this tutorial to do malicious things.
For each of these application types, you will see how to better protect your code using obfuscation practices. Extract the source code from a hybrid Apache Cordova / Ionic Framework / Phonegap applicationīoth are designed differently, but the source code is just as easy to access.
This tutorial is going to be broken up in two parts. What is going to stop someone from stealing your logic and source code? How easy is it to obtain? The short story is that your source code is not safe by default and it is very easy to obtain. One that took you ages to complete and something that you feel proud of.
So you’ve just made an Android application.