Examples of the obfuscated APKs (using manifesto and/or other techniques):
HelloMaldr0id-double-package.apk- two "package" entries are shown inAndroidManifest.xmlwhen the APK is unpacked usingapktoolHelloMaldr0id-restart-emulator.apk- installation of this package restarts the SDK emulator, due to theAndroidManifest.xmlmalformationHelloMaldr0id-toast.apk- try to decompile it using dex2jar + jd-gui and see if you can find asecretMethodcode :)krvarma-android-samples-smsdemo.apk- compiled & signed version of krvarma-android SMSDemoHelloMaldr0id-static-instance-methods.apk- two methods, with the same names and arguments that differ only in the return type andstaticmodifier. More info in one of my blog posts