Here it is: https://github.com/CalebFenton/simplify
I'd build you a jar, but there have been a lot of commits recently, and you'll probably want to build it yourself.
It decrypts most types of string encryption and can remove some types of obfuscation, especially code that doesn't actually do anything.
This may be all you want to know. But this has got me thinking about optimization and deobfuscation, so continue on if you're into that sort of thing.
App obfuscation and string encryption are getting more popular, and they can be annoying as fuck. But, fundamentally, obfuscators just apply a set of rules to code, and the rules aren't that complex, because complex is really hard. It's just a thin layer of changes added on top. Intuitively, this means a general solution for undoing the changes probably takes a little more effort to undo than it did to conceive the original rules. So no matter how bad things get for crackers, it should always be possible to make a tool to fix things up.
In the PC scene, obfuscators are more evolved, but so are the deobfuscators. Just look at the feature list on this: https://github.com/0xd4d/de4dot. It's a deobfuscator and an unpacker, plus it supports a huge list of stuff.
There are a few tools like this for Android, but they are not nearly as complex (yet). Time for bullet points!
I'd build you a jar, but there have been a lot of commits recently, and you'll probably want to build it yourself.
It decrypts most types of string encryption and can remove some types of obfuscation, especially code that doesn't actually do anything.
This may be all you want to know. But this has got me thinking about optimization and deobfuscation, so continue on if you're into that sort of thing.
App obfuscation and string encryption are getting more popular, and they can be annoying as fuck. But, fundamentally, obfuscators just apply a set of rules to code, and the rules aren't that complex, because complex is really hard. It's just a thin layer of changes added on top. Intuitively, this means a general solution for undoing the changes probably takes a little more effort to undo than it did to conceive the original rules. So no matter how bad things get for crackers, it should always be possible to make a tool to fix things up.
In the PC scene, obfuscators are more evolved, but so are the deobfuscators. Just look at the feature list on this: https://github.com/0xd4d/de4dot. It's a deobfuscator and an unpacker, plus it supports a huge list of stuff.
There are a few tools like this for Android, but they are not nearly as complex (yet). Time for bullet points!
- Dare - Made by people who certainly seem to know what they're doing, but it often fails or gets put into infinite loops, and it focuses on optimization more than deobfuscation.
- Automated Analysis and Deobfuscation of Android Apps & Malware by Jurriaan Bremer (original PDF link doesn't work, closed source tool)
- If you retarget DEX to JAR via JEB, dex2jar, or similar, you can use Java deobfuscators
Simplify deobfuscates by virtually executing an app and analyzing the execution afterwards. So if there is an encrypted string that gets decrypted at run time, Simplify will see the encrypted, see it passed to the decryption method, and see it get get decrypted. And after it knows the value, it can remove the encrypted value and the decryption method call as redundant and replace it with a 'const-string' instruction with the decrypted literal.
It's not all the way cooked yet, but the idea is solid, and there are some interesting issues github page I'd quite like to see implemented. One of them is deobfuscating reflection.
Also, anyone who takes the time to create issues on github and follow through with closing them when they're resolved, is probably more than a little obsessive. Should be fun to watch.