How to reverse-engineer / decompile an Android APK which was obfuscated using ProGuard? How to reverse-engineer / decompile an Android APK which was obfuscated using ProGuard? android android

How to reverse-engineer / decompile an Android APK which was obfuscated using ProGuard?


Everything you're looking for is in the mapping.txt file, but I've never seen a tool that would reverse it all. Some of the obfuscations that Proguard performs are not just simple renaming of the methods and variables so chances are you won't be able to do what you're trying to do. retrace.jar that comes with the Proguard download might get you a bit further but I'm pretty sure you have to use that with a stacktrace file.