htq67g
Last Updated: February 25, 2016
·
14.31K
· danialgoodwin
Vest 500x500

Android: How To Decode ProGuard’s Obfuscated Stack Trace

This is for Android or Java developers who use ProGuard in their apps and need to debug encrypted stack traces. You can do this with either CLI (Command Line Interface) or GUI (Graphical User Interface).

GUI METHOD

  1. Open <android-sdk>/tools/proguard/bin/proguardgui.bat
  2. Select the “ReTrace” option on the left column.
  3. Add your mapping file and obfuscated stack trace.
  4. Click “ReTrace!”

CLI METHOD

  1. Put your obfuscated stack trace in a text file (ex: stacktrace.txt).
  2. The easiest way to do the next step is to copy your mapping.txt and stacktrace.txt into <androidsdkroot>/tools/proguard/bin.
  3. If you are on Windows, run the following command in the same directory as the files: retrace.bat -verbose mapping.txt stacktrace.txt > out.txt
  4. out.txt will have the stack trace de-obfuscated.

*For Linux/Mac users, replace "retrace.bat" with "retrace.sh".

Now you can debug much easier and faster than before!

More detailed and advanced notes (and pictures): http://blog.simplyadvanced.net/android-how-to-decode-proguards-obfuscated-code-from-stack-trace/

  • Danial Goodwin -

Computer Engineer | Co-Founder and Lead Developer of Simply Advanced, LLC

Say Thanks
Respond

1 Response
Add your response

26397
None

Link gives 404. And, In mac there is no proguardgui.bat file available instead proguardgui.sh is there then want to know how to get GUI using this proguardgui.sh?

over 1 year ago ·