androarsc - Man Page

Reverse engineering and pentesting for Android applications

Synopsis

androarsc [Options] [FILE_]

Description

/usr/lib/python3.14/site-packages/androguard/core/bytecodes/apk.py:1039: SyntaxWarning: "\>" is an invalid escape sequence. Such sequences will not work in the future. Did you mean "\\>"? A raw string is also an option.

Thus specifiying :code:`{"name": "foobar"}` will match on :code:`<bla name="foobar" \>`

Decode resources.arsc either directly from a given file or from an APK.

Example:

$ androguard arsc app.apk

Options

-i,  --input PATH

resources.arsc or APK to parse (legacy option)

-o,  --output TEXT

filename to save the decoded resources to

-p,  --package TEXT

Show only resources for the given package name (default: the first package name found)

-l,  --locale TEXT

Show only resources for the given locale (default: '\x00\x00')

-t,  --type TEXT

Show only resources of the given type (default: public)

--id TEXT

Resolve the given ID for the given locale and package. Provide the hex ID!

--list-packages

List all package names and exit

--list-locales

List all package names and exit

--list-types

List all types and exit

--help

Show this message and exit.

Info

August 2025 androarsc 3.4.0a1