~ 1 min read

Easily Retrace Proguard Obfuscated Android Code

To be able easily read the Proguard obfuscated code, you can use the retrace script supplied with the Android SDK. In order not to provide the full path, you can add an alias. If you are using bash you can do it as follows:

alias retrace='~/ANDROID_SDK/tools/proguard/bin/retrace.sh'

If you are not using bash, then it's pretty similar. Then you just issue the retrace command.

Usage: java proguard.ReTrace [-verbose] <mapping_file> [<stacktrace_file>]