Android apps under the microscope
 
  Would you like to look under the hood of any Android app?
You are welcome! (:
Precondition
- dex2jar — tool for converting .dex file to .class files
brew install dex2jar
- jd-gui — tool for decompiling and analysing Java byte code
brew cask install jd-gui
Let’s go
- 
    First of all we should get the .apk. If you haven’t one, you are able to download it from store (for more info read this note. 
- 
    Then we need to convert our .apk into the classes (.jar): d2j-dex2jar test.apk -o test.jar
- 
    Eventually we should just decompile received .jar and look under the hood: open -a jd-gui test.jar
Conclusion
Today we affect two awesome tools — dex2jar and jd-gui. Suggest you to put them into practice. Perhaps it will be a deeply fascinating diving in reverse engineering.
Thanks and see you later (:
 
       
         
         
        