Me and my team coded an Android Application for a customer of my company. Due to some "political issues" the cooperation ended. The customer now uses the unpaid Application. I used dex2jar and apktool for reverse engineering but within the development we obfuscate our code with ProGuard. The only things i can proof is that the Manifest.xml, strings.xml and some other ressources are similar / equivalent. Is there any way to get a better or more readable view (in best case in plain text) of the .java classes? Are there "better" tools then apktool or dex2jar that i missed?
Thanks in advance for your help!
Solution:
- delete an activity from the decompiled Manifest (decompiled with apktool)
- build a new apk file with the decompiled data
- sign it with the keystore
- put it on the device and start it. The app should crash when you navigate to the activity that you deleted from the Manifest
- take the stacktrace (from logcat) and deobfuscate it (like Vaiden provided)