DexArrayPayloadFuck.jar
3.9 MB
DexArrayPayloadFuck
https://github.com/REAndroid/APKEditor/commit/d23e0e6eebecae6bb0eab17cba05f2fd2ba9e1fd
Gone this Protection Recovery Full Dex
Dev - @aantik_mods
Extra Array code cleaner
You can compare its output classes.dex file with MT Manager no any changes full real dex recovery
https://github.com/REAndroid/APKEditor/commit/d23e0e6eebecae6bb0eab17cba05f2fd2ba9e1fd
java -jar APKEditor.jar p -i input.apk -o output.apk -dex-level 1
Gone this Protection Recovery Full Dex
Dev - @aantik_mods
pkg install openjdk-21
java -jar DexArrayPayloadFuck.jar <encryptedDex> <OutputDexName>
Extra Array code cleaner
You can compare its output classes.dex file with MT Manager no any changes full real dex recovery
🔥5❤4
I recently built VMDumper, a kernel32.dll based memory scanning system.
What it does when you run an Android emulator on PC you’ll see not only the emulator process itself but also helper/extended processes (for example
Because this runs at the memory kernel-access level, you can dynamically recover full app artifacts for example classes.dex blobs directly from memory no rooting, no Frida, no usual PID/package-based targeting required haha 😆That’s also the main constraint: you cannot target processes by package name or PID the way traditional dex-dump tools do. Previously, free tools and most dex-dumpers scanned a process by PID or package name and then dumped dex files. VMDumper is different it operates on raw memory access and provides a far more fundamental, kernel-like ability to extract app memory contents
Same technique I recently use jiagu 360 dumping working My deep learning stage #1
Research paper maked by - @aantik_mods
What it does when you run an Android emulator on PC you’ll see not only the emulator process itself but also helper/extended processes (for example
Mumu.exe or HyperMemu.exe). One of those secondary processes is essentially the *application runner* through it you can access the memory of apps running inside the emulator. Think of it like how a phone kernel can be modified to expose full device memory: here you get similarly deep, low-level access to the emulator’s memory from user space.Because this runs at the memory kernel-access level, you can dynamically recover full app artifacts for example classes.dex blobs directly from memory no rooting, no Frida, no usual PID/package-based targeting required haha 😆That’s also the main constraint: you cannot target processes by package name or PID the way traditional dex-dump tools do. Previously, free tools and most dex-dumpers scanned a process by PID or package name and then dumped dex files. VMDumper is different it operates on raw memory access and provides a far more fundamental, kernel-like ability to extract app memory contents
Same technique I recently use jiagu 360 dumping working My deep learning stage #1
Research paper maked by - @aantik_mods
4🔥9
ADB Port Manager.zip
75.2 KB
Main feature : automatically install ADB on the device and set Environment Variables automatically
Cross-platform support
Windows (7, 8, 8.1, 10, 11)
Termux (Android)
Linux (including Kali)
[1] Scan devices
[2] List forwarded ports
[3] Add forward
[4] Remove forward
[5] Remove all forwards
[6] Open adb shell
[7] Exit
Cross-platform support
Windows (7, 8, 8.1, 10, 11)
Termux (Android)
Linux (including Kali)
[1] Scan devices
[2] List forwarded ports
[3] Add forward
[4] Remove forward
[5] Remove all forwards
[6] Open adb shell
[7] Exit
❤4
IDA Professional 9.0.zip
407.2 MB
Btw you can use this 9.0 version which support the IDA PRO MCP
Private Version Recently Leached
Private Version Recently Leached
❤4
Memory Tracer ( Free @aantik_mods) .apk
1.5 MB
Memory Tracer ( Free @aantik_mods)
No need Login↔️ Completely ( Free )
Arm32 & Arm64 ( working )
Video -- https://youtu.be/g20j4-KGoXE?si=pt0rCll-JODXQm4s
No need Login
Arm32 & Arm64 ( working )
Video -- https://youtu.be/g20j4-KGoXE?si=pt0rCll-JODXQm4s
Please open Telegram to view this post
VIEW IN TELEGRAM
❤9😭9👌3
New : Print the assembly instruction for every memory access
->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]
ldr w8, [x22] 😁
Old
->Traced (4 unique offsets):
1. libgame.so + 0xBE298 (109x) [Read D8D13A88]
2. libgame.so + 0x3874B4 (50x) [Read D8D13AA4]
3. libgame.so + 0x3BC2E8 (20x) [Read D8D13AA8]
4. libgame.so + 0x3FA788 (179x) [Read D8D1329C]
If you get a good response I will upload it otherwise I can't upload new version
Capstone Version Vs Old Version💥
->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]
ldr w8, [x22] 😁
Old
->Traced (4 unique offsets):
1. libgame.so + 0xBE298 (109x) [Read D8D13A88]
2. libgame.so + 0x3874B4 (50x) [Read D8D13AA4]
3. libgame.so + 0x3BC2E8 (20x) [Read D8D13AA8]
4. libgame.so + 0x3FA788 (179x) [Read D8D1329C]
If you get a good response I will upload it otherwise I can't upload new version
Capstone Version Vs Old Version
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤9😭2😍1
strdumpv1
67 KB
strdump
./strdump antik.memtools libAntik.so
Any type library String Dumper
Credit - https://github.com/capstone-engine/capstone
ASCII/UTF-8 // 1000% Dump
UTF-16LE, UTF-16BE string V1
UTF-32LE string Decor All args dump
Duplicate skip garbage Skipper
🖥 LGL or ImGUI all string dumping & Any type Library Encrypted string Analyzer
./strdump antik.memtools libAntik.so
Any type library String Dumper
Credit - https://github.com/capstone-engine/capstone
ASCII/UTF-8 // 1000% Dump
UTF-16LE, UTF-16BE string V1
UTF-32LE string Decor All args dump
Duplicate skip garbage Skipper
Please open Telegram to view this post
VIEW IN TELEGRAM
❤9👎1🔥1
Memory Tracer Assembly.apk
3.2 MB
Memory Tracer Assembly
Print Every Address Assembly instruction
->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]
ldr w8, [x22] 😂
Print Every Address Assembly instruction
->Traced (3 unique offsets):
1. libgame.so + 0x178380 (10x) [WRITE @7339E5E680] → ldr w9, [x8]
2. libgame.so + 0x3E6FA0 (260x) [WRITE @7339E5E69C] → ldr w8, [x8]
3. libgame.so + 0x413620 (50x) [WRITE @7339E5E69C] → ldr w8, [x22]
ldr w8, [x22] 😂
<service
android:name="antik.memtools.modmenu.FloatingModMenuService"
android:enabled="true"
android:exported="false"
android:stopWithTask="true" />
<uses-permission android:name="android.permission.SYSTEM_ALERT_WINDOW" />
invoke-static {p0}, Lantik/memtools/MainActivity;->Start(Landroid/content/Context;)V
❤4
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
AppSealin加固 Dump & Repack 😂 you can't dump this protection
C++ Raw method
C++ Raw method
🤯9😘1