最新消息:20190717 VPS服务器:Vultr新加坡,WordPress主题:大前端D8,统一介绍入口:关于

【已解决】用java反编译器CFR从jar包导出java源代码

Java crifan 317浏览 0评论
折腾:
【未解决】小花生中如何得到getToken的计算逻辑以便得到正确的md5值可以正常请求接口
期间,已经试了:
【已解决】用基于Procyon的Luyten反编译安卓jar包得到java源码
【已解决】用Procyon命令行去从jar包导出java源代码
不过打算继续试试,别人也常提到CFR,看看效果如何。
CFR – yet another java decompiler.
看了介绍
“CFR – another java decompiler
CFR will decompile modern Java features – up to and including much of Java 9, 10, 12 and beyond, but is written entirely in Java 6, so will work anywhere! (FAQ) – It’ll even make a decent go of turning class files from other JVM langauges back into java!
To use, simply run the specific version jar, with the class name(s) you want to decompile (either as a path to a class file, or as a fully qualified classname on your classpath). (–help to list arguments).
Alternately, to decompile an entire jar, simply provide the jar path, and if you want to emit files (which you probably do!) add –outputdir /tmp/putithere”
-》其用法倒是和Procyon很类似
-》也是只支持 单个jar文件整个导出
也是要指定输出文件夹
等等
去试试
CFR=Class File Reader
下载
https://www.benf.org/other/cfr/cfr-0.141.jar
然后再去包含了要解析的jar包的文件夹中去:
java -jar /Users/crifan/dev/dev_tool/android/reverse_engineering/CFR/cfr-0.141.jar -jar com.huili.readingclub.jar --outputdir readingclub_CFR
即可:
注:反编译期间,也是CPU占用率非常高的
然后即可输出得到源码,其中还有个summary:
而简单看了下,发现对于我们希望的那个函数:
com.huili.readingclub.model.ModelSecurity的getToken
竟然也出错了:
Summary for com.huili.readingclub.jar
Decompiled with CFR 0.141

android.support.graphics.drawable.AnimationUtilsCompat
----------------------------

loadInterpolator(android.content.Context int )
  Unable to fully structure code

...

com.huili.readingclub.model.ModelSecurity
----------------------------


getToken(java.lang.String )
  Loose catch block
run()
  Loose catch block
不过看源码,实际上是可以解析出源码的,虽然提示有点小问题:
     * WARNING - Removed back jump from a try to a catch block - possible behaviour change.
     * Loose catch block
     * Enabled aggressive block sorting
     * Enabled unnecessary exception pruning
     * Enabled aggressive exception aggregation
     * Lifted jumps to return sites
     */
    private static String getToken(final String string2) {
        ...
        ...


        lock.lock();
        Runnable runnable = new Runnable((String)charSequence){
            ...


            /*
             * WARNING - Removed back jump from a try to a catch block - possible behaviour change.
             * Loose catch block
             * Enabled aggressive block sorting
             * Enabled unnecessary exception pruning
             * Enabled aggressive exception aggregation
             * Lifted jumps to return sites
             */
            @Override
            public void run() {
                Throwable throwable2222;
                block11 : {
                    block9 : {
                        Object object;
                        block10 : {
                            lock.lock();
                            object = new Object();
-》所以,这个CFR也还是不错的。
【总结】
此处,用CFR=Class File Reader去反编译jar包,导出java源代码的步骤是:
1.下载cfr的jar包
-》
2.命令行运行,从某个jar包,反编译导出整个java源码
语法:
java -jar /path_to_your_cfr/cfr-0.141.jar -jar your_to_decompile.jar --outputdir output_folder_name
举例:
java -jar /Users/crifan/dev/dev_tool/android/reverse_engineering/CFR/cfr-0.141.jar -jar com.huili.readingclub.jar --outputdir readingclub_CFR
即可输出:
对应文件夹
包含:
  • 所有的java源码
  • summary.txt
    • 记录了有哪些类转换失败和具体失败的原因
      • 还是不错的,值得参考和利用,好知道具体哪些类转换期间出了啥问题

转载请注明:在路上 » 【已解决】用java反编译器CFR从jar包导出java源代码

发表我的评论
取消评论

表情

Hi,您需要填写昵称和邮箱!

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址
88 queries in 0.109 seconds, using 20.71MB memory