Sh4DoW321 发表于 2023-4-6 14:55

JEB Decompiler 4.29.0.202304042205

mod by CXV

Press Generate a Key in welcome window

- fix all integrity checks\timebomb
- Time-limited sessions fixed
- Requires an Internet connection fixed
- dexdec: fix string decrypt via emulation
- dexdec: instruction conversion recovered
- gui: Usage of the clipboard is disallowed fixed
- jdb2: Saving or loading projects is disabled fixed
- android debug enabled
- android native debug enabled
- avrdec: decompiler enabled
- Decompiler exporter fixed
- callgraph enabled

Download:
https://pixeldrain.com/u/x7EYnhEV

sas141 发表于 2023-4-27 18:56

yan_97 发表于 2023-4-26 22:31
老哥,注册机是哪个,能发一下不

https://www.cnblogs.com/imisu/p/15642944.html这篇帖子里面有注册机代码,和代码在线运行平台(https://tool.lu/coderunner/),复制代码到代码在线运行平台,再把机器码复制过去,运行代码就可以出key了。或者你把代码复制下来到自己的python开发环境里运行也可以。#https://bbs.pediy.com/
#!/usr/bin/env python
import os, sys, struct, time, binascii, hashlib

RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'

def rc4(Key, inData):
    Buf = ""
    S = range(256)
    K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
    j = 0
    for i in range(256):
      j = (S + K + j) % 256
      S, S = S, S
    i, j = 0, 0
    for x in range(len(inData)):
      i = (i + 1) % 256
      j = (j + S) % 256
      S, S = S, S
      Buf += chr(S[(S + S) % 256] ^ ord(inData))
    return Buf

def Long2Int(longdata):
    lo = longdata & 0xFFFFFFFF
    hi = (longdata >> 32) & 0x7FFFFFFF
    return hi, lo

def KeygenSN(LicenseSerial, MachineID):
    mhi, mlo = Long2Int(MachineID)
    lhi, llo = Long2Int(LicenseSerial)
    hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
    lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
    Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
    Z1 = int(time.time()) ^ 0x56739ACD
    s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
    return "%dZ%d%d" % (Z0, Z1, s)

def ParsePost(buf):
    Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
    flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
          Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
          TimeOffset, Kclass, Random2 = Info
    SysInfoData = buf
    assert CRC == binascii.crc32(buf) & 0xFFFFFFFF
    return Info, SysInfoData

def DecodeRc4Str(buf):
    buf = buf.decode('hex')
    i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf))
    return i, s

def GetJebLicenseKey():
    licdata = ""
    if licdata:
      i, MachineID = DecodeRc4Str(licdata)
      SN = KeygenSN(i, i)
      print "JEB License Key:", SN
      return SN

GetJebLicenseKey()
raw_input("Enter to Exit...")

evea 发表于 2023-4-8 16:46

链接: https://pan.baidu.com/s/1GwCwdAp0Ug9wLC13c1QQUA?pwd=ketw 提取码: ketw 复制这段内容后打开百度网盘手机App,操作更方便哦
--来自百度网盘超级会员v6的分享

xixicoco 发表于 2023-4-8 19:38

出处:https://tsrh.ws/threads/binary-ninja-v3-3-3996-commercial.13830/unread

sas141 发表于 2023-4-8 21:02

怎么我用不了,提示无法连接到pnfsoftware.com

good7801 发表于 2023-4-9 08:14

大神啊,太牛了,这个简直是神器啊

ping170 发表于 2023-4-9 19:50

mac 支持吗

CRoot 发表于 2023-4-9 22:09

sas141 发表于 2023-4-8 21:02
怎么我用不了,提示无法连接到pnfsoftware.com

他们家官方SSL证书过期了,估计等他们续了证书才行

chuest 发表于 2023-4-10 10:20

感谢分享~

fireworld 发表于 2023-4-10 12:23


这两个更新看上去不错

- dexdec: bridge for native code emulation (see blog)
(this large update allows the emulator to process native code invoked through the JNI)
- apk: arsc: tweaks and workarounds for new obfuscation methods

sas141 发表于 2023-4-10 20:44

CRoot 发表于 2023-4-9 22:09
他们家官方SSL证书过期了,估计等他们续了证书才行

感恩,我后来找了注册机自己生成了一个key
页: [1] 2 3
查看完整版本: JEB Decompiler 4.29.0.202304042205