Back to Browse

Obfuscation Explained — How Android Apps Hide Code (R8/ProGuard Demo)

333 views
Nov 8, 2025
6:27

In this video I explain code obfuscation for Android—what it is, how it works, and how it looks during reverse engineering. You’ll learn: 🔹What obfuscation changes (class/method/field names, structure) 🔹R8/ProGuard basics: minifyEnabled, default configs, optimizer vs non-optimizer rules 🔹Why Activities/manifest-referenced classes aren’t renamed 🔹How to write keep rules (serialization, reflection) 🔹Custom name dictionaries for heavy obfuscation (and why malware loves them) 🔹Reading obfuscated code in JADX and common clues it’s obfuscated 🧰 Tools Used Android Studio – sample code demos JADX – APK decompiler 🔗 Useful Links Android R8/ProGuard docs: https://developer.android.com/topic/performance/app-optimization/enable-app-optimization ☕ If you’d like to support my work, you can tip on Ko-fi 👉 https://ko-fi.com/androidxray Thank you for your support! 🔔 Like the video and Subscribe for more Android security tutorials. 💬 Have questions or ideas? Comment below — I read them all. #AndroidSecurity #ReverseEngineering #Obfuscation #CyberSecurity #AndroidDevelopment

Download

1 formats

Video Formats

360pmp48.8 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Obfuscation Explained — How Android Apps Hide Code (R8/ProGuard Demo) | NatokHD