- Home
- Application Security
- Mobile App Security
- Easy-as-pie Android Decompiler
Easy-as-pie Android Decompiler
One stop shop for decompiling Android apps with a focus on regenerating R references.

Easy-as-pie Android Decompiler
One stop shop for decompiling Android apps with a focus on regenerating R references.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
Easy-as-pie Android Decompiler Description
I got pretty tired of decompiling Android apps with a bunch of steps that I had to remember all the time. It involved a lot of apktool, dex2jar, and jd-gui; it still confuses me. Further, even after these steps were complete (usually a combination of dex2jar and JD-GUI), I would be left with disparate sources of information; the decompiled Java would be over here in this directory, while the un-DEXed content would be somewhere else (Really bad for importing into Eclipse!) I basically wanted to make this generate a tree and source as close as possible to what the original Android developer sees. One thing that existing decompilers don't do is regenerate R references; this tool includes a script that makes an attempt to do this. Which gives you more insight when you're reading source code? View v = inflater.inflate(217994357, container, false); or View v = inflater.inflate(R.layout.result_panel, container, false); Now you can easily see and search for what resource is doing what, without needing to file-search R.java for some opaque int. Note: This process relies on guesses and
Easy-as-pie Android Decompiler FAQ
Common questions about Easy-as-pie Android Decompiler including features, pricing, alternatives, and user reviews.
Easy-as-pie Android Decompiler is One stop shop for decompiling Android apps with a focus on regenerating R references.. It is a Application Security solution designed to help security teams with APK Tools.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox