APKTool
APKTool APKTool is the go-to decompiler for reversing Android APKs into smali code and resources, letting you rebuild, sign, and tweak apps for security audits or modding without losing manifests. Run its Java jar on your .apk file to extract Dex bytecode, edit strings or layouts, then repackage for testing. Open-source and widely trusted, it's the essential extractor for mobile pentesters unpacking black-box apps into editable parts.
Explore →JADX
JADX JADX is the dex-to-Java decompiler that transforms APK bytecode into readable source code, complete with GUI views for classes, methods, and resource trees for quick navigation. Load your APK in the desktop app or CLI, decompile to JAR, and search for strings or hooks in the deobfuscated output. Open-source from skylot, it's the Java revivalist for analysts reconstructing app logic from Dalvik opcodes.
Explore →dex2jar
dex2jar dex2jar is the bytecode converter that turns Android Dex/ODEX files into Java JARs, paving the way for decomp with tools like JD-GUI for source recovery in obfuscated apps. Chain it with apktool for full APK workflows, extracting classes.dex for JAR output ready for static analysis. Open-source and lightweight, it's the bridge builder for reverse engineers linking Dalvik to JVM familiarity.
Explore →enjarify
enjarify enjarify is the Dex-to-Java translator that deobfuscates and reconstructs class structures from APKs, handling multi-Dex and optimizations for cleaner code views than basic tools. Translate via Python script on your dex files, outputting JARs with method names intact for easier tracing. Open-source from Storyyeller, it's the semantic smoother for pentesters refining raw bytecode into analyzable Java.
Explore →Smali/Baksmali
Smali/Baksmali Smali/Baksmali is the assembly-level disassembler for Dex bytecode, converting APKs to editable smali files for low-level mods like hook insertions or vuln patches. Disassemble with baksmali, tweak registers or jumps, then reassemble with smali for rebuilt APKs. Open-source from JesusFreke, it's the opcode orchestrator for advanced mobile RE diving into Dalvik's guts.
Explore →Androguard
Androguard Androguard is the Swiss Army knife for APK analysis with decompilation to smali/Java, plus static/dynamic features like permission graphs and API tracing for vuln hunting. Script its Python modules to decompile classes.dex, visualize call flows, or emulate for behavior insights. Open-source from androguard, it's the all-terrain analyst for researchers mapping app internals comprehensively.
Explore →Bytecode Viewer
Bytecode Viewer Bytecode Viewer is the multi-decompiler GUI that chains CFR, Procyon, and Fernflower to decompile APKs to Java source, with hex editing and plugin support for hybrid analysis. Load your DEX/JAR, switch decompilers for best results, and export cleaned code for further mods. Open-source from KonradIT, it's the decomp dashboard for pentesters comparing outputs across engines.
Explore →Quark-Engine
Quark-Engine Quark-Engine is the APK decompiler with taint analysis, extracting smali and tracking data flows for spotting sinks like SMS exfils in malware samples. Run its CLI on APKs for decomp reports with risk scores, scripting rules for custom hunts. Open-source from quark-engine, it's the flow follower for mobile security pros tracing sensitive paths through decompiled code.
Explore →jadx-gui
jadx-gui jadx-gui is the standalone viewer for JADX decompilations, rendering APK resources and Java source in a navigable tree with search and export for quick code reviews. Double-click your .apk in the app, jump to methods, and rename vars for clarity in sessions. Open-source GUI wrapper, it's the windowed workspace for analysts browsing decomp trees without CLI clutter.
Explore →APKiD

