androdd - Man Page
Reverse engineering and pentesting for Android applications
Synopsis
androdd [Options] [FILE_]
Description
Decompile an APK and create Control Flow Graphs.
Example:
$ androguard resources.arsc
Options
- -i, --input FILE
APK to parse (legacy option)
- -o, --output TEXT
output directory. If the output folder already exsist, it will be overwritten! [required]
- -f, --format TEXT
Additionally write control flow graphs for each method, specify the format for example png, jpg, raw (write dot file), ...
- -j, --jar
Use DEX2JAR to create a JAR file
- -l, --limit TEXT
Limit to certain methods only by regex (default: '.*')
- -d, --decompiler TEXT
Use a different decompiler (default: DAD)
- --help
Show this message and exit.
Info
April 2025 androdd 3.4.0a1