You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Step 1 reverse engineering.
step 2 Go to class file and get the string line Example - public static String eduScreenExpDate = Deobfuscator$app$Release.getString(6436);
Step 3 - Go to Deobfuscator$app$Release class file
Deobfuscator$app$Release.java
Add this line in java file and run - System.out.println("Value"+Deobfuscator$app$Release.getString(6377));
We are able to get values.
See we can add any proguard not to display this file
The text was updated successfully, but these errors were encountered:
It's definitely possible to get deobfuscated strings if you patch application's bytecode. You should obfuscate the application with ProGuard/R8 to make it harder to deobfuscate.
Step 1 reverse engineering.
step 2 Go to class file and get the string line Example - public static String eduScreenExpDate = Deobfuscator$app$Release.getString(6436);
Step 3 - Go to Deobfuscator$app$Release class file
Deobfuscator$app$Release.java
Add this line in java file and run - System.out.println("Value"+Deobfuscator$app$Release.getString(6377));
We are able to get values.
See we can add any proguard not to display this file
The text was updated successfully, but these errors were encountered: