A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Rename obfuscated class name with source name. (fr0zenrain)
Recover android dex's class name obfouscator by proguard with "-keepattributes SourceFile". Most app need save the crash log, so the do not clear source name,maybe some nest class can not fix.
Sample automation scripts for JEB(Android Interactive Decompiler).
Usage of JEB automation is here.
JEB API reference is here.