Android反编译全平台破解版Nb工具:JEB

2022-08-31  本文已影响0人  逆水寒Stephen

参考来源:https://www.52pojie.cn/thread-1598242-1-1.html,更详细的教程可访问该文章,为避免文章丢失,扒了文章部分图和内容,特此记录!!

JEB安装及激活

  • 下载地址:https://pan.baidu.com/s/168RjxkVL655ydz0Fwt2Kvw?pwd=vbup,我自己传了一份在阿里云云盘,无法分享,需要可私信call我
  • 解压压缩包,再解压jeb.zip****后,将fix文件夹下的jeb.jar复制并替换到****jeb\bin\app文件夹下


    121114dvg6h267bw1z617k.png
  • 激活:移动好后双击jeb/jeb_wincon.bat(mac平台和linux平台请终端跑对应的sh脚本)打开jeb,此时会弹出激活注册界面,选择Manual Key Genaration,复制许可证数据。如果双击jeb_wincon.bat不能打开jeb,需要检查一下自己java环境是否配置好!


    121713oee79x1y61xymemr.jpg
    122036cgr51dlze0zewmzp.jpg
  • 得到许可证数据后,复制到下面Python代码的licdata = ""里面,类似:licdata = "480000xxxx"
#[url=https://bbs.pediy.com/]https://bbs.pediy.com/[/url]
#!/usr/bin/env python
import os, sys, struct, time, binascii, hashlib
 
RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'
 
def rc4(Key, inData):
    Buf = ""
    S = range(256)
    K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
    j = 0
    for i in range(256):
        j = (S[i] + K[i] + j) % 256
        S[i], S[j] = S[j], S[i]
    i, j = 0, 0
    for x in range(len(inData)):
        i = (i + 1) % 256
        j = (j + S[i]) % 256
        S[i], S[j] = S[j], S[i]
        Buf += chr(S[(S[j] + S[i]) % 256] ^ ord(inData[x]))
    return Buf
 
def Long2Int(longdata):
    lo = longdata & 0xFFFFFFFF
    hi = (longdata >> 32) & 0x7FFFFFFF
    return hi, lo
 
def KeygenSN(LicenseSerial, MachineID):
    mhi, mlo = Long2Int(MachineID)
    lhi, llo = Long2Int(LicenseSerial)
    hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
    lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
    Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
    Z1 = int(time.time()) ^ 0x56739ACD
    s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
    return "%dZ%d%d" % (Z0, Z1, s)
 
def ParsePost(buf):
    Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
    flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
          Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
          TimeOffset, Kclass, Random2 = Info
    SysInfoData = buf[0x40:]
    assert CRC == binascii.crc32(buf[8:]) & 0xFFFFFFFF
    return Info, SysInfoData
 
def DecodeRc4Str(buf):
    buf = buf.decode('hex')
    i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf[8:]))
    return i, s
 
def GetJebLicenseKey():
    licdata = ""
    if licdata:
        i, MachineID = DecodeRc4Str(licdata)
        SN = KeygenSN(i[3], i[4])
        print "JEB License Key:", SN
        return SN
 
GetJebLicenseKey()
raw_input("Enter to Exit...")
  • 然后复制Python代码到python编译器里,推荐到https://tool.lu/coderunner/ 这个在线代码网站上运行,代码格式选择Python即可,然后运行后即可得到KEY值。输入到上图的许可证密匙后即可激活JEB
  • 怎么使用可参考文章里面的教程或者百度谷歌即可
上一篇下一篇

猜你喜欢

热点阅读