Closed Dev380 closed 2 years ago
PS xcx.jpd contains the files of interest.
@Dev380 No you add the path to rt.jar into the config.yml like so:
path:
- "C:/Program Files/Java/jdk{version}/jre/lib/rt.jar"
Do NOT add it as -cp or sth to the java command.
You can find this in the wiki: https://github.com/java-deobfuscator/deobfuscator/wiki/Getting-Started#using-a-configuration-file
Maybe you also want to try out the deobfuscator-gui.
@Janmm14 I tried it with that, however the same error popped up :(
@Dev380 Can you tell me which superclass xcx/jpd/if
has?
The issue is fixed now because I realized the manifest file said it used stringer, so I removed the string obfuscation first.
Here is the output from my terminal when trying to deobfuscate with this transformer. Detecting works fine.
The cp rt.jar option was added because I saw other issues saying this is required for this deobfuscation setting. input.zip The above is the file I'm trying it with. I don't know if uploading this is allowed. I'm 99% sure this is malware (hence reason for decompilation) and I know that the non virus parts are all open source as far as I'm aware.