dex2jar
Apache-2.0๐งฌ Reverse Engineering ยท Java
dex2jar is a set of tools for working with Android's DEX (Dalvik Executable) format and Java CLASS files. Its primary function is converting APK/DEX files to JAR format, enabling analysis with standard Java decompilation tools like JD-GUI or Procyon. The toolset includes d2j-dex2jar (DEX to JAR conversion), d2j-jar2dex (reverse conversion), d2j-smali/baksmali (assembler/disassembler), and d2j-decrypt-string (string decryption helper). It handles multi-DEX APKs and provides better conversion quality than alternatives for certain obfuscation patterns. A fundamental tool in the Android reverse engineering pipeline.
Installation
$ brew install dex2jarUse Cases
- Converting Android APK/DEX to analyzable JAR format
- Enabling Java decompiler analysis of Android apps
- Multi-DEX APK processing
- Android malware sample conversion for analysis
Tags
Details
- Category
- ๐งฌ Reverse Engineering
- Language
- Java
- Repository
- pxb1988/dex2jar
- License
- Apache-2.0
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
More in Reverse Engineering
dnSpy
C#.NET debugger, decompiler, and assembly editor. Inspect and modify .NET and Unity assemblies without source code.
ILSpy
C#Open-source .NET decompiler and assembly browser. Produces clean C# from compiled binaries with cross-platform support.
x64dbg
C++Open-source x64/x32 debugger for Windows. Full-featured binary debugger with plugin ecosystem for malware analysis and reverse engineering.
Detect It Easy
C++/QtBinary packer and compiler detection. Identifies compilers, linkers, packers, and protectors used to build PE, ELF, and Mach-O files.
angr
PythonBinary analysis framework. Symbolic execution, CFG recovery, and vulnerability discovery for compiled binaries in Python.
RetDec
C++Retargetable decompiler by Avast. Converts machine code back to C from x86, ARM, MIPS, and PowerPC binaries.