Examples of the obfuscated APKs (using manifesto and/or other techniques):
HelloMaldr0id-double-package.apk
- two "package" entries are shown inAndroidManifest.xml
when the APK is unpacked usingapktool
HelloMaldr0id-restart-emulator.apk
- installation of this package restarts the SDK emulator, due to theAndroidManifest.xml
malformationHelloMaldr0id-toast.apk
- try to decompile it using dex2jar + jd-gui and see if you can find asecretMethod
code :)krvarma-android-samples-smsdemo.apk
- compiled & signed version of krvarma-android SMSDemoHelloMaldr0id-static-instance-methods.apk
- two methods, with the same names and arguments that differ only in the return type andstatic
modifier. More info in one of my blog posts