吾爱破解 - LCG - LSG |安卓破解|病毒分析|www.52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 17355|回复: 83
收起左侧

[Other] JEB 3.24 Anti-BLM Edition(搬砖)

  [复制链接]
caicaisin 发表于 2020-8-20 13:53
[CRACKED] JEB 3.24 Anti-BLM Edition by DimitarSerg
INFO:
Maximum license type (copying, scripts, etc. work now).
Fixed all integrity checks/timebombs.
All the telemetry’s been cut out.
Removed the update checks and other shit that tries to connect to the Internet.
Added/reconstructed saving/loading project function.
Decompilation of missing opcodes for Android has been restored.
Restored display of variable values when hovering over them during debugging (Android).
Decompiling for other platforms was fixed (tested x86/x64, webAssembly, MIPS, ARM).
[BONUS]:
Added new option “Use BlueStacks adb” which allows the use of HD-Adb.exe from BlueStacks folder instead of default adb.exe for easy debugging using BlueStacks emulator.
Instruction:
Replace the original jeb.jar and jebc.jar with fixed.
Register it with Keygen (run it, serial will be copied to clipboard)
Installer (jeb-demo-3.24.0.202007280546-JEBDecompilerDemo-121820464987384330.zip)
https://www.sendspace.com/file/ucth5u 53
Fixed jeb.jar, jebc.jar and keygens:
https://www.sendspace.com/file/2qe1xv 41

How To Register
In JEB’s registration window, select “Manual Key Generation”:
Generate a key.
Method 1: Get the “license id” from the file: jeb-demo-3.24.0.202007280546\bin\app\jeb-license.txt
java -jar jeb3_keygen_0.2.0b.jar you_license_id
Mehotd 2.1: In JEB’s registration window, copy the contents of the “License data” field.
python27 jebKeygen.py
Input License Data: paste_you_license_data
Method 2.2: Running the script from method 2.1 online:
https://rextester.com/DYRN51380 13
Paste the generated key into the “License key” field.
Enjoy!


下载地址.txt

79 Bytes, 下载次数: 2077, 下载积分: 吾爱币 -1 CB

免费评分

参与人数 19吾爱币 +16 热心值 +15 收起 理由
cspoxie + 1 热心回复!
zyliu + 1 已经处理,感谢您对吾爱破解论坛的支持!
jiangshubiao + 1 + 1 谢谢@Thanks!
djzhao + 1 + 1 用心讨论,共获提升!
yanyongyu + 1 + 1 谢谢@Thanks!
ZjyCjy + 1 + 1 热心回复!
zejax + 1 我很赞同!
6603547 + 1 + 1 谢谢@Thanks!
冥界3大法王 + 1 楼楼你那个在线不好用36楼的那个我成功了,哈哈~~
lilysin + 1 + 1 热心回复!
duguyue + 1 + 1 我很赞同!
cpj1203 + 1 谢谢@Thanks!
56598006 + 1 热心回复!
EdwardKenway + 1 + 1 鼓励转贴优秀软件安全工具和文档!
5omggx + 1 + 1 鼓励转贴优秀软件安全工具和文档!
mscsky + 1 + 1 反对黑命贵,支持一个!
idou + 1 热心回复!
悠然地2012 + 1 + 1 用心讨论,共获提升!
tail88 + 1 + 1 谢谢@Thanks!

查看全部评分

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

冥界3大法王 发表于 2020-9-7 07:45
在线注册:https://tool.lu/coderunner/  我用的这个
[Asm] 纯文本查看 复制代码
#[url]https://bbs.pediy.com/[/url]
#!/usr/bin/env python
import os, sys, struct, time, binascii, hashlib

RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'

def rc4(Key, inData):
    Buf = ""
    S = range(256)
    K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
    j = 0
    for i in range(256):
        j = (S[i] + K[i] + j) % 256
        S[i], S[j] = S[j], S[i]
    i, j = 0, 0
    for x in range(len(inData)):
        i = (i + 1) % 256
        j = (j + S[i]) % 256
        S[i], S[j] = S[j], S[i]
        Buf += chr(S[(S[j] + S[i]) % 256] ^ ord(inData[x]))
    return Buf

def Long2Int(longdata):
    lo = longdata & 0xFFFFFFFF
    hi = (longdata >> 32) & 0x7FFFFFFF
    return hi, lo
    
def KeygenSN(LicenseSerial, MachineID):
    mhi, mlo = Long2Int(MachineID)
    lhi, llo = Long2Int(LicenseSerial)
    hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
    lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
    Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
    Z1 = int(time.time()) ^ 0x56739ACD
    s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
    return "%dZ%d%d" % (Z0, Z1, s)

def ParsePost(buf):
    Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
    flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
          Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
          TimeOffset, Kclass, Random2 = Info
    SysInfoData = buf[0x40:]
    assert CRC == binascii.crc32(buf[8:]) & 0xFFFFFFFF
    return Info, SysInfoData

def DecodeRc4Str(buf):
    buf = buf.decode('hex')
    i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf[8:]))
    return i, s
    
def GetJebLicenseKey():
    licdata = "480000007FA1213E135B4A3C9B275913A72A1B9E8C5172201286C6DC906A37D331DD79AD0D427C727EBA51AF2F532D4D90E3FA95E9876EAA52B3AF96974A14D6E819AF180B3590B28A201560DC315F4F"
    if licdata:
        i, MachineID = DecodeRc4Str(licdata)
        SN = KeygenSN(i[3], i[4])
        print "JEB License Key:", SN
        return SN

GetJebLicenseKey()
raw_input("Enter to Exit...")

免费评分

参与人数 1吾爱币 +1 热心值 +1 收起 理由
xjoker + 1 + 1 谢谢@Thanks!

查看全部评分

moganok 发表于 2020-8-20 14:24
weiantang 发表于 2020-8-20 16:25
L__ 发表于 2020-8-20 14:02
新版本,谢谢分享
562411486 发表于 2020-8-20 14:15
新版本,谢谢分享
AllWillNull 发表于 2020-8-20 14:50
必须要顶顶
zoro8 发表于 2020-8-20 15:12
谢谢分享,更新一下
SRT 发表于 2020-8-20 15:38
感谢楼主慷慨大方
GuanYuwo 发表于 2020-8-20 15:41
感谢分享
phenix21 发表于 2020-8-20 15:43
绑定大佬0.0
您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则 警告:本版块禁止灌水或回复与主题无关内容,违者重罚!

快速回复 收藏帖子 返回列表 搜索

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-4-27 02:08

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表