I'm using the evaluation version (5.4.1.0) with NAnt to obfuscate a dll. I'm calling out to nrobfuscate directly with an exec task.
I believe I have obfuscation working, using the 'F' option for full obfuscation. What I'm currently trying to understand is how I deobfuscate a stack trace at this point. I can't find any sort of mapping file that the obfuscator used. We use Zelix Klassmaster to obfuscate our Java code, and that produces a "zkm.remap" file, which can be used to translate the stack traces. What is the equivalent file for the spices.net obfuscator?