Based on our record, JADX should be more popular than Resource Hacker. It has been mentiond 29 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
> I remember something like dex2jar also, which gave you a jar you could use in any java decompiler, like jdgui, procyon etc. https://github.com/skylot/jadx is very handy for that nowadays. It also supports interactive variable/method/class name renaming to make the decomplied code easier to read. The decompiler isn't perfect, but I guess all available Java decompilers... - Source: Hacker News / 3 months ago
Suspicious of the request, our colleague forwarded the APK to me, knowing my expertise in software development and cybersecurity. My investigation began by downloading and extracting the contents of the APK. Inside, I found several dex files, which I knew contained the app's compiled source code. Using a tool called jadx, (jadx -d extractedapkfile) I decompiled the APK to inspect its source code. - Source: dev.to / 10 months ago
The best way is to just start practicing. I would say pick some simple apps on your (Android) phone and dig straight in. The great thing about Android applications is that often they generally decompile quite nice into human readable Java soo the barrier of entry can be quite low to start reversing. Grab a copy of JADX[1] - it will decompress and decompile the APK files. If you don't have an Android handset, use... - Source: Hacker News / almost 2 years ago
This may be overkill but you can use an oscilloscope to manually calculate the baudrate, i.e. Like this. It looks like it could be UART serial data, but this is a good resource to reference. Sometimes http is used as a means for communicating, and not necessarily directly to a browser see here. This is pretty common in embedded applications actually. You can try using dirbuster to see what hidden endpoints there... Source: almost 2 years ago
Jadx - skylot/jadx: Dex to Java decompiler (github.com) - Used for decompiling the apk - make the code readable. Source: almost 2 years ago
"Resource Hacker"[1] should be enough to edit some strings, you just need to find the right file. [1] http://angusj.com/resourcehacker/. - Source: Hacker News / almost 2 years ago
Btw there are a couple of small programs to extract icons from exe/dll -s I tried with (ResourceHacker)[http://angusj.com/resourcehacker/] and (BeCyIconGrabber)[https://jarlpenguin.github.io/BeCyIconGrabberPortable/] but neither could find other icons than the main icon AH I had the idea to maybe check the component dll-s and actually foo_ui_std.dll has the icons. Source: about 2 years ago
I do too but I’ve been using resource hacker for over a year or two now to quickly get the icon. Very rarely have I had to look elsewhere. Source: over 3 years ago
Right click into any script, then the resulting executable open it with Resource Hacker and you'll see what I'm talking about: the script is just as a resource of the .exe. Source: almost 4 years ago
You'll also need a program called Resource Hacker. Find it here: http://angusj.com/resourcehacker/. Source: almost 4 years ago
APK Editor Studio - APK Editor Studio is an open-source Android application editor that allows you to edit APKs with the help of reverse engineering.
Universal Extractor 2 - Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by...
Apktool - Apktool is an all-in-one tool that can extract all the resources inside an APK.
PE Explorer - EXE Editor, Resource Editor, Disassembler, Section Editor, Dependency Scanner, Quick Function Syntax Lookup. Analyze win32 executable files, including headers, procedures, and libraries. Edit icon resources and more.
APK Studio - APK Studio is an open-source Integrated Development Environment that allows you to recompile and decompile Android applications with its unified interface.
Resource Tuner - Resource Editor: modify EXE file's resources, change Icons inside EXE, DLL, MUN. View, search, extract, replace, edit, add and delete the embedded resources of executable program files.