• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

[App] [Free] Protect source of Android apps (anti Reverse Engineering / Decompiling tools)

Huyen2017

Newbie
Feb 10, 2017
10
0


Many guys want to decompile/ Reverse engineering/ ... your Android Apps for stealing your ideal/ your algorithm/ your source/...
These guys can: decompile .Apk file -> Get source -> Modify -> Recompile -> Reup on App Store -> Make money from your work

Bg+ Anti Decompiler (JAVA) can help you to stop it.
It's free download on Google store: https://play.google.com/store/apps/details?id=com.bgplus.Anti.JavaDecompiler
This app works on Java source, not on Java Byte-code like other tools. So user can control everything.
It supports a many protecting features:
+ Remove comments
+ Obfuscate filename (include main-active class, which other tool can't do), class, functions, variable, ...
+ Obfuscate with unicode characters
+ Hide string value (helpful when you keep some sensitive info in java source)
+ Hide packagename
+ Add fakecode to trap the decompiler tools
+ Check resource-string (helpful when someone try to edit the resources of your APK)
+ ...

We have tested this solution with many Java decompiler tools. The result was very good.
These tools can not reverse the original java-source accurately.

New update ( Fer 9,2017)
Demo protecting Project: Android Terminal (https://drive.google.com/open?id=0B6wNo_zRyvFoZG9nTVV4Z3BKblk)
This is a project for creating a Terminal tool for Android device. User can run some command like: ls, ps, top, ... on Android device.
 
Last edited:
6Gv1Wlkgj4hq9wAFF1vIHrXi8xrwAwhEVoObg7SgKgNLe4BRlUTAb5G6hpNttZTyfMw=h900-rw
 
Upvote 0
Excellent work, and I applaud anything which helps to defeat software piracy. That code is absolutely unreadable, and glad to see it resists decompilers.

I guess the development process is that you keep an unobfuscated version of your source, and during the deployment, copy this to a separate project area, which is then obfuscated?
 
Upvote 0
Excellent work, and I applaud anything which helps to defeat software piracy. That code is absolutely unreadable, and glad to see it resists decompilers.

I guess the development process is that you keep an unobfuscated version of your source, and during the deployment, copy this to a separate project area, which is then obfuscated?
Yes, I always keep & work on the un-obfuscated version of my source.
When I finish a new app version, I will obfuscated and save it to a separated folder (Exported.Projects).
After that, I will compile the obfuscated project -> get .apk file -> review it -> publish on Google store
 
Upvote 0
Why why why?

I used to edit apps a lot. Not to steal the code, nor the algorithm or the ideal. All I did was simple stuff like changing app name and icon and sometimes making the UI better (if I hated it) . And I never made money this way. I kept the edited apps to myself, no one else.

Then why? Why did you just make my life harder?
 
Upvote 0
Have you considered producing this as a separate Java library, to use in other projects, not just apps? Seems like a very robust defence against reverse engineering. The obfuscators I've used in the past work on the bytecode, and although the resulting decompiled code is hard to read, it isn't impossible to clean it up.
Your solution seems to take it to another level, because quite honestly that code is gibberish - and I mean that as a compliment :)
 
Upvote 0
Have you considered producing this as a separate Java library, to use in other projects, not just apps? Seems like a very robust defence against reverse engineering. The obfuscators I've used in the past work on the bytecode, and although the resulting decompiled code is hard to read, it isn't impossible to clean it up.
Your solution seems to take it to another level, because quite honestly that code is gibberish - and I mean that as a compliment :)
I have thought about that, but it is intended in the future.
I am currently developing a new solution for protecting on bytecode. After everything is done, I will integrate them to create a better product.
 
Upvote 0
Yes, I always keep & work on the un-obfuscated version of my source.
When I finish a new app version, I will obfuscated and save it to a separated folder (Exported.Projects).
After that, I will compile the obfuscated project -> get .apk file -> review it -> publish on Google store
Yes, I always keep & work on the un-obfuscated version of my source.
When I finish a new app version, I will obfuscated and save it to a separated folder (Exported.Projects).
After that, I will compile the obfuscated project -> get .apk file -> review it -> publish on Google store
I get it, thanks a lot.
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones