[ERROR] Exception in thread "main" java.lang.RuntimeException: java.util.concurrent.ExecutionException: java.lang.IllegalArgumentException: bad utf-8 byte e0 at offset 000000eb
at com.android.tools.smali.baksmali.Baksmali.disassembleDexFile(Baksmali.java:99)
at com.android.tools.smali.baksmali.Baksmali.disassembleDexFile(Baksmali.java:55)
at brut.androlib.src.SmaliDecoder.decode(SmaliDecoder.java:99)
at brut.androlib.src.SmaliDecoder.decode(SmaliDecoder.java:36)
at brut.androlib.ApkDecoder.decodeSourcesSmali(ApkDecoder.java:220)
at brut.androlib.ApkDecoder.decode(ApkDecoder.java:143)
at brut.apktool.Main.cmdDecode(Main.java:217)
at brut.apktool.Main.main(Main.java:92)
Caused by: java.util.concurrent.ExecutionException: java.lang.IllegalArgumentException: bad utf-8 byte e0 at offset 000000eb
It appears that the application has anti-reverse engineering mechanisms in place, which means you can't use AndRoPass. You might want to try runtime root cloaking tools like Frida instead.
[ERROR] Exception in thread "main" java.lang.RuntimeException: java.util.concurrent.ExecutionException: java.lang.IllegalArgumentException: bad utf-8 byte e0 at offset 000000eb at com.android.tools.smali.baksmali.Baksmali.disassembleDexFile(Baksmali.java:99) at com.android.tools.smali.baksmali.Baksmali.disassembleDexFile(Baksmali.java:55) at brut.androlib.src.SmaliDecoder.decode(SmaliDecoder.java:99) at brut.androlib.src.SmaliDecoder.decode(SmaliDecoder.java:36) at brut.androlib.ApkDecoder.decodeSourcesSmali(ApkDecoder.java:220) at brut.androlib.ApkDecoder.decode(ApkDecoder.java:143) at brut.apktool.Main.cmdDecode(Main.java:217) at brut.apktool.Main.main(Main.java:92) Caused by: java.util.concurrent.ExecutionException: java.lang.IllegalArgumentException: bad utf-8 byte e0 at offset 000000eb
[ERROR] brut.directory.PathNotExist: apktool.yml