cookie

Мы используем файлы cookie для улучшения сервиса. Нажав кнопку «Принять все», вы соглашаетесь с использованием cookies.

avatar

AbhiTheModder

- @RevEngiBot | @RevEngiTeam - understand-smali: smali.pages.dev Medical Student by profession Android Reverse Engineer by Passion Just Some random posts... https://bit.ly/m/AbhiTheModder

Больше
Рекламные посты
1 688
Подписчики
+924 часа
+497 дней
+19330 дней

Загрузка данных...

Прирост подписчиков

Загрузка данных...

📁Superfile – A fancy, pretty terminal file manager https://github.com/MHNightCat/superfile ⬇️Install pre-built binaries Just copy and paste this one-line command: bash -c "$(curl -sLo- https://raw.githubusercontent.com/MHNightCat/superfile/main/install.sh)" Or wget: bash -c "$(wget -qO- https://raw.githubusercontent.com/MHNightCat/superfile/main/install.sh)"
Показать все...
👍 6 6
Python script to print Dart object usages in Object Pool of flutter libapp.so Aarch64 for radare2. 👉 https://gist.github.com/e66986edf1e1d6a41138b7d390d6809a.git Inspired from latest talk of cryptax For Example, Let's take example of this explanation, Suppose you have an Object "ACTIVE" inside pp.txt and you want to find where it's being used inside whole binary
Usage: 
~ $ python ppSearch.py [-h] binary hex_value 
Search for specific patterns in a binary file. 
positional arguments: 
  binary      Path to the binary file 
  hex_value   Hex value to search 
options: 
  -h, --help  show this help message and exit
[ pp+0xf8d0 ] Obj!AccountStatus@eee201: { Super!_Enum: { off_8 : int(0x3) , off_10 : "ACTIVE" } } You can search for like this:
Example: 
~$ python ppSearch.py libapp.so 0xf8d0 
The First Target is: 0xf
The Second Target is: 0x8d0
Found 1 direct matches:
            0x007e5c50      613f4091       add x1, x27, 0xf, lsl 12
            0x007e5c54      216844f9       ldr x1, [x1, 0x8d0]         ; 0xdb
 
Script execution time: 12.362151384353638 seconds
Показать все...
❤‍🔥 8👌 3🔥 2
🔥 1
Flutter Reverse Engineering: Object Pool Analysis What's in this PDF: ⦁ Analyzing the object pool in Dart VM. ⦁ Dealing with enum types in Dart VM. ⦁ Dive into ARM Assembly. Note: The PDF explains various codes of Dart VM, which we have converted into Smali for better understanding by members. Download the demo app and analyze its codes: 👉 Demo App to Understand Dart VM Codes https://t.me/TDOhex/443 Example used in this PDF: App Name: Narrative-Write your own novel Version: 6.1.15(700017) Play Store Link: https://play.google.com/store/apps/details?id=app.gonarrative.narrative 👉 Flutter Examples to Reach Place to Patch Through revenuecat https://t.me/TDOhex/439 👉 Flutter Reverse Engineering: Boolean Mystery in Dart VM https://t.me/TDOhex/440 👉 Patches for Boolean Function of Dart VM https://t.me/TDOhex_Discussion/19429 👉 For Index of Other Tutorials: https://t.me/TDOhex/376 💥💥💥💥💥💥💥💥💥💥 📚 Guide by @TDOhex ♻️ Join us for more Info 💥💥💥💥💥💥💥💥💥💥
Показать все...
3 3❤‍🔥 2👍 1
https://github.com/Kirlif/Python-Stuff/blob/main/CRCFix.py Here is CRCFix.py, a reliable python « crcfixer » produced by Kirlif': - fix all files by default. - fix all date/time fields by default. - create a new file: my_package_crc.apk Options available: - restore only dex files CRC - not restore date/time - patch the mod directly or not If needed we can pass a bundle package to the CLI (base package at first).
usage: CRCFix [-h] [-v] [-c] [-d] [-t] [-f] source [source ...] target
Source: https://t.me/TDOhex_Discussion/30097
Показать все...
9❤‍🔥 3🏆 2👍 1
Xiaomi devices running Android have been found to contain multiple security vulnerabilities in various apps and system components. These flaws could lead to unauthorized access, data theft, and privacy breaches. The 20 shortcomings impact different apps and components like - Gallery (com.miui.gallery) GetApps (com.xiaomi.mipicks) Mi Video (com.miui.videoplayer) MIUI Bluetooth (com.xiaomi.bluetooth) Phone Services (com.android.phone) Print Spooler (com.android.printspooler) Security (com.miui.securitycenter) Security Core Component (com.miui.securitycore) Settings (com.android.settings) ShareMe (com.xiaomi.midrop) System Tracing (com.android.traceur), and Xiaomi Cloud (com.miui.cloudservice) Learn more: https://blog.oversecured.com/20-Security-Issues-Found-in-Xiaomi-Devices/
Показать все...
🔥 6👍 2
A Simple (Initial Stage) GUI Implementation of REAndroid/APKeditor https://github.com/AbdurazaaqMohammed/AntiSplit-M
Показать все...
GitHub - AbdurazaaqMohammed/AntiSplit-M: App to AntiSplit (merge) split APKs (APKS/XAPK/APKM) to regular .APK file on Android

App to AntiSplit (merge) split APKs (APKS/XAPK/APKM) to regular .APK file on Android - AbdurazaaqMohammed/AntiSplit-M

👍 11
Показать все...
GitHub - yhs0602/Kovik: Dalvik emulator written in Kotlin, highly inspired by Katalina

Dalvik emulator written in Kotlin, highly inspired by Katalina - yhs0602/Kovik

🔥 5👍 1
reversing flutter application by cryptax https://youtu.be/JNoEUPlgcZk?feature=shared Slides: https://t.me/AbhiTheM0dder/1184
Показать все...
Nullcon Berlin 2024 | The Complexity Of Reversing Flutter Applications - Axelle Apvrille

Abstract Flutter is a cross-platform application development platform. With the same codebase, developers write and compile native applications for Android, iOS, Windows, Linux. In this presentation, we explain how to make sense of the assembly code. We illustrate the talk by walking the audience towards the solution of a Dart challenge which was part of GreHack CTF 2023. We run the program, parse the Dart AOT snapshot, and use Radare2 to disassemble it. We locate access to the Object Pool, which uses a custom register, and compute the reference to the accessed objects. Finally, we uncover the creation of the flag and solve the challenge. #Flutter #AssemblyCode #CTFChallenge #reverseengineering Know more -

https://nullcon.net/berlin-2024/speaker-the-complexity-of-reversing-flutter-applications

----------------- Follow Nullcon on Facebook:

https://www.facebook.com/nullcon

X:

https://twitter.com/nullcon

LinkedIn:

https://www.linkedin.com/company/7593034/admin/feed/posts/

Website:

https://nullcon.net/

🔥 9👍 1
Показать все...
😁 5🤣 4👍 2 1