I reverse engineered (With1, With2 and Manually) some of the Android APK files by downloading from Google Play Store but didn't get the exact hint for the proguard usage.
Is there any way to know that which Android APK file is having the proguard usage in reverse engineered code?
And
What is the difference between the proguard and without proguard usage reverse engineered code?
What I got in reverse engineered code is:
- In some of the APK file's code, the classes names are like a, b, c, d and their package names are also in the same way. The code was so much complex structured after decompiling and not able to understandable easily.
- Some of the APK files are having easily formatted code. Their decompiled code looks like same as of normal code structure. Class name and package names are readable but in the code, some of the functions are having inconsistence code.
If APK is signed with Android Studio then by default pro guard will be enabled as I know then why all the APK's are not having same decompiled code structure?
Customize which code to keep
– Morrison Chang