07-21-2015, 01:19 PM
(05-03-2015, 07:33 AM)darkunited Wrote:(05-02-2015, 08:04 AM)Konloch Wrote:That's a heart attack when it comes to analyzing strongly obfuscated apps. I succeeded loading up the whole project in IntelliJ but it still didn't output the "smooth" browsing experience that BCV does. I'm definitely looking forward to a possible implementation of that in BCV in the near future, if you have the time and will of course!(05-01-2015, 04:01 AM)darkunited Wrote: Saved my life already. It renamed all obfuscated symbols, decompiled all classes and in the end put then in a JAR.If it's decompiled then you can simply open the decompiler jar in a zip archive viewer, then open the .java file with Notepad++.
One question though, any clue on how can I browse that JAR now? BytecodeViewer will refuse to load it as the classes are already decompiled and it expects them to be not...
I've been planning on adding obfuscation into BCV itself, so the user can quickly re-obfuscate a heavily obfuscated class to make it easier to read