如何根据mapping.txt还原混淆的代码
来源:互联网 发布:淘宝舒口健竹盐牙膏 编辑:程序博客网 时间:2024/05/16 17:39
转载:http://blog.csdn.net/oo_oo_/article/details/37651335
Here’s the stack trace as obfuscated by ProGuard:
Caused by: java.lang.NullPointerExceptionat net.simplyadvanced.ltediscovery.be.u(Unknown Source)at net.simplyadvanced.ltediscovery.at.v(Unknown Source)at net.simplyadvanced.ltediscovery.at.d(Unknown Source)at net.simplyadvanced.ltediscovery.av.onReceive(Unknown Source)AFTER
All you need to do is write one line in the command prompt, and the obfuscation will be removed, as you can see here:
Caused by: java.lang.NullPointerExceptionat net.simplyadvanced.ltediscovery.UtilTelephony.boolean is800MhzNetwork()(Unknown Source)at net.simplyadvanced.ltediscovery.ServiceDetectLte.void checkAndAlertUserIf800MhzConnected()(Unknown Source)at net.simplyadvanced.ltediscovery.ServiceDetectLte.void startLocalBroadcastReceiver()(Unknown Source)at net.simplyadvanced.ltediscovery.ServiceDetectLte$2.void onReceive(android.content.Context,android.content.Intent)(Unknown Source)
HOW TO DECODE STACK TRACE
You can choose either the command line method or GUI (Graphical User Interface) method.
HOW TO DECODE STACK TRACE VIA GUI
1) Open <android-sdk>/tools/proguard/bin/proguardgui.bat
2) Select the “ReTrace” option on the left column.
3) Add your mapping file and obfuscated stack trace.
4) Click “ReTrace!”
Thanks to David Bilik for mentioning this GUI method.
HOW TO DECODE STACK TRACE VIA COMMAND LINE
1) You will need your ProGuard’s mapping.txt file and the stack trace (Ex: stacktrace.txt) that you want to de-obfuscate.
2) The easiest way to do the next step is copy both these files into your<android_sdk_root>/tools/proguard/bin.
3) If you are on Windows, run the following command in the same directory as the files (make sure you change to your own file names):
retrace.bat -verbose mapping.txt stacktrace.txt > out.txt4) out.txt will have the stack trace de-obfuscated. Now you can debug much easier and faster than before.
- 如何根据mapping.txt还原混淆的代码
- 如何根据mapping.txt还原混淆的代码
- Android根据mapping.txt还原混淆代码
- Android根据mapping.txt还原混淆的代码
- Android根据mapping.txt还原混淆的代码
- mapping.txt还原混淆代码
- 混淆代码根据mapping.text还原代码
- 通过mapping.txt解析混淆apk的出错信息
- 通过mapping.txt解析混淆apk的出错信息
- 通过mapping.txt解析混淆apk的出错信息
- 通过mapping.txt解析混淆apk的出错信息
- Android打包代码混淆后的Mapping文件路径
- 从异常堆栈中还原 ProGuard 混淆过的代码
- 从异常堆栈中还原 ProGuard 混淆过的代码
- 从异常堆栈中还原 ProGuard 混淆过的代码
- 从异常堆栈中还原 ProGuard 混淆过的代码
- 从异常堆栈中还原 ProGuard 混淆过的代码
- 压缩和还原压缩的JS代码.txt
- java完全数
- iOS--触摸事件、手势识别、摇晃事件、耳机线控
- Jerasure库简介及使用范例
- 上传手机图片的问题(2)
- java图片缩放二
- 如何根据mapping.txt还原混淆的代码
- mysql的基本使用总结
- C 语言中##与#的作用
- 【leetcode】Valid Palindrome【java】
- 文档相似度算法 Simhash
- MBTI职业性格测试
- 计算广告:互联网商业变现的市场与技术——互动出版网
- 通过virtualbox实现虚拟机中共享本地目录
- 千万级并发实现的秘密:内核不是解决方案,而是问题所在!