androdd - Man Page

Reverse engineering and pentesting for Android applications

Synopsis

androdd [Options] [FILE_]

Description

/usr/lib/python3.14/site-packages/androguard/core/bytecodes/apk.py:1039: SyntaxWarning: "\>" is an invalid escape sequence. Such sequences will not work in the future. Did you mean "\\>"? A raw string is also an option.

Thus specifiying :code:`{"name": "foobar"}` will match on :code:`<bla name="foobar" \>`

Decompile an APK and create Control Flow Graphs.

Example:

$ androguard resources.arsc

Options

-i,  --input FILE

APK to parse (legacy option)

-o,  --output TEXT

output directory. If the output folder already exsist, it will be overwritten!  [required]

-f,  --format TEXT

Additionally write control flow graphs for each method, specify the format for example png, jpg, raw (write dot file), ...

-j,  --jar

Use DEX2JAR to create a JAR file

-l,  --limit TEXT

Limit to certain methods only by regex (default: '.*')

-d,  --decompiler TEXT

Use a different decompiler (default: DAD)

--help

Show this message and exit.

Info

August 2025 androdd 3.4.0a1