caicaisin 发表于 2020-8-20 13:53

JEB 3.24 Anti-BLM Edition(搬砖)

JEB 3.24 Anti-BLM Edition by DimitarSerg
INFO:
Maximum license type (copying, scripts, etc. work now).
Fixed all integrity checks/timebombs.
All the telemetry’s been cut out.
Removed the update checks and other shit that tries to connect to the Internet.
Added/reconstructed saving/loading project function.
Decompilation of missing opcodes for Android has been restored.
Restored display of variable values when hovering over them during debugging (Android).
Decompiling for other platforms was fixed (tested x86/x64, webAssembly, MIPS, ARM).
:
Added new option “Use BlueStacks adb” which allows the use of HD-Adb.exe from BlueStacks folder instead of default adb.exe for easy debugging using BlueStacks emulator.
Instruction:
Replace the original jeb.jar and jebc.jar with fixed.
Register it with Keygen (run it, serial will be copied to clipboard)
Installer (jeb-demo-3.24.0.202007280546-JEBDecompilerDemo-121820464987384330.zip)
https://www.sendspace.com/file/ucth5u 53
Fixed jeb.jar, jebc.jar and keygens:
https://www.sendspace.com/file/2qe1xv 41

How To Register
In JEB’s registration window, select “Manual Key Generation”:
Generate a key.
Method 1: Get the “license id” from the file: jeb-demo-3.24.0.202007280546\bin\app\jeb-license.txt
java -jar jeb3_keygen_0.2.0b.jar you_license_id
Mehotd 2.1: In JEB’s registration window, copy the contents of the “License data” field.
python27 jebKeygen.py
Input License Data: paste_you_license_data
Method 2.2: Running the script from method 2.1 online:
https://rextester.com/DYRN51380 13
Paste the generated key into the “License key” field.
Enjoy!


冥界3大法王 发表于 2020-9-7 07:45

在线注册:https://tool.lu/coderunner/我用的这个
#https://bbs.pediy.com/
#!/usr/bin/env python
import os, sys, struct, time, binascii, hashlib

RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'

def rc4(Key, inData):
    Buf = ""
    S = range(256)
    K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
    j = 0
    for i in range(256):
      j = (S + K + j) % 256
      S, S = S, S
    i, j = 0, 0
    for x in range(len(inData)):
      i = (i + 1) % 256
      j = (j + S) % 256
      S, S = S, S
      Buf += chr(S[(S + S) % 256] ^ ord(inData))
    return Buf

def Long2Int(longdata):
    lo = longdata & 0xFFFFFFFF
    hi = (longdata >> 32) & 0x7FFFFFFF
    return hi, lo
   
def KeygenSN(LicenseSerial, MachineID):
    mhi, mlo = Long2Int(MachineID)
    lhi, llo = Long2Int(LicenseSerial)
    hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
    lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
    Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
    Z1 = int(time.time()) ^ 0x56739ACD
    s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
    return "%dZ%d%d" % (Z0, Z1, s)

def ParsePost(buf):
    Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
    flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
          Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
          TimeOffset, Kclass, Random2 = Info
    SysInfoData = buf
    assert CRC == binascii.crc32(buf) & 0xFFFFFFFF
    return Info, SysInfoData

def DecodeRc4Str(buf):
    buf = buf.decode('hex')
    i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf))
    return i, s
   
def GetJebLicenseKey():
    licdata = "480000007FA1213E135B4A3C9B275913A72A1B9E8C5172201286C6DC906A37D331DD79AD0D427C727EBA51AF2F532D4D90E3FA95E9876EAA52B3AF96974A14D6E819AF180B3590B28A201560DC315F4F"
    if licdata:
      i, MachineID = DecodeRc4Str(licdata)
      SN = KeygenSN(i, i)
      print "JEB License Key:", SN
      return SN

GetJebLicenseKey()
raw_input("Enter to Exit...")

moganok 发表于 2020-8-20 14:24

谢谢分享,更替很快啊。

weiantang 发表于 2020-8-20 16:25

这是啥玩意啊

L__ 发表于 2020-8-20 14:02

新版本,谢谢分享

562411486 发表于 2020-8-20 14:15

新版本,谢谢分享

AllWillNull 发表于 2020-8-20 14:50

必须要顶顶

zoro8 发表于 2020-8-20 15:12

谢谢分享,更新一下

SRT 发表于 2020-8-20 15:38

感谢楼主慷慨大方

GuanYuwo 发表于 2020-8-20 15:41

感谢分享

phenix21 发表于 2020-8-20 15:43

绑定大佬0.0
页: [1] 2 3 4 5 6 7 8 9 10
查看完整版本: JEB 3.24 Anti-BLM Edition(搬砖)