androdd - Man Page

Reverse engineering and pentesting for Android applications

Synopsis

androdd [Options] [FILE_]

Description

Decompile an APK and create Control Flow Graphs.

Example:

$ androguard resources.arsc

Options

-i,  --input FILE

APK to parse (legacy option)

-o,  --output TEXT

output directory. If the output folder already exsist, it will be overwritten!  [required]

-f,  --format TEXT

Additionally write control flow graphs for each method, specify the format for example png, jpg, raw (write dot file), ...

-j,  --jar

Use DEX2JAR to create a JAR file

-l,  --limit TEXT

Limit to certain methods only by regex (default: '.*')

-d,  --decompiler TEXT

Use a different decompiler (default: DAD)

--help

Show this message and exit.

Info

April 2025 androdd 3.4.0a1