ЯevDex – Telegram
ЯevDex
2.1K subscribers
56 photos
33 videos
59 files
72 links
My GitHub - https://github.com/ispointer
Telegram Bot - @RevDexbot
Telegram Chat: @RevDexChat
Download Telegram
PaintSSL 2.0.apk
4.8 MB
PaintSSL 2.0.apk

New feature

VPN Detector Hide ( Advance Fully 💥)

SSL Hide Advance ( 2.0 )

Pairip = licensecheck Hide

Adb Detect Hide

Root Detect Hide

Developer Detect Hide

5 New feature Added 💥
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥166
Media is too big
VIEW IN TELEGRAM
Memory Tracer is a type of memory debugger.
It helps you find where in the game’s memory a value is being read or written.

Imagine you find a game value with GameGuardian.
Normally you just see the memory address.
But with Memory Tracer, you can trace it back to the source

Game Value ---> Memory Address ---> Memory Tracer traces source --> libgame.so + 0x8238




Here
libgame.so = the main game library file
0x8238 = the offset, which tells you the exact place inside the library where the memory is accessed.

When you run Memory Tracer, it shows you which function is actually reading or writing that value, even if the memory address changes dynamically
13👍1
I think it's good. If you know of a better cable, please let me know
8👌2
DexArrayPayloadFuck.jar
3.9 MB
DexArrayPayloadFuck


https://github.com/REAndroid/APKEditor/commit/d23e0e6eebecae6bb0eab17cba05f2fd2ba9e1fd

java -jar APKEditor.jar p -i input.apk -o output.apk -dex-level 1



Gone this Protection Recovery Full Dex

Dev - @aantik_mods

pkg install openjdk-21


java -jar DexArrayPayloadFuck.jar <encryptedDex> <OutputDexName>

Extra Array code cleaner

You can compare its output classes.dex file with MT Manager no any changes full real dex recovery
🔥54
Media is too big
VIEW IN TELEGRAM
REAndroid Dex confusion remove

Raw Dex Recovery
❤‍🔥5
23🥰3🔥2
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥32
dex-cleaner_master.zip
7.3 MB
dex-cleaner_master.zip

ReAndroid Dex Recovery Project Public open source

Dev - @aantik_mods
1🔥9👌2
I recently built VMDumper, a kernel32.dll based memory scanning system.

What it does when you run an Android emulator on PC you’ll see not only the emulator process itself but also helper/extended processes (for example Mumu.exe or HyperMemu.exe). One of those secondary processes is essentially the *application runner* through it you can access the memory of apps running inside the emulator. Think of it like how a phone kernel can be modified to expose full device memory: here you get similarly deep, low-level access to the emulator’s memory from user space.

Because this runs at the memory kernel-access level, you can dynamically recover full app artifacts for example classes.dex blobs directly from memory no rooting, no Frida, no usual PID/package-based targeting required haha 😆That’s also the main constraint: you cannot target processes by package name or PID the way traditional dex-dump tools do. Previously, free tools and most dex-dumpers scanned a process by PID or package name and then dumped dex files. VMDumper is different it operates on raw memory access and provides a far more fundamental, kernel-like ability to extract app memory contents

Same technique I recently use jiagu 360 dumping working My deep learning stage #1

Research paper maked by - @aantik_mods
4🔥9
ADB Port Manager.zip
75.2 KB
Main feature : automatically install ADB on the device and set Environment Variables automatically

Cross-platform support
Windows (7, 8, 8.1, 10, 11)
Termux (Android)
Linux (including Kali)

[1] Scan devices
[2] List forwarded ports
[3] Add forward
[4] Remove forward
[5] Remove all forwards
[6] Open adb shell
[7] Exit
4
IDA Professional 9.0.zip
407.2 MB
Btw you can use this 9.0 version which support the IDA PRO MCP

Private Version Recently Leached
4
Memory Tracer ( Free @aantik_mods) .apk
1.5 MB
Memory Tracer ( Free @aantik_mods)


No need Login ↔️ Completely ( Free )

Arm32 & Arm64 ( working )

Video -- https://youtu.be/g20j4-KGoXE?si=pt0rCll-JODXQm4s
Please open Telegram to view this post
VIEW IN TELEGRAM
9😭9👌3
New : Print the assembly instruction for every memory access

->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]


ldr w8, [x22] 😁

Old

->Traced (4 unique offsets):
1. libgame.so + 0xBE298 (109x) [Read D8D13A88]
2. libgame.so + 0x3874B4 (50x) [Read D8D13AA4]
3. libgame.so + 0x3BC2E8 (20x) [Read D8D13AA8]
4. libgame.so + 0x3FA788 (179x) [Read D8D1329C]

If you get a good response I will upload it otherwise I can't upload new version

Capstone Version Vs Old Version 💥
Please open Telegram to view this post
VIEW IN TELEGRAM
19😭2😍1
strdumpv1
67 KB
strdump

./strdump antik.memtools libAntik.so


Any type library String Dumper


Credit - https://github.com/capstone-engine/capstone

ASCII/UTF-8 // 1000% Dump
UTF-16LE, UTF-16BE string V1
UTF-32LE string Decor All args dump
Duplicate skip garbage Skipper

🖥 LGL or ImGUI all string dumping & Any type Library Encrypted string Analyzer
Please open Telegram to view this post
VIEW IN TELEGRAM
9👎1🔥1
Memory Tracer Assembly.apk
3.2 MB
Memory Tracer Assembly

Print Every Address Assembly instruction

->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]


ldr w8, [x22] 😂


<service
android:name="antik.memtools.modmenu.FloatingModMenuService"
android:enabled="true"
android:exported="false"
android:stopWithTask="true" />


<uses-permission android:name="android.permission.SYSTEM_ALERT_WINDOW" />


invoke-static {p0}, Lantik/memtools/MainActivity;->Start(Landroid/content/Context;)V
4
Arm Converter 2.0.apk
5.2 MB
Arm Converter 2.0

Hex → Assembly

Assembly → Hex

Support all Abis

Dev - @aantik_mods

🖥 Offline Version
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥52👎2