A VS Code extension that integrates Android reverse-engineering tools for APK analysis, modification, and debugging.
APKLab is a Visual Studio Code extension that serves as an integrated workbench for Android reverse engineering. It combines tools like Apktool, Jadx, and smali-lsp to enable decoding, editing, decompiling, and rebuilding of APK files directly within the IDE. It solves the problem of managing multiple standalone tools by providing a seamless workflow for security analysis, modification, and debugging of Android applications.
Security researchers, malware analysts, and Android developers who need to reverse-engineer APKs for vulnerability assessment, debugging, or educational purposes. It's particularly useful for those already using VS Code as their primary development environment.
Developers choose APKLab because it centralizes the entire Android RE toolchain into a single, familiar IDE, eliminating context switching and simplifying complex workflows like Frida hook generation and MITM patching. Its deep integration with VS Code provides superior Smali language support and automation compared to using disparate command-line tools.
Android Reverse-Engineering Workbench for VS Code
Seamlessly combines Apktool, Jadx, and smali-lsp in VS Code, enabling decode-edit-rebuild cycles without leaving the IDE, as demonstrated in the GIFs for decoding and rebuilding APKs.
Uses smali-lsp to provide full IDE features like go-to-definition and references for Smali files, making low-level code editing more efficient than with plain text editors.
Allows generating Frida hooks directly from Smali methods and injecting Frida Gadget with automatic main activity patching, streamlining dynamic instrumentation for security analysis.
Checks for updates and installs needed tools automatically, reducing manual setup overhead for core dependencies like Apktool and Jadx, as mentioned in the extension settings.
Requires JDK 17+ and relies on multiple Java-based tools (e.g., Apktool, Jadx), which can be bulky and may cause conflicts with existing Java installations or system resources.
Advanced features like malware analysis depend on external tools like quark-engine, which users must install separately, adding complexity and potential setup issues.
Manual path configuration for each tool (e.g., apktoolPath, jadxDirPath) is required for custom versions, as detailed in settings, which can be tedious and error-prone.
Dex to Java decompiler
UNIX-like reverse engineering framework and command-line toolset
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
A standalone Java Decompiler GUI
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.