ApkUnpacker
ApkUnpacker
Hi @ItzSomebody, its awesome obfuscator for jar files , need all these protection on android apk also so my request is to port this obfuscator for apk hardening in android-studio...
Obfuscator Used : ```sh 5742964208d197f408c982e6424902154505e2f1c4a0ee5d645d42d6a20f346c ``` [MProtector_2.0.apk.zip](https://github.com/CalebFenton/simplify/files/6271548/MProtector_2.0.apk.zip) created by https://github.com/KingMahmud Sample Obfuscated : [Sample.apk.zip](https://github.com/CalebFenton/simplify/files/6271131/Sample.apk.zip) Simplify Command Used : ```sh java -jar simplify.jar --max-call-depth 999999 --max-address-visits 999999 --max-method-visits 999999 --ignore-error -it...
[TestSimplify.apk.zip](https://github.com/CalebFenton/simplify/files/6949563/TestSimplify.apk.zip) ```sh java -jar simplify.jar --max-call-depth 999 --max-address-visits 999 --max-method-visits 999 --ignore-error TestSimplify.apk Error : com/test/dec/SketchwareUtil.smali[128,4] null Exception in thread "main" java.lang.RuntimeException: Error loading class definition: Lcom/test/dec/SketchwareUtil; at org.cf.smalivm.type.ClassManager.parseClass(ClassManager.java:187) at...
[classes.dex.zip](https://github.com/CalebFenton/simplify/files/6990300/classes.dex.zip) Error is same as of https://github.com/CalebFenton/simplify/issues/150 writing dex after simplification but with different type ```sh java -jar simplify.jar --max-call-depth 999 --max-address-visits 999 --max-method-visits 999 --ignore-error classes.dex ..... Optimizations: constantized...
**Provide specific APK, DEX, or file hash** [classes.dex.zip](https://github.com/CalebFenton/simplify/files/5437285/classes.dex.zip) **Describe the bug** [outputlog.txt](https://github.com/CalebFenton/simplify/files/5438063/outputlog.txt) Writing output to classes_simple.dex Exception in thread "main" java.lang.IllegalStateException: Switch instruction at address/index 0x1c/12 refers to the wrong...
Sample: https://github.com/rednaga/APKiD/files/4451070/com.anonytun.android.99.apk.zip Output : 
Sample : [MTObfuscation.apk.zip](https://github.com/CalebFenton/simplify/files/4415269/MTObfuscation.apk.zip) ErrorLog: [ErrorLog.txt](https://github.com/CalebFenton/simplify/files/4415274/ErrorLog.txt) Error start from 2716 Sample Related To https://github.com/rednaga/APKiD/issues/206 To More Explain : Now I am getting more and more sample related to such protector https://github.com/rednaga/APKiD/issues/206#issuecomment-573859853...
[myapp2.apk.zip](https://github.com/CalebFenton/simplify/files/4334412/myapp2.apk.zip) Simplifying this small apk throw many error and simplification not completed . Apk is protected with https://m.apkpure.com/bg-anti-decompile-reverse-java/com.bgplus.Anti.JavaDecompiler
For issue https://github.com/rednaga/APKiD/issues/297 Some point to noticed - ```sh $code = "Code Stage" $code2 = "Anti-Cheat Toolkit" ``` is always present . Choosed any 1 of them only . why...
[Samples.zip](https://github.com/rednaga/APKiD/files/8401634/Samples.zip) From https://github.com/obpo-project/samples libcompatible.so in all 4 arch supposed to be packed with https://appguard.nprotect.com/ but apkid detect it as ```sh [*] libcompatible.so |-> obfuscator : Obfuscator-LLVM version 4.0 ``` libdexvmp.so...