安卓crackme
本帖最后由 collinchen1218 于 2024-7-14 22:19 编辑成功截图:
下载:https://www.123pan.com/s/bpImTd-pk8Jv.html
捣腾了三四天的安卓cm,编译还要linux,我装了一个hyperv的ubuntu,不行删了,换vmware player,被我错误安装了两个python,打架了,删了,换wsl,报错,删了,VMware player安装完连不上网,换vmware workstation,还是安装报错,于是找到了现成的,但是8g内容百度网盘我下载不了,又说不能发悬赏,是违规的,去b站找到了百度网盘不限速的,昨天又捣腾一个晚上,自己弄还是报错,因为会在当前文件夹下载依赖模块,还是不行,就把编译出来的那个文件夹里的main.py替换了重新编译,但是我要改软件名称和包名,一改又报错,后来没办法,先编译出来,再用np管理器改包名和图标,软件名,昨晚测试不能用,网络错误,后来早晨测试又可以了,编译真不容易啊
# Source Generated with Decompyle++
# File: main.pyc (Python 3.10)
from kivy.app import App
from kivy.uix.boxlayout import BoxLayout
from kivy.uix.button import Button
from kivy.uix.textinput import TextInput
from kivy.uix.popup import Popup
from kivy.uix.label import Label
class CheckApp(App):
def build(self):
self.layout = BoxLayout('vertical', 10, 10, **('orientation', 'spacing', 'padding'))
self.input = TextInput('Enter Password', True, **('text', 'multiline'))
self.button = Button('Check', (1, 0.5), **('text', 'size_hint'))
self.button.bind(self.check_input, **('on_press',))
self.layout.add_widget(self.input)
self.layout.add_widget(self.button)
return self.layout
def check_input(self, instance):
if self.input.text == 'crackme_20240710_android_gui_py_y7238wyqdu5y4w_52pj':
self.show_popup('Correct!', 'Input is correct!')
return None
None.show_popup('Incorrect!', 'Input is incorrect!')
def show_popup(self, title, content):
popup_layout = BoxLayout('vertical', 10, 10, **('orientation', 'spacing', 'padding'))
label = Label(content, **('text',))
close_button = Button('Close', **('text',))
close_button.bind(self.close_popup, **('on_press',))
popup_layout.add_widget(label)
popup_layout.add_widget(close_button)
self.popup = Popup(title, popup_layout, (None, None), (500, 300), **('title', 'content', 'size_hint', 'size'))
self.popup.open()
def close_popup(self, instance):
self.popup.dismiss()
if __name__ == '__main__':
CheckApp().run()
return None Arcticlyc 发表于 2024-7-14 10:09
其实你直接用文本编辑器就能看见密码了,python 似乎不会编译字符串
S )NZ3crackme_20240710_android_gui_py_y7238wyqdu5y4w_52pjzCorrect!z
有是有,但是不反编译猜不出到底是啥 本帖最后由 collinchen1218 于 2024-7-14 09:58 编辑
Arcticlyc 发表于 2024-7-14 09:53
# Source Generated with Decompyle++
# File: main.pyc (Python 3.10)
这段代码位于何处?我还以为编译成java了呢{:301_1004:} collinchen1218 发表于 2024-7-14 09:56
这段代码位于何处?我还以为编译成java了呢
./assets/private.tar/main.pyc Arcticlyc 发表于 2024-7-14 09:58
然后pyc反编译为py,对吗? collinchen1218 发表于 2024-7-14 10:08
然后pyc反编译为py,对吗?
其实你直接用文本编辑器就能看见密码了,python 似乎不会编译字符串 collinchen1218 发表于 2024-7-14 10:17
S ) NZ3crackme_20240710_android_gui_py_y7238wyqdu5y4w_52pjz Correct!z
有些经验的很容易猜到 作为crackme这体积也太大了,看评论区你是塞了个python环境进去?
页:
[1]
2