-
```
What steps will reproduce the problem?
1. Decompiled Mms.apk
2. Modified smiley codes in res/values/arrays.xml
3.
What is the expected output? What do you see instead?
/sdcard/Decompiler/Mms_src/…
-
```
What steps will reproduce the problem?
1. Decompiled Mms.apk
2. Modified smiley codes in res/values/arrays.xml
3.
What is the expected output? What do you see instead?
/sdcard/Decompiler/Mms_src/…
-
```
What steps will reproduce the problem?
1. Decompiled Mms.apk
2. Modified smiley codes in res/values/arrays.xml
3.
What is the expected output? What do you see instead?
/sdcard/Decompiler/Mms_src/…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…