English | 简体中文
dpt-shell is an Android Dex protection shell that hollows out Dex method implementations and reconstructs them at runtime.
Go to Releases download executable.zip and unzip it, run the follow command lines in terminal:
java -jar dpt.jar -f /path/to/android-package-filegit clone --recursive https://github.com/luoyesiqiu/dpt-shell
cd dpt-shell
./gradlew assemble
cd executable
java -jar dpt.jar -f /path/to/android-package-fileusage: java -jar dpt.jar [option] -f <package_file>
-c,--protect-config <arg> Protect config file.
--debug Make package debuggable.
--disable-acf Disable app component factory(just use for
debug).
--dump-code Dump the code item of DEX and save it to
.json files.
-e,--exclude-abi <arg> Exclude specific ABIs (comma separated, e.g.
x86,x86_64).
Supported ABIs:
- arm (armeabi-v7a)
- arm64 (arm64-v8a)
- x86
- x86_64
-f,--package-file <arg> Need to protect android package(*.apk, *.aab)
file.
-K,--keep-classes Keeping some classes in the package can
improve the app's startup speed to a certain
extent, but it is not supported by some
application packages.
--noisy-log Open noisy log.
-o,--output <arg> Output directory for protected package.
-r,--rules-file <arg> Rules file for class names that will not be
protected.
-S,--smaller Trade some of the app's performance for a
smaller app size.
-v,--version Show program's version number.
-x,--no-sign Do not sign package.
This project has not too many tests, be careful use in prod environment. Otherwise, all consequences are at your own risk.