androarsc - Man Page

Reverse engineering and pentesting for Android applications

Synopsis

androarsc [Options] [FILE_]

Description

Decode resources.arsc either directly from a given file or from an APK.

Example:

$ androguard arsc app.apk

Options

-i,  --input PATH

resources.arsc or APK to parse (legacy option)

-o,  --output TEXT

filename to save the decoded resources to

-p,  --package TEXT

Show only resources for the given package name (default: the first package name found)

-l,  --locale TEXT

Show only resources for the given locale (default: '\x00\x00')

-t,  --type TEXT

Show only resources of the given type (default: public)

--id TEXT

Resolve the given ID for the given locale and package. Provide the hex ID!

--list-packages

List all package names and exit

--list-locales

List all package names and exit

--list-types

List all types and exit

--help

Show this message and exit.

Info

April 2025 androarsc 3.4.0a1