-
-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unknown chunk type after skipping bad string block #3633
Comments
Generally with an apk throwing all these obfuscation steps we'd need a sample to investigate further. |
https://github.com/grimm-65/Android/blob/master/sample.apk Link to the sample apk |
It looked to disassemble fine for me, but it is missing some logic. I'm guessing we didn't read a chunk properly and got shifted and skipped entire arsc file. This is definitely a highly obfuscated application.
I'll mark as a bug. |
I catch the same problem. |
Here is the decompiled |
Information
java --version
) -21.0.3Stacktrace/Logcat
Steps to Reproduce
apktool d sample.apk
Frameworks
If this APK is from an OEM ROM (Samsung, HTC, LG). Please attach framework files
(
.apks
that live in/system/framework
or/system/priv-app
)APK
If this APK can be freely shared, please upload/attach a link to it.
Questions to ask before submission
apktool d
,apktool b
without changing anything?YThe text was updated successfully, but these errors were encountered: