-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
```
What steps will reproduce the problem?
1../androdd.py -i **.apk -o */out -d -f PNG
2.
3.
What is the expected output? What do you see instead?
sx@sx-R408P:~/androguard$ ./androdd.py -i ~/crackme0…
-
I have been working on a decompiler recently and noticed quite a lot of nested IFs that are essentially a short circuit AND. I think these were written as a chain of manual 'GOTO else' by the scripter…
-
Hello, I wanted to reverse engineer old game to try to fix some bugs there.
For this reason, I opened a dll file, opened random function and compared results between IDA Pro Decompiler and Cutter bu…
-
### Are you on the latest version of AssetRipper?
Yes, I'm on the latest release of AssetRipper.
### Which release are you using?
Windows x64
### Which game did this occur on?
Fallout Shelter
ht…
-
This a regression of sorts from the fix for #2140 where out variable declarations at callsites always decompile to `out var` rather than `out `. This behavior differs from ILSpy 6.1.
AFAIK, there i…