My new bookIntroduction and Practice of Android App DevelopmentIt was published by Posts and Telecommunications Press in August 2020. You are welcome to purchase it.Click for details

GitHub: Recommend one GitHub quality open source project per day

A bosom friend in life is enough, si world should be with bosom.

Hello everyone, I am Yan Xuan brother.

Today’s project is: dumpDex-Android Peeling

Where there is encryption, there is decryption, and the same is true for Android apps. There are many shell tools on the market, such as Bang Bang, Ai Encryption, Legu, etc., some are paid for, some are free, and some are developed by the company itself for the use of internal company apps encryption tools.

Today we are going to show you how to unshell an App with a shell, using the tool dumpDex.

The plug-in needs to be used in the Xposed environment, support most of the encryption shell on the market, the software is only for learning, do not use for other purposes, the project is not finished, may cause the software crash.

Build the environment Android Studio 3.0

Java file, add the application package name to the Packages field, compile and install. Please submit Pull Requests for more comprehensive software.

Support devices most xposed environment mobile phone, temporarily do not support the simulator

Apk download github.com/WrBug/dumpD… Github.com/WrBug/Devel… Recommended download

E-developer has integrated dumpdex

Branch develop Branch

Master stable branch

Download the source code to compile or download apK package and install, the application of the Xposed module after restart, run hardened application, plug-in will automatically dump dex file to /data/data/ package name /dump directory

Apk files are not updated in real time. Please compile the source code to obtain the latest APK

Download or clone the source code to a local location, open it with Android Studio, and install APK after the compilation is successful. The lib/armeabi v7a/libnativeDump. So is copied to the/data/local/TMP/libnativeDump. So, permissions set to 777, Arm64 models need to lib/arm64 – v8a/libnativeDump. So is copied to the/data/local/TMP/libnativeDump64. So can be operated through the file manager, also can use the following adb shell commands

Applies only to the 32-bit phone adb shell su cp/data/data/com wrbug. Dumpdex/lib/libnativeDump so/data/local/TMP chmod 777 / data/local/TMP/libnativeDump. So activate xposed to restart after configuration is complete

Project address: github.com/WrBug/dumpD…

Welcome to pay attention to my technical public number: national programmer, our goal: output dry goods

  1. Share original technical articles every day
  2. Massive free technical information and video learning resources
  3. Share ways to make money and lead programmers to financial freedom