We release our set of code-obfuscation scripts tailored for Android applications. We assume that the original application can be disassembled into Smali.
We currently support:
-
Android specific
- Repackaging
- Reassembly
- Re-alignment
-
Simple control-flow modifications
- Junk code insertion
- Debug symbols stripping
- Defunct code insertion
- Unconditional jump insertion
-
Advanced control-flow modifications
- Call indirection
- Code reordering
- Reflection
- Opaque predicate insertion
-
Renaming
- Non-code files and resource renaming
- Fields and methods renaming
- Package renaming
-
Encryption
- Resource encryption (asset files)
- Native code encryption
- Data encryption (strings)
- Federico Pellegatta (main developer)
- Federico Maggi (advisor, maintainer)