Skip to main content

Posts

Showing posts from March, 2016
De-obfuscate the stack trace using Proguard GUI  Store the Proguard mapping.txt file for each released APK, which will be useful to de-obfuscate crash or exception stack trace. Steps to retrace :- 1. Go to your SDK location -> Android_SDK\adt-bundle-windows-x86-20131030\sdk\tools\proguard\bin folder 2. Run retrace.bat file , choose "Retrace" option. 3. Add your proper mapping.txt 4. And paste the dumped stack trace , stack trace should be from "at" on each line 5. Proguard will replace all method and class names according to the mapping file.