Fake AXML Encryption A lightweight utility designed for surface-level obfuscation (masking) of the binary AndroidManifest.xml (AXML) inside APK files. Its primary goal is to confuse beginners and quick-analysis tools. 💡 Core Functionality & Limitations This tool does not apply real encryption. Instead, it uses a simple trick to obfuscate property names: Attribute Masking (Fake Mapping): It replaces standard Android resource names (like versionName, minSdkVersion, theme) with fake names that mimic hex IDs (e.g., id0101021c). Targeting Mobile Editors (MT / NP Manager): When the modified Manifest is opened via mobile tools like MT Manager or NP Manager, the attributes look broken and hard to read, hindering quick edits by casual modders. Limitations (Crucial): This is a basic camouflage. Advanced decompilers like JADX or Apktool on PC can easily resolve these names back to their original state because the underlying Resource IDs must remain intact for the Android OS to run the app. Safe Tag Filtering: Automatically skips modification inside critical tags (action, category, data) to ensure Intent Filters remain functional and the app doesn't crash. 🚀 Features 📦 Quick Inject/Extract: Modifies the Manifest without full APK decompilation. 🔏 Built-in Signer (BraDex Signer): Auto-signs the output APK so it's ready for immediate deployment. 📱 Simple Terminal Log: Real-time logging of the obfuscation workflow.
©2026 Sketchub | User Policy