JEB Decompiler 3.19.1 Professional Edition by DimitarSerg
转帖:JEB is our reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.
Android Decompiler + Android Debuggers
Use JEB to perform reverse engineering of malicious APKs and security audits.
Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI front-end for desktop platforms, allow refactoring operation and scripting to automate complex tasks.
Perform static and dynamic analysis of Android applications, goodware or badware, small or large.
[*]Decompile code using our Dalvik decompiler, including multi-dex APK.
[*]Refactor the analysis to defeat obfuscated code generated by application protectors.
[*]Reconstruct resources and obfuscated XML files.
[*]Debug Dalvik code as well as all native code (Intel, ARM), seamlessly.
[*]Automate and script your reverse engineering tasks via our API.
Powerful
Perform precise and robust decompilation of Android apps and Dalvik bytecode.
Our in-house decompiler works on true Dalvik code: conversion from Dex to Jar, required by free tools, is not necessary with JEB (see why it matters).
Our Dalvik and native code debuggers offer unmatched features to seamlessly analyze real-time apps, allowing examination of code and hooking of sensitive APIs.
Flexible
Refactor, annotate, navigate, and modify the analysis output.
Our analysis modules support code refactoring, virtual hierarchy to organize highly obfuscated code, or code cleaning (for instance when decrypting obfuscated contents or un-reflecting code).
Extensible
Leverage the JEB API to automate reverse engineering tasks.
Using Java or Python, users can write their own scripts and plugins to automate the reverse engineering process. Power users can write full-blown analysis modules and headless front-ends.
pwd_ilbtcdnwiuypbzeo_
sn_#61641164873316763_
LEAK VERSION
The password and serial number are duplicated in the archive comments.
BLAKE2sp: 2603DB171BC15F8C1A5C021EDDD5D34E67A60D726C3B816434F990374A7D1597
CRC32: 785CC7F3
MD5: 8900217D5CC8CA008D694735009A3B92
SHA-1: 50F67CAD40B64A9B8854EC6179F244DF6A8139FB
SHA-256: F59FEB121509639C16A8A86AFA9F339E8AE5572DCDDB69500A6C2E68AD4EA7BB
下载地址:
[*]https://mir.cr/PUZ4PKK8
[*]https://mir.cr/SCM9HWDS
[*]https://www15.zippyshare.com/v/YDzMfiHg/file.html
试着剁了一下泄露的jeb-pro-3.19.1.202005071620,注册算法基本同2.2.5版。如果只是简单注册,没啥难度,但过期时间不确定是否同旧版算法。剁jeb的人如过江之鲫,已不新鲜。如果一个月后还没有雷锋出场,老中医就路见不平一把。如果有,就不跳出来了,让自己少点潜在风险。不锦上添花,只雪中送炭。 給出keygen算法:
import os, sys, struct, time, binascii, hashlib
RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'
def rc4(Key, inData):
Buf = ""
S = range(256)
K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
j = 0
for i in range(256):
j = (S + K + j) % 256
S, S = S, S
i, j = 0, 0
for x in range(len(inData)):
i = (i + 1) % 256
j = (j + S) % 256
S, S = S, S
Buf += chr(S[(S + S) % 256] ^ ord(inData))
return Buf
def Long2Int(longdata):
lo = longdata & 0xFFFFFFFF
hi = (longdata >> 32) & 0x7FFFFFFF
return hi, lo
def KeygenSN(LicenseSerial, MachineID):
mhi, mlo = Long2Int(MachineID)
lhi, llo = Long2Int(LicenseSerial)
hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
Z1 = int(time.time()) ^ 0x56739ACD
s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
return "%dZ%d%d" % (Z0, Z1, s)
def ParsePost(buf):
Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
TimeOffset, Kclass, Random2 = Info
SysInfoData = buf
assert CRC == binascii.crc32(buf) & 0xFFFFFFFF
return Info, SysInfoData
def DecodeRc4Str(buf):
buf = buf.decode('hex')
i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf))
return i, s
def GetJebLicenseKey():
licdata = raw_input("Input License Data:\n")
if licdata:
i, MachineID = DecodeRc4Str(licdata)
SN = KeygenSN(i, i)
print "JEB License Key:", SN
return SN
GetJebLicenseKey()
raw_input("Enter to Exit...") 本帖最后由 xJ_Juno_Jr 于 2020-6-3 11:31 编辑
附件2个注册机
java -jar jeb3_keygen_0.1.0b.jar 61641164873316763
py的用2.x 运行 输入许可证数据 Password: ilbtcdnwiuypbzeo
SN #61641164873316763 email123 发表于 2020-6-3 14:00
JEB 3.19.1 (jeb-pro) KeyGen v0.1.0b - iNVINCIBLE 2020
Compatibility: Retail (pro) v3
有个更新版,测试了下,不再是负的了
无脑转载,能用吗?
试过就知道,无限循环。 怎么全是英语 前两个链接进不去,第三个全广告。怎么下载哦 这些下载地址怎么这么怪? 全是英文,看不大明白,请教这是什么用的? ?????https://cdn.jsdelivr.net/gh/hishis/forum-master/public/images/patch.gif 本帖最后由 田田爱崽崽 于 2020-6-2 10:03 编辑
稍等,下载中,一会给你们传天翼云
大佬告知无用,所以就不传了 冥界3大法王 发表于 2020-6-2 09:29
无脑转载,能用吗?
试过就知道,无限循环。
大佬,请教下,怎么看这个是不是可以正常使用? 能用新版的java吗