pxb1988 / dex2jar
Tools to work with android .dex and java .class files
AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing pxb1988/dex2jar in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Summary (README)
Previewdex2jar
Project move to GitHub
Tools to work with android .dex and java .class files
- dex-reader/writer: Read/write the Dalvik Executable (.dex) file. It has a light weight API similar with ASM.
- d2j-dex2jar: Convert .dex file to .class files (zipped as jar)
- smali/baksmali: disassemble dex to smali files and assemble dex from smali files. different implementation to smali/baksmali, same syntax, but we support escape in type desc "Lcom/dex2jar\t\u1234;"
- other tools: d2j-decrypt-string
Usage
- In the root directory run: ./gradlew distZip
- cd dex-tools/build/distributions
- Unzip the file dex-tools-2.1-SNAPSHOT.zip (file size should be ~5 MB)
- Run d2j-dex2jar.sh from the unzipped directory
Example usage:
sh d2j-dex2jar.sh -f ~/path/to/apk_to_decompile.apk
And the output file will be apk_to_decompile-dex2jar.jar.
Need help ?
post on issue trackers list above.