吾爱破解 - LCG - LSG |安卓破解|病毒分析|www.52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 14602|回复: 43
收起左侧

[Android Tools] JEB Decompiler 3.19.1 Professional Edition by DimitarSerg

  [复制链接]
xdnice 发表于 2020-6-2 08:59
转帖:
JEB is our reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.


Android Decompiler + Android Debuggers
Use JEB to perform reverse engineering of malicious APKs and security audits.

Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.

Perform static and dynamic analysis of Android applications, goodware or badware, small or large.
  • Decompile code using our Dalvik decompiler, including multi-dex APK.
  • Refactor the analysis to defeat obfuscated code generated by application protectors.
  • Reconstruct resources and obfuscated XML files.
  • Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
  • Automate and script your reverse engineering tasks via our API.
Powerful
Perform precise and robust decompilation of Android apps and Dalvik bytecode.

Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB (see why it matters).

Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.

Flexible
Refactor, annotate, navigate, and modify the analysis output.

Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).

Extensible
Leverage the JEB API to automate reverse engineering tasks.

Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.




pwd_ilbtcdnwiuypbzeo_
sn_#61641164873316763_
LEAK VERSION


The password and serial number are duplicated in the archive comments.
BLAKE2sp: 2603DB171BC15F8C1A5C021EDDD5D34E67A60D726C3B816434F990374A7D1597
CRC32: 785CC7F3
MD5: 8900217D5CC8CA008D694735009A3B92
SHA-1: 50F67CAD40B64A9B8854EC6179F244DF6A8139FB
SHA-256: F59FEB121509639C16A8A86AFA9F339E8AE5572DCDDB69500A6C2E68AD4EA7BB




下载地址:
  • [size=1em]https://mir.cr/PUZ4PKK8
  • [size=1em]https://mir.cr/SCM9HWDS
  • https://www15.zippyshare.com/v/YDzMfiHg/file.html

免费评分

参与人数 3吾爱币 +3 热心值 +2 收起 理由
cpj1203 + 1 + 1 谢谢@Thanks!
盈盈一水间cc + 1 + 1 鼓励转贴优秀软件安全工具和文档!
yiwai2012 + 1 既然是转帖是否应该注明出处,再者这个是不能激活的

查看全部评分

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

scz 发表于 2020-6-2 17:51
试着剁了一下泄露的jeb-pro-3.19.1.202005071620,注册算法基本同2.2.5版。如果只是简单注册,没啥难度,但过期时间不确定是否同旧版算法。剁jeb的人如过江之鲫,已不新鲜。如果一个月后还没有雷锋出场,老中医就路见不平一把。如果有,就不跳出来了,让自己少点潜在风险。不锦上添花,只雪中送炭。 ​​​​
xixicoco 发表于 2020-6-2 23:59
給出keygen算法:
[Python] 纯文本查看 复制代码
import os, sys, struct, time, binascii, hashlib

RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'

def rc4(Key, inData):
    Buf = ""
    S = range(256)
    K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
    j = 0
    for i in range(256):
        j = (S[i] + K[i] + j) % 256
        S[i], S[j] = S[j], S[i]
    i, j = 0, 0
    for x in range(len(inData)):
        i = (i + 1) % 256
        j = (j + S[i]) % 256
        S[i], S[j] = S[j], S[i]
        Buf += chr(S[(S[j] + S[i]) % 256] ^ ord(inData[x]))
    return Buf

def Long2Int(longdata):
    lo = longdata & 0xFFFFFFFF
    hi = (longdata >> 32) & 0x7FFFFFFF
    return hi, lo
    
def KeygenSN(LicenseSerial, MachineID):
    mhi, mlo = Long2Int(MachineID)
    lhi, llo = Long2Int(LicenseSerial)
    hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
    lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
    Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
    Z1 = int(time.time()) ^ 0x56739ACD
    s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
    return "%dZ%d%d" % (Z0, Z1, s)

def ParsePost(buf):
    Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
    flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
          Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
          TimeOffset, Kclass, Random2 = Info
    SysInfoData = buf[0x40:]
    assert CRC == binascii.crc32(buf[8:]) & 0xFFFFFFFF
    return Info, SysInfoData

def DecodeRc4Str(buf):
    buf = buf.decode('hex')
    i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf[8:]))
    return i, s
    
def GetJebLicenseKey():
    licdata = raw_input("Input License Data:\n")
    if licdata:
        i, MachineID = DecodeRc4Str(licdata)
        SN = KeygenSN(i[3], i[4])
        print "JEB License Key:", SN
        return SN

GetJebLicenseKey()
raw_input("Enter to Exit...")
xJ_Juno_Jr 发表于 2020-6-3 11:17
本帖最后由 xJ_Juno_Jr 于 2020-6-3 11:31 编辑

附件2个注册机
java -jar jeb3_keygen_0.1.0b.jar 61641164873316763
py的用2.x 运行 输入许可证数据

jeb3_keygen.zip

5.96 KB, 下载次数: 146, 下载积分: 吾爱币 -1 CB

xixicoco 发表于 2020-6-3 10:34
Password: ilbtcdnwiuypbzeo
SN #61641164873316763

免费评分

参与人数 1吾爱币 +1 收起 理由
冥界3大法王 + 1 谢谢@Thanks!

查看全部评分

comeheres 发表于 2020-6-3 16:48
email123 发表于 2020-6-3 14:00
JEB 3.19.1 (jeb-pro) KeyGen v0.1.0b - iNVINCIBLE 2020

Compatibility: Retail (pro) v3

有个更新版,测试了下,不再是负的了

jeb3_keygen_0.2.0b.zip

4.95 KB, 下载次数: 122, 下载积分: 吾爱币 -1 CB

冥界3大法王 发表于 2020-6-2 09:29
无脑转载,能用吗?
试过就知道,无限循环。
赏氏朋友 发表于 2020-6-2 09:11
怎么全是英语
凡凡之呗 发表于 2020-6-2 09:11
前两个链接进不去,第三个全广告。怎么下载哦
redapple2015 发表于 2020-6-2 09:12
这些下载地址怎么这么怪?
asdqasdq 发表于 2020-6-2 09:12
全是英文,看不大明白,请教这是什么用的?
oudaidai 发表于 2020-6-2 09:15
?????
田田爱崽崽 发表于 2020-6-2 09:25
本帖最后由 田田爱崽崽 于 2020-6-2 10:03 编辑

稍等,下载中,一会给你们传天翼云

大佬告知无用,所以就不传了
田田爱崽崽 发表于 2020-6-2 09:41
冥界3大法王 发表于 2020-6-2 09:29
无脑转载,能用吗?
试过就知道,无限循环。

大佬,请教下,怎么看这个是不是可以正常使用?
E式丶男孩 发表于 2020-6-2 09:48
能用新版的java吗
您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则 警告:本版块禁止灌水或回复与主题无关内容,违者重罚!

快速回复 收藏帖子 返回列表 搜索

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-4-27 11:10

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表