ЯevDex – Telegram
ЯevDex
2.1K subscribers
56 photos
33 videos
59 files
72 links
My GitHub - https://github.com/ispointer
Telegram Bot - @RevDexbot
Telegram Chat: @RevDexChat
Download Telegram
I think it's good. If you know of a better cable, please let me know
8👌2
DexArrayPayloadFuck.jar
3.9 MB
DexArrayPayloadFuck


https://github.com/REAndroid/APKEditor/commit/d23e0e6eebecae6bb0eab17cba05f2fd2ba9e1fd

java -jar APKEditor.jar p -i input.apk -o output.apk -dex-level 1



Gone this Protection Recovery Full Dex

Dev - @aantik_mods

pkg install openjdk-21


java -jar DexArrayPayloadFuck.jar <encryptedDex> <OutputDexName>

Extra Array code cleaner

You can compare its output classes.dex file with MT Manager no any changes full real dex recovery
🔥54
Media is too big
VIEW IN TELEGRAM
REAndroid Dex confusion remove

Raw Dex Recovery
❤‍🔥5
23🥰3🔥2
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥32
dex-cleaner_master.zip
7.3 MB
dex-cleaner_master.zip

ReAndroid Dex Recovery Project Public open source

Dev - @aantik_mods
1🔥9👌2
I recently built VMDumper, a kernel32.dll based memory scanning system.

What it does when you run an Android emulator on PC you’ll see not only the emulator process itself but also helper/extended processes (for example Mumu.exe or HyperMemu.exe). One of those secondary processes is essentially the *application runner* through it you can access the memory of apps running inside the emulator. Think of it like how a phone kernel can be modified to expose full device memory: here you get similarly deep, low-level access to the emulator’s memory from user space.

Because this runs at the memory kernel-access level, you can dynamically recover full app artifacts for example classes.dex blobs directly from memory no rooting, no Frida, no usual PID/package-based targeting required haha 😆That’s also the main constraint: you cannot target processes by package name or PID the way traditional dex-dump tools do. Previously, free tools and most dex-dumpers scanned a process by PID or package name and then dumped dex files. VMDumper is different it operates on raw memory access and provides a far more fundamental, kernel-like ability to extract app memory contents

Same technique I recently use jiagu 360 dumping working My deep learning stage #1

Research paper maked by - @aantik_mods
4🔥9
ADB Port Manager.zip
75.2 KB
Main feature : automatically install ADB on the device and set Environment Variables automatically

Cross-platform support
Windows (7, 8, 8.1, 10, 11)
Termux (Android)
Linux (including Kali)

[1] Scan devices
[2] List forwarded ports
[3] Add forward
[4] Remove forward
[5] Remove all forwards
[6] Open adb shell
[7] Exit
4
IDA Professional 9.0.zip
407.2 MB
Btw you can use this 9.0 version which support the IDA PRO MCP

Private Version Recently Leached
4
Memory Tracer ( Free @aantik_mods) .apk
1.5 MB
Memory Tracer ( Free @aantik_mods)


No need Login ↔️ Completely ( Free )

Arm32 & Arm64 ( working )

Video -- https://youtu.be/g20j4-KGoXE?si=pt0rCll-JODXQm4s
Please open Telegram to view this post
VIEW IN TELEGRAM
9😭9👌3
New : Print the assembly instruction for every memory access

->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]


ldr w8, [x22] 😁

Old

->Traced (4 unique offsets):
1. libgame.so + 0xBE298 (109x) [Read D8D13A88]
2. libgame.so + 0x3874B4 (50x) [Read D8D13AA4]
3. libgame.so + 0x3BC2E8 (20x) [Read D8D13AA8]
4. libgame.so + 0x3FA788 (179x) [Read D8D1329C]

If you get a good response I will upload it otherwise I can't upload new version

Capstone Version Vs Old Version 💥
Please open Telegram to view this post
VIEW IN TELEGRAM
19😭2😍1
strdumpv1
67 KB
strdump

./strdump antik.memtools libAntik.so


Any type library String Dumper


Credit - https://github.com/capstone-engine/capstone

ASCII/UTF-8 // 1000% Dump
UTF-16LE, UTF-16BE string V1
UTF-32LE string Decor All args dump
Duplicate skip garbage Skipper

🖥 LGL or ImGUI all string dumping & Any type Library Encrypted string Analyzer
Please open Telegram to view this post
VIEW IN TELEGRAM
9👎1🔥1
Memory Tracer Assembly.apk
3.2 MB
Memory Tracer Assembly

Print Every Address Assembly instruction

->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]


ldr w8, [x22] 😂


<service
android:name="antik.memtools.modmenu.FloatingModMenuService"
android:enabled="true"
android:exported="false"
android:stopWithTask="true" />


<uses-permission android:name="android.permission.SYSTEM_ALERT_WINDOW" />


invoke-static {p0}, Lantik/memtools/MainActivity;->Start(Landroid/content/Context;)V
4
Arm Converter 2.0.apk
5.2 MB
Arm Converter 2.0

Hex → Assembly

Assembly → Hex

Support all Abis

Dev - @aantik_mods

🖥 Offline Version
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥52👎2
This media is not supported in your browser
VIEW IN TELEGRAM
AppSealin加固 Dump & Repack 😂 you can't dump this protection

C++ Raw method
🤯9😘1