Java .class to .cpp converter for use with JNI
Currently fully supports only Java 8. Java 9+ and Android support is entirely experimental
Warning: blacklist/whitelist usage is recommended because this tool slows down code significantly (like do not obfuscate full Minecraft .jar)
本项目完全由 OpenAI Codex 和 Claude Code 完成 在该优秀框架的基础上添加了以下功能:
- 基本字符串,常量混淆
- 基本控制流扁平化混淆
- 基础虚拟化保护
- windows/linux中的部分反调试
本项目仅作测试项目
-
JDK 8
-
For Windows:
I recommend downloading Oracle JDK 8, though you need to have some login credentials on Oracle.
-
For Linux/MacOS:
Google "your distro install jdk 8", and install the required packages
-
-
CMake
-
For Windows:
Download the latest release from CMake
-
For Linux/MacOS:
Google "your distro install cmake" and install the required package (default -
apt/yum/brew install cmake)
-
-
C++/C compiler toolchain
-
For Windows:
Download the freeware version of MSVS from Microsoft and select Visual C++ compiler in opt-ins
Or install mingw if you have any experience with this.
-
For Linux/MacOS:
Google "your distro install g++"
-
Usage: native-obfuscator [-ahV] [--debug] [-b=<blackListFile>]
[--custom-lib-dir=<customLibraryDirectory>]
[-l=<librariesDirectory>] [-p=<platform>]
[--plain-lib-name=<libraryName>] [-w=<whiteListFile>]
<jarFile> <outputDirectory>
Transpiles .jar file into .cpp files and generates output .jar file
<jarFile> Jar file to transpile
<outputDirectory> Output directory
-a, --annotations Use annotations to ignore/include native obfuscation
-b, --black-list=<blackListFile>
File with a list of blacklist classes/methods for
transpilation
--custom-lib-dir=<customLibraryDirectory>
Custom library directory for LoaderUnpack
--debug Enable generation of debug .jar file (non-executable)
-h, --help Show this help message and exit.
-l, --libraries=<librariesDirectory>
Directory for dependent libraries
-p, --platform=<platform>
Target platform: hotspot - standard standalone
HotSpot JRE, std_java - java standard, android -
for Android builds (w/o DefineClass)
--plain-lib-name=<libraryName>
Plain library name for LoaderPlain
-V, --version Print version information and exit.
-w, --white-list=<whiteListFile>
File with a list of whitelist classes/methods for
transpilation
<jarFile> - input .jar file to obfuscate
<outputDirectory> - output directory where C++/new .jar file where be created
-l <librariesDirectory> - directory where dependant libraries should be, optional, but preferable
-p <platform> - JVM platform to run library on
Three options are available:
hotspot: will use HotSpot JVM internals and should work with most obfuscators (even with stack trace checking as well)std_java: will use only minor JVM internals that must be available on all JVMsandroid: use this method when building library for Android. Will use no JVM internals, as well as no DefineClass for hidden methods (obfuscators that rely on stack for string/name obfuscator will not work due to the fact that some methods will not be hidden)
-a - enable annotation processing
To use annotations for black/whitelisting methods/classes as native you can add the following library to your project:
com.github.radioegor146.native-obfuscator:annotations:master-SNAPSHOT
Also, you need to add JitPack to your repositories.
You can add the @Native annotation to include classes or individual methods in the native obfuscation process. Use
@NotNative to ignore methods inside classes marked as @Native; you can also apply @NotNative directly to a class to skip
native transpilation entirely when annotation processing is enabled.
Annotation combinations
@Nativeon a class – every eligible method is transpiled to native code.@Nativeon selected methods – only those methods are transpiled, other methods remain Java bytecode.@Nativeon a class with@NotNativeon specific methods – the marked methods stay as Java bytecode.@NotNativeon a class – the class is never transpiled even if individual members are annotated.
When only a subset of methods is transpiled, the obfuscator keeps all remaining methods (and any existing static initializers) unchanged in the output JAR while still generating the registration stubs required for the native methods.
Whitelist/Blacklist has higher priority than annotations.
-w <whiteList> - path to .txt file for whitelist of methods and classes if required
-b <blackList> - path to a .txt file for a blacklist of methods and classes if required
Both of them should come in such form:
<class>
<class>#<method name>#<method descriptor>
mypackage/myotherpackage/Class1
mypackage/myotherpackage/Class1#doSomething!()V
mypackage/myotherpackage/Class1$SubClass#doOther!(I)V
It uses internal names of classes and method descriptors for filtering (you can read more about it by googling "java internal class names" or "java method descriptors")
Also, you can use a wildcard matcher like these:
mypackage/myotherpackage/*
mypackage/myotherpackagewithnested/**
mypackage/myotherpackage/*/Class1
mypackage/myotherpackagewithnested/**/Class1
mypackage/myotherpackage/Class*
* matches a single entry (divided by /) in the class/package name
** matches all entries in class/package name
--plain-lib-name - if you ship your .jar separately from the result native libraries, or you use it for Android, you can specify the name of the native library that it will try to search while using.
--custom-lib-dir - if you want to set custom directory for storing libraries inside the jar
If you want to ship your .jar with native libraries in it, you should omit that argument, and after building native files, add them in the form of
x64-windows.dll
x64-linux.so
x86-windows.dll
x64-macos.dylib
arm64-linux.so
arm64-windows.dll
to the directory of the .jar file that this tool will print in stdout (by default native0/ or custom if --custom-lib-dir is present)
- Transpile your code using
java -jar native-obfuscator.jar <input jar> <output directory> - Run
cmake .in the resultcppdirectory - Add changes to .cpp code if necessary
- Run
cmake --build . --config Releasein resultcppdirectory to build .so/.dll file - Copy result .dll/.so from
build/libs/to the path specified in the previous paragraph. - Run created .jar
java -jar <output jar>and enjoy!
- Run
gradlew assembleto force gradle not to run tests after the build
You need to have Krakatau installed to your PATH, because test suite is using krak2 for some tests
- Run
gradlew buildto assemble and run full test suite
This tool uses tests from huzpsb/JavaObfuscatorTest
In case of any problems, feel free to open an issue or contact me at re146.dev