androarsc - Man Page
Reverse engineering and pentesting for Android applications
Synopsis
androarsc [Options] [FILE_]
Description
Decode resources.arsc either directly from a given file or from an APK.
Example:
$ androguard arsc app.apk
Options
- -i, --input PATH
resources.arsc or APK to parse (legacy option)
- -o, --output TEXT
filename to save the decoded resources to
- -p, --package TEXT
Show only resources for the given package name (default: the first package name found)
- -l, --locale TEXT
Show only resources for the given locale (default: '\x00\x00')
- -t, --type TEXT
Show only resources of the given type (default: public)
- --id TEXT
Resolve the given ID for the given locale and package. Provide the hex ID!
- --list-packages
List all package names and exit
- --list-locales
List all package names and exit
- --list-types
List all types and exit
- --help
Show this message and exit.
Info
April 2025 androarsc 3.4.0a1