Reverse engineer Android APKs directly in your browser. No uploads, no servers, no installs.
Drop an APK file here or click to browse
Supports .apk files of any size
Everything you need to understand an APK, running entirely in your browser.
Decode binary AndroidManifest.xml. View package info, permissions, activities, services, receivers, and providers.
Decompile Dalvik bytecode to Java source via WASM-powered Rust engine. Smali view also available.
Parse resources.arsc, browse string tables, view images inline, and decode binary XML resources.
Inspect APK signing certificates, fingerprints, validity dates, and signature scheme versions.
Upload any APK file. It stays in your browser — zero server contact.
Custom parsers + Rust→WASM decompiler process everything client-side in seconds.
Browse files, read Java source, inspect resources, verify signatures.
Built with ❤️ · Open Source · @jiusanzhou