http://pan.baidu.com/s/1eQkwWnS 这个链接的APK,我用Android Killer打开,结果提示:
Exception in thread "main" brut.androlib.AndrolibException: Could not decode arsc file
> at brut.androlib.res.decoder.ARSCDecoder.decode(ARSCDecoder.java:52)
> at brut.androlib.res.AndrolibResources.getResPackagesFromApk(AndrolibResources.java:622)
> at brut.androlib.res.AndrolibResources.loadMainPkg(AndrolibResources.java:73)
> at brut.androlib.res.AndrolibResources.getResTable(AndrolibResources.java:65)
> at brut.androlib.Androlib.getResTable(Androlib.java:63)
> at brut.androlib.ApkDecoder.setTargetSdkVersion(ApkDecoder.java:209)
> at brut.androlib.ApkDecoder.decode(ApkDecoder.java:92)
> at brut.apktool.Main.cmdDecode(Main.java:165)
> at brut.apktool.Main.main(Main.java:81)
>Caused by: java.util.zip.ZipException: invalid LOC header (bad signature)
> at java.util.zip.ZipFile.read(Native Method)
> at java.util.zip.ZipFile.access$1400(ZipFile.java:61)
> at java.util.zip.ZipFile$ZipFileInputStream.read(ZipFile.java:715)
> at java.io.DataInputStream.readFully(DataInputStream.java:195)
> at com.mindprod.ledatastream.LEDataInputStream.readShort(LEDataInputStream.java:272)
> at brut.util.DataInputDelegate.readShort(DataInputDelegate.java:49)
> at brut.androlib.res.decoder.ARSCDecoder$Header.read(ARSCDecoder.java:395)
> at brut.androlib.res.decoder.ARSCDecoder.nextChunk(ARSCDecoder.java:349)
> at brut.androlib.res.decoder.ARSCDecoder.nextChunkCheckType(ARSCDecoder.java:361)
> at brut.androlib.res.decoder.ARSCDecoder.readTable(ARSCDecoder.java:70)
> at brut.androlib.res.decoder.ARSCDecoder.decode(ARSCDecoder.java:47)
> ... 8 more
APK 反编译失败,无法继续下一步源码反编译!
请问是不是加壳保护了?该怎么破解呢?