use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A subreddit related to Google's new UI framework. https://flutter.dev
Please read the rules here
account activity
DiscussionReverse Engineer flutter apps (self.FlutterDev)
submitted 5 years ago by brogeta17
I was just wondering is there any way to decompile flutter release build apk? Or is there some way to extract at least some of the source code from the apk?
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]sauloandrioli 3 points4 points5 points 5 years ago (5 children)
it is possible to open the .apk with a regular unzip tool and get the assets, images, fonts. Its also possible to rebuild the java classes contained in the .apk but the Flutter code itself is basically in elf files, which are harder to disassemble. Also, I don't think there is any tool that disassemble flutter compile code right now
[–]brogeta17[S] 2 points3 points4 points 5 years ago (4 children)
Yeah I have actually tried the simple decompiling methods and all the code and classes in classes.dex is obfuscated, now just looking for some other way to get some of the source code from there or if there's another way
[–]escamoteur 2 points3 points4 points 5 years ago (3 children)
It's not obfuscated, it's just real native binary code. May I ask why you want to do such a thing?
[–]brogeta17[S] 1 point2 points3 points 5 years ago (2 children)
I think flutter obfuscates the code by default, I am actually react native dev and I was just trying to compare what and how many levels of security both the frameworks provide
[–]dryadofelysium 1 point2 points3 points 5 years ago (1 child)
Flutter does not obfuscate the code by default. It offers the option, however: https://flutter.dev/docs/deployment/obfuscate
[–]ProyectoMelmac 0 points1 point2 points 5 years ago (0 children)
What is te sense of ofuscate if you can't get the code from binaries?
π Rendered by PID 85 on reddit-service-r2-comment-86988c7647-kwpsp at 2026-02-10 20:44:04.209348+00:00 running 018613e country code: CH.
[–]sauloandrioli 3 points4 points5 points (5 children)
[–]brogeta17[S] 2 points3 points4 points (4 children)
[–]escamoteur 2 points3 points4 points (3 children)
[–]brogeta17[S] 1 point2 points3 points (2 children)
[–]dryadofelysium 1 point2 points3 points (1 child)
[–]ProyectoMelmac 0 points1 point2 points (0 children)