It is interesting to see how companies and organizations believe that their mobile application source code is a protected asset. Protected asset due to compiled code files. With just a few tools and technics, it is surprisingly easy to decompile and withdraw a mobile application's source code.
NB! These are tools and techniques ethical and malicious hackers use. This post will give an insight from the perspective of a pentester.
I will in this blogpost give a brief insight on how.