dumpDex is xposed open source plug-ins on a github, it can be used to take off most of the current housing market, but also to reason this damn thing is really strange easy to use.
First, the preparatory work
First need root of a cell phone, I use a Huawei glory 6 (android5.1), installed Framework xposed
dumpDex Project Address: https://github.com/WrBug/dumpDex
You can download apk release, you can also compile your own package to apk installed to the phone, I personally prefer the second.
After installing the apk, for 32 mobile phones, you need to copy lib / armeabi-v7a / libnativeDump.so to /data/local/tmp/libnativeDump.so, permissions set to 777
Second, start shelling
Decompile apk, according to the characteristics found to be using Bang Bang reinforcement
Install the plug, restart the phone, open apk reinforcement, after shelling will dex / data / data / packet corresponding to the path / dump folder
As shown in FIG dex after shelling, part of which is dex shell, what needs to choose their own
Third, supplement
Set permissions problem, there are detailed instructions on GitHub
Compilation process there may be a problem allows you to set the signature, directly into your signature can debug
If the reinforcement package names corresponding to the PackageInfo.java not in itself can be added in PackageInfo.java
Applications are likely to have a jam or phone restart condition, but should be able to emerge shell, the proposed multi-off times
If the source code is part of the Department of Baidu shell, and there is no direct return dump, because not encountered Baidu's case, they will not know the specific reasons