05-03-2015, 07:33 AM
(This post was last modified: 05-03-2015, 07:44 PM by darkunited.)
(05-02-2015, 08:04 AM)Konloch Wrote:That's a heart attack when it comes to analyzing strongly obfuscated apps. I succeeded loading up the whole project in IntelliJ but it still didn't output the "smooth" browsing experience that BCV does. I'm definitely looking forward to a possible implementation of that in BCV in the near future, if you have the time and will of course!(05-01-2015, 04:01 AM)darkunited Wrote: Saved my life already. It renamed all obfuscated symbols, decompiled all classes and in the end put then in a JAR.If it's decompiled then you can simply open the decompiler jar in a zip archive viewer, then open the .java file with Notepad++.
One question though, any clue on how can I browse that JAR now? BytecodeViewer will refuse to load it as the classes are already decompiled and it expects them to be not...