A fully automated tool to deobfuscate Android DEX files protected by various versions of the NPStringFog obfuscator.
If you run into any issues, have questions, or want to discuss reverse engineering, feel free to reach out:
- Telegram: @depreciatin
- NPStringFog (Standard XOR)
- NPStringFog3 (StringPool Array Variant)
- NPStringFog4 (MD5 Integrity / NPApp Variant)
- NPStringFog5 (Asset Mapping / Proxy Method Variant)
You can run this decryptor entirely in the cloud for free using GitHub Actions.
- Click Add file -> Upload files and upload your obfuscated
classes.dexto the main folder of this repository.- For NPStringFog4: Upload the
.npappfile if it exists. - For NPStringFog5: Upload the
np/directory containing the encrypted asset files.
- For NPStringFog4: Upload the
- Commit the changes.
- Go to the Actions tab at the top of the repository.
- Click NP-Deobfuscator-Cloud on the left sidebar.
- Click Run workflow on the right side.
- Wait for the job to complete (usually ~30 seconds). Click on the completed job and download the
Decrypted-DEX.zipfile from the Artifacts section at the bottom.
Ensure you have python3 and java installed. Place baksmali.jar and smali.jar in the same directory as the script.
python decrypt.py classes.dex