diff --git a/Android/trace/assets/240967_2DBZES523VSGETE-20250107235736339.png b/Android/trace/assets/240967_2DBZES523VSGETE-20250107235736339.png new file mode 100644 index 00000000..ee17b69a Binary files /dev/null and b/Android/trace/assets/240967_2DBZES523VSGETE-20250107235736339.png differ diff --git a/Android/trace/assets/240967_3VWQC2DJR5A48QZ-20250107235737320.png b/Android/trace/assets/240967_3VWQC2DJR5A48QZ-20250107235737320.png new file mode 100644 index 00000000..7b30e6c1 Binary files /dev/null and b/Android/trace/assets/240967_3VWQC2DJR5A48QZ-20250107235737320.png differ diff --git a/Android/trace/assets/240967_4XJQD7YH8AKAVYX-20250107235736582.png b/Android/trace/assets/240967_4XJQD7YH8AKAVYX-20250107235736582.png new file mode 100644 index 00000000..acbbe3aa Binary files /dev/null and b/Android/trace/assets/240967_4XJQD7YH8AKAVYX-20250107235736582.png differ diff --git a/Android/trace/assets/240967_4YQ4H8MV5ZUQ2Q5-20250107235739233.png b/Android/trace/assets/240967_4YQ4H8MV5ZUQ2Q5-20250107235739233.png new file mode 100644 index 00000000..dd11913d Binary files /dev/null and b/Android/trace/assets/240967_4YQ4H8MV5ZUQ2Q5-20250107235739233.png differ diff --git a/Android/trace/assets/240967_53JKPXQYU745UMQ-20250107235736713.png b/Android/trace/assets/240967_53JKPXQYU745UMQ-20250107235736713.png new file mode 100644 index 00000000..5983b115 Binary files /dev/null and b/Android/trace/assets/240967_53JKPXQYU745UMQ-20250107235736713.png differ diff --git a/Android/trace/assets/240967_5JYYJH6TWY6KKEC-20250107235737588.png b/Android/trace/assets/240967_5JYYJH6TWY6KKEC-20250107235737588.png new file mode 100644 index 00000000..4b1fd0b7 Binary files /dev/null and b/Android/trace/assets/240967_5JYYJH6TWY6KKEC-20250107235737588.png differ diff --git a/Android/trace/assets/240967_77ZVYN3WJJV7MSN-20250107235736487.png b/Android/trace/assets/240967_77ZVYN3WJJV7MSN-20250107235736487.png new file mode 100644 index 00000000..298d95c1 Binary files /dev/null and b/Android/trace/assets/240967_77ZVYN3WJJV7MSN-20250107235736487.png differ diff --git a/Android/trace/assets/240967_B8YU89JW7XTDKP5-20250107235736691.png b/Android/trace/assets/240967_B8YU89JW7XTDKP5-20250107235736691.png new file mode 100644 index 00000000..eef2f22e Binary files /dev/null and b/Android/trace/assets/240967_B8YU89JW7XTDKP5-20250107235736691.png differ diff --git a/Android/trace/assets/240967_BTHEZ74V2QJSAJ9-20250107235736493.png b/Android/trace/assets/240967_BTHEZ74V2QJSAJ9-20250107235736493.png new file mode 100644 index 00000000..139b8181 Binary files /dev/null and b/Android/trace/assets/240967_BTHEZ74V2QJSAJ9-20250107235736493.png differ diff --git a/Android/trace/assets/240967_CEMV3C7ZRPERQ8W-20250107235736693.png b/Android/trace/assets/240967_CEMV3C7ZRPERQ8W-20250107235736693.png new file mode 100644 index 00000000..999cdade Binary files /dev/null and b/Android/trace/assets/240967_CEMV3C7ZRPERQ8W-20250107235736693.png differ diff --git a/Android/trace/assets/240967_D7TETRN7KM8HX3B-20250107235736529.png b/Android/trace/assets/240967_D7TETRN7KM8HX3B-20250107235736529.png new file mode 100644 index 00000000..ef41b66f Binary files /dev/null and b/Android/trace/assets/240967_D7TETRN7KM8HX3B-20250107235736529.png differ diff --git a/Android/trace/assets/240967_EC6V8UJ9TEZ64F9-20250107235736482.png b/Android/trace/assets/240967_EC6V8UJ9TEZ64F9-20250107235736482.png new file mode 100644 index 00000000..29cbc1ec Binary files /dev/null and b/Android/trace/assets/240967_EC6V8UJ9TEZ64F9-20250107235736482.png differ diff --git a/Android/trace/assets/240967_EF3YVSA8U5PPKGY-20250107235736556.png b/Android/trace/assets/240967_EF3YVSA8U5PPKGY-20250107235736556.png new file mode 100644 index 00000000..d694de8c Binary files /dev/null and b/Android/trace/assets/240967_EF3YVSA8U5PPKGY-20250107235736556.png differ diff --git a/Android/trace/assets/240967_FZWG92YGA4Y2XYY-20250107235737254.gif b/Android/trace/assets/240967_FZWG92YGA4Y2XYY-20250107235737254.gif new file mode 100644 index 00000000..d7bb848b Binary files /dev/null and b/Android/trace/assets/240967_FZWG92YGA4Y2XYY-20250107235737254.gif differ diff --git a/Android/trace/assets/240967_HFJCW4VXXQ8NTTP-20250107235737275.png b/Android/trace/assets/240967_HFJCW4VXXQ8NTTP-20250107235737275.png new file mode 100644 index 00000000..9663e7db Binary files /dev/null and b/Android/trace/assets/240967_HFJCW4VXXQ8NTTP-20250107235737275.png differ diff --git a/Android/trace/assets/240967_JWSAXQ6PTDAWEUR-20250107235736870.png b/Android/trace/assets/240967_JWSAXQ6PTDAWEUR-20250107235736870.png new file mode 100644 index 00000000..8357e98b Binary files /dev/null and b/Android/trace/assets/240967_JWSAXQ6PTDAWEUR-20250107235736870.png differ diff --git a/Android/trace/assets/240967_KWMFAPW3H8BJY73-20250107235736902.png b/Android/trace/assets/240967_KWMFAPW3H8BJY73-20250107235736902.png new file mode 100644 index 00000000..10086872 Binary files /dev/null and b/Android/trace/assets/240967_KWMFAPW3H8BJY73-20250107235736902.png differ diff --git a/Android/trace/assets/240967_N9DDGCJ6SBC5764-20250107235737083.png b/Android/trace/assets/240967_N9DDGCJ6SBC5764-20250107235737083.png new file mode 100644 index 00000000..c75937d2 Binary files /dev/null and b/Android/trace/assets/240967_N9DDGCJ6SBC5764-20250107235737083.png differ diff --git a/Android/trace/assets/240967_QTKY29VPEEV7YNT-20250107235736492.png b/Android/trace/assets/240967_QTKY29VPEEV7YNT-20250107235736492.png new file mode 100644 index 00000000..e27c5185 Binary files /dev/null and b/Android/trace/assets/240967_QTKY29VPEEV7YNT-20250107235736492.png differ diff --git a/Android/trace/assets/240967_R9PB6T6AVYXU3EB-20250107235736507.png b/Android/trace/assets/240967_R9PB6T6AVYXU3EB-20250107235736507.png new file mode 100644 index 00000000..f2955c3b Binary files /dev/null and b/Android/trace/assets/240967_R9PB6T6AVYXU3EB-20250107235736507.png differ diff --git a/Android/trace/assets/240967_T4UQ42K9EPK4HZY-20250107235736362.png b/Android/trace/assets/240967_T4UQ42K9EPK4HZY-20250107235736362.png new file mode 100644 index 00000000..915efbb0 Binary files /dev/null and b/Android/trace/assets/240967_T4UQ42K9EPK4HZY-20250107235736362.png differ diff --git a/Android/trace/assets/240967_TG78FW4XCVRG5A3-20250107235736916.png b/Android/trace/assets/240967_TG78FW4XCVRG5A3-20250107235736916.png new file mode 100644 index 00000000..5802df01 Binary files /dev/null and b/Android/trace/assets/240967_TG78FW4XCVRG5A3-20250107235736916.png differ diff --git a/Android/trace/assets/240967_WRHA9H4NQBRUN6A-20250107235737082.png b/Android/trace/assets/240967_WRHA9H4NQBRUN6A-20250107235737082.png new file mode 100644 index 00000000..a547a5d5 Binary files /dev/null and b/Android/trace/assets/240967_WRHA9H4NQBRUN6A-20250107235737082.png differ diff --git a/Android/trace/assets/240967_XUFNT5CVBVZ3GNK-20250107235737278.png b/Android/trace/assets/240967_XUFNT5CVBVZ3GNK-20250107235737278.png new file mode 100644 index 00000000..8b23817a Binary files /dev/null and b/Android/trace/assets/240967_XUFNT5CVBVZ3GNK-20250107235737278.png differ diff --git a/Android/trace/assets/240967_XYH7D5AKMGJUEJU-20250107235736702.png b/Android/trace/assets/240967_XYH7D5AKMGJUEJU-20250107235736702.png new file mode 100644 index 00000000..25d9eea0 Binary files /dev/null and b/Android/trace/assets/240967_XYH7D5AKMGJUEJU-20250107235736702.png differ diff --git a/Android/trace/assets/240967_XZY5A8WXMK8TGFM-20250107235736900.png b/Android/trace/assets/240967_XZY5A8WXMK8TGFM-20250107235736900.png new file mode 100644 index 00000000..053b0406 Binary files /dev/null and b/Android/trace/assets/240967_XZY5A8WXMK8TGFM-20250107235736900.png differ diff --git a/Android/trace/assets/240967_YNSBSVDRNQRKW4K-20250107235737087.png b/Android/trace/assets/240967_YNSBSVDRNQRKW4K-20250107235737087.png new file mode 100644 index 00000000..385d677f Binary files /dev/null and b/Android/trace/assets/240967_YNSBSVDRNQRKW4K-20250107235737087.png differ diff --git a/Android/trace/assets/240967_ZPJHZBX5MJKDF27-20250107235736699.png b/Android/trace/assets/240967_ZPJHZBX5MJKDF27-20250107235736699.png new file mode 100644 index 00000000..3cf95747 Binary files /dev/null and b/Android/trace/assets/240967_ZPJHZBX5MJKDF27-20250107235736699.png differ diff --git a/Android/trace/assets/ollvm11.apk b/Android/trace/assets/ollvm11.apk new file mode 100644 index 00000000..526f2017 Binary files /dev/null and b/Android/trace/assets/ollvm11.apk differ diff --git a/Android/trace/assets/ollvm11.py b/Android/trace/assets/ollvm11.py new file mode 100644 index 00000000..80bd9a98 --- /dev/null +++ b/Android/trace/assets/ollvm11.py @@ -0,0 +1,128 @@ +import hashlib +import base64 + +dword_5C008 = [ + 0x16A, 0x151, 0xD7, 0x134, 0x196, 0x229, 0x67, 0xFA, + 0x269, 0x272, 0x226, 0x122, 0xEC, 0x2B5, 0x216, 0x214, + 0x179, 0x9F, 0x277, 0x194, 0xF4, 0x2AD, 0xA0, 0x210, + 0x26D, 0x1B9, 0x257, 0x2C9, 0xE9, 0xA1, 0x16C, 0x15F, + 0x99, 0x2E1, 0xBF, 0x1C6, 0xB4, 0x21D, 0xDE, 0x16D, + 0xC4, 0x8B, 0x25D, 0x108, 0x11B, 0x12C, 0x14A, 0xC3, + 0x195, 0x2C7, 0xCA, 0x207, 0x206, 0x1B8, 0x1A0, 0x12D, + 0xCE, 0x93, 0x2DF, 0x205, 0xAA, 0x28B, 0x9B, 0x1DF, + 0x288, 0x200, 0x86, 0x169, 0x211, 0x297, 0x2D6, 0x135, + 0x223, 0xA9, 0x208, 0x1A2, 0x23A, 0x294, 0x1AD, 0x1CA, + 0x1E2, 0x102, 0xA7, 0x19C, 0x2B1, 0x1D1, 0x249, 0x72, + 0xD4, 0x1DD, 0x173, 0xB5, 0x17A, 0xE1, 0xA5, 0x10B, + 0x2D9, 0x281, 0x12B, 0xBD, 0x111, 0xBE, 0x1A9, 0x105, + 0x147, 0x82, 0x1E0, 0x1A3, 0x156, 0x23E, 0x22A, 0x190, + 0x71, 0x9E, 0x16B, 0x1C1, 0x11C, 0x204, 0x2E2, 0x2A2, + 0xA8, 0x14B, 0x2B6, 0xC9, 0x239, 0x116, 0x2A7, 0xD1, + 0x273, 0x6C, 0x21C, 0xE2, 0xEB, 0x2D0, 0x1DB, 0x6B, + 0x232, 0xEF, 0x85, 0x13F, 0xF5, 0x9D, 0xF8, 0x267, + 0x1F2, 0x75, 0x246, 0x1D8, 0x13B, 0x2D7, 0x2AC, 0xD5, + 0x187, 0x29C, 0x176, 0x131, 0x28D, 0x91, 0xB6, 0x114, + 0x2D8, 0x275, 0x11A, 0x26C, 0x110, 0x2AA, 0x1C3, 0x19F, + 0x1A8, 0x279, 0x2DE, 0x15D, 0x2DB, 0x6A, 0x230, 0x68, + 0x178, 0x2BD, 0x217, 0x146, 0x186, 0x1E6, 0x1B1, 0x143, + 0x2E3, 0x2AF, 0x8E, 0x1D0, 0xAC, 0x1DE, 0x260, 0x81, + 0x193, 0x266, 0x231, 0x1D2, 0xBA, 0x240, 0x18E, 0x7E, + 0xC1, 0x1F1, 0x1FE, 0x2A3, 0x250, 0x13A, 0x24A, 0x64, + 0x29A, 0x24B, 0x2CA, 0x188, 0xFD, 0x103, 0x100, 0x1D9, + 0x9A, 0x1F3, 0x182, 0x7D, 0xDA, 0xDF, 0x11F, 0x27E, + 0x1B4, 0x215, 0x8F, 0x263, 0x192, 0x150, 0x17D, 0x2A4, + 0x154, 0x23B, 0x14F, 0x12F, 0x29F, 0x2BA, 0x237, 0x2BC, + 0x126, 0x1FD, 0x168, 0x2C5, 0x254, 0x2E0, 0x1C9, 0x201, + 0x172, 0x140, 0x138, 0xE0, 0xB1, 0xBB, 0x2DD, 0x19E, + 0x1E7, 0x160, 0x13E, 0x7A, 0x1CB, 0x28C, 0x7F, 0xF9, + 0x14E, 0x2B8, 0x101, 0x1EA, 0x1D7, 0x1F7, 0x276, 0x1C2, + 0x8A, 0x2CF, 0x238, 0xDC, 0x2AE, 0x94, 0x157, 0x175, + 0x21F, 0x2C2, 0xAB, 0x130, 0x104, 0xFB, 0x24D, 0x222, + 0x221, 0x18C, 0x1FA, 0x1FC, 0x1B5, 0x87, 0x2BE, 0x1AF, + 0x1B7, 0xC2, 0x22B, 0x10A, 0x19B, 0x121, 0x198, 0x148, + 0x1F6, 0x280, 0x132, 0x17B, 0x1BB, 0xCD, 0x20E, 0x2BB, + 0xB7, 0x1CC, 0x244, 0x2A6, 0x264, 0x1EF, 0x251, 0x76, + 0x171, 0x2DC, 0x236, 0x25F, 0x159, 0x1A4, 0x1F4, 0x118, + 0x17E, 0x106, 0x115, 0x262, 0x1A6, 0x185, 0x1F5, 0x29B, + 0x29E, 0x13D, 0x9C, 0x224, 0xC5, 0x219, 0x25C, 0x149, + 0x88, 0x137, 0x2A9, 0xB2, 0x139, 0x24E, 0x183, 0x235, + 0x1FB, 0x15B, 0xC7, 0x1C5, 0xD9, 0x26B, 0x7B, 0x1E4, + 0xF7, 0x2C6, 0x22F, 0x16F, 0x2D2, 0xFC, 0x177, 0x1CD, + 0x241, 0x2CE, 0x1BE, 0x1BC, 0x7C, 0x1E3, 0x258, 0x2B0, + 0xAE, 0x125, 0xA6, 0x2D1, 0x1B6, 0xCF, 0x278, 0x18D, + 0x155, 0x1AB, 0x1F8, 0x270, 0x1D5, 0x2C1, 0x1B0, 0x27F, + 0x74, 0x1AE, 0xE7, 0x2A5, 0xD0, 0x98, 0x141, 0x289, + 0x1F0, 0x1AA, 0x1BF, 0x2CD, 0x1C8, 0x2B7, 0x296, 0x299, + 0x6F, 0x17C, 0xD8, 0x77, 0x124, 0xE8, 0x18F, 0x26E, + 0x2BF, 0x1DC, 0x21A, 0x209, 0x20A, 0x18A, 0x274, 0x1AC, + 0x28A, 0x109, 0x1EE, 0x73, 0x2B3, 0x136, 0x234, 0x1DA, + 0x10D, 0x27A, 0x2D4, 0x22E, 0x2C4, 0x83, 0x261, 0x18B, + 0x20F, 0x167, 0x1E5, 0x1F9, 0x252, 0x1E8, 0x89, 0x25E, + 0x23C, 0x129, 0xB3, 0xBC, 0x284, 0x112, 0x11D, 0x22D, + 0x2D3, 0x15C, 0x10F, 0xD2, 0xF2, 0x15E, 0x298, 0x28E, + 0x2CC, 0xEA, 0x120, 0x145, 0xF3, 0x202, 0x197, 0x181, + 0x2C3, 0x170, 0x1A7, 0x78, 0xE6, 0xC0, 0xF1, 0x1FF, + 0x295, 0x213, 0xC8, 0x164, 0x22C, 0x10C, 0x1D4, 0xCB, + 0x165, 0x1EC, 0xCC, 0x282, 0x1BD, 0xB0, 0x24F, 0x80, + 0xA2, 0x29D, 0x2D5, 0x14D, 0xE4, 0x16E, 0x158, 0x152, + 0xC6, 0x6D, 0xD3, 0x212, 0x184, 0x153, 0x180, 0x66, + 0x228, 0x220, 0x259, 0x2AB, 0x70, 0x27D, 0x2B9, 0x291, + 0xED, 0xAF, 0x127, 0x255, 0x123, 0x90, 0x293, 0xF0, + 0x271, 0x247, 0x162, 0x27C, 0x203, 0x119, 0x218, 0xFE, + 0x1C0, 0x1C4, 0x163, 0x243, 0x14C, 0x1D6, 0x1E1, 0x65, + 0x12A, 0x2DA, 0x292, 0xF6, 0x11E, 0x20D, 0x25B, 0x144, + 0xE5, 0xA3, 0x8C, 0x283, 0x1CF, 0x96, 0x191, 0x2A0, + 0x225, 0x199, 0x242, 0x92, 0x107, 0x21E, 0x166, 0x8D, + 0x290, 0x24C, 0x285, 0x287, 0x113, 0x133, 0x13C, 0x10E, + 0x17F, 0x1EB, 0xE3, 0x233, 0x26F, 0x265, 0x26A, 0xD6, + 0x19D, 0x15A, 0xAD, 0x256, 0x1A1, 0x23F, 0x6E, 0x1A5, + 0x245, 0x2C8, 0x1ED, 0x20C, 0xDD, 0x2B4, 0x21B, 0x1C7, + 0xA4, 0x97, 0x1B3, 0x2CB, 0x174, 0x1B2, 0x27B, 0x189, + 0x20B, 0x23D, 0x142, 0x28F, 0xDB, 0x69, 0x79, 0x2B2, + 0x1CE, 0x12E, 0x2A8, 0x268, 0x95, 0x25A, 0x227, 0xB8, + 0x253, 0xEE, 0xB9, 0x19A, 0x1BA, 0x161, 0x1D3, 0x2C0, + 0x128, 0x2A1, 0xFF, 0x117, 0x1E9, 0x84, 0x286, 0x248, + 0, 0 +] + + +def KuanxueSign(start_time: int, first_install_time: int, random_long: int, package_code_path: str): + # part 1 + s0 = "{:08x}{:08x}".format(start_time, first_install_time) + s0 = (s0 + (64 - len(s0)) * chr(0)).encode() + + sha_a = hashlib.sha256() + s1 = bytes([c ^ 0x5c for c in s0]) + sha_a.update(s1) + + sha_b = hashlib.sha256() + s2 = bytes([c ^ 0x6a for c in s1]) + sha_b.update(s2) + sha_b.update(package_code_path.encode()) + + sha_a.update(sha_b.digest()) + part1 = sha_a.hexdigest() + + # part 2 + part2 = '' + for c in package_code_path: + part2 += '{:04x}'.format(dword_5C008[random_long % 5 + ord(c)]) + + # part 3 + s0 = "{:08x}{:08x}".format(start_time, first_install_time) + part3 = base64.b64encode(s0.encode()) + std_base64_chars = b'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/' + ollvm11_base64_chars = b'0123456789_-abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' + part3 = part3.translate(bytes.maketrans(std_base64_chars, ollvm11_base64_chars)) + part3 = part3.decode() + return part1 + part2 + part3 + + +start_time = 0x000001810ab738de +first_install_time = 0x000001810a9cf720 +random_long = 0x323dc9aaad544800 +package_code_path = "/data/app/com.kanxue.ollvm_ndk_11-dCqD-Kzs9cAqsSQx_9WYTg==/base.apk" + +result = KuanxueSign(start_time, first_install_time, random_long, package_code_path) + +print(result) diff --git "a/Android/trace/\344\275\277\347\224\250\346\227\266\351\227\264\346\227\240\345\205\263\350\260\203\350\257\225\346\212\200\346\234\257(Timeless Debugging)\351\253\230\346\225\210\345\210\206\346\236\220\346\267\267\346\267\206\344\273\243\347\240\201.md" "b/Android/trace/\344\275\277\347\224\250\346\227\266\351\227\264\346\227\240\345\205\263\350\260\203\350\257\225\346\212\200\346\234\257(Timeless Debugging)\351\253\230\346\225\210\345\210\206\346\236\220\346\267\267\346\267\206\344\273\243\347\240\201.md" new file mode 100644 index 00000000..29c08829 --- /dev/null +++ "b/Android/trace/\344\275\277\347\224\250\346\227\266\351\227\264\346\227\240\345\205\263\350\260\203\350\257\225\346\212\200\346\234\257(Timeless Debugging)\351\253\230\346\225\210\345\210\206\346\236\220\346\267\267\346\267\206\344\273\243\347\240\201.md" @@ -0,0 +1,518 @@ +# 使用时间无关调试技术(Timeless Debugging)高效分析混淆代码 + +> 转:https://bbs.kanxue.com/thread-273055.htm + +同志们,我又来搞阿里的混淆了。开个小玩笑,不能老搞阿里。以前选择阿里作为自己的研究对象,一是他们的混淆因为有足够的强度和代表性;二是阿里较其他厂要开放些,只进行技术交流分享,不恶意分析应用业务逻辑的文章一般都能正常发出。不过它作为我常驻的测试用例,后面还是有点戏份。 + + + +代码混淆是个令很多人头疼不已的问题,一个简单的流程平坦混淆就能急剧降低我们逆向分析效率,一个间断跳转混淆,就能废掉IDA等静态分析工具的武功,VM防护更是另大多数选手束手无策。各个大厂,安全厂商都有自己的混淆器,阿里甚至有几套VM防护。各种混淆方案,加上编译器优化使得我们很难写出通用的反混淆算法。 + + + +能否有一个通用的,不需进行反混淆就能直接分析我们关注的应用逻辑的方法呢?我将会在本文分享我的尝试。 + + + +我这里使用的技术称为时间无关调试。我理解的时间无关调试就是记录程序执行过程中的寄存器,和内存变化,使用记录的trace离线调试分析的过程,简而言之记录trace,分析trace。最初的qira(https://github.com/geohot/qira),微软的TTD(Time Travel Debugging),mozilla的record-replay debugging(https://github.com/rr-debugger/rr) 他们本质都是一样的,感兴趣的朋友可以自行搜索相关资料。 + + + +我的时间无关调试器分为两部分,trace记录器和trace分析器。记录器的相关信息可以在我上个帖子找到,分析器也就是我们的调试界面。trace分析功能和调试界面最近刚完工,经过简单的测试后就有点儿想迫不及待的想试试它的威力了。这次选用的样本是看雪论坛2021年11月份3w班的一道题目,题目具体信息见(https://bbs.pediy.com/thread-270220.htm)。 + + + +先秀工具。 + +# 工具展示 + +## 指令流视图 + +![img](./assets/240967_ZPJHZBX5MJKDF27-20250107235736699.png) + +## 寄存器视图 + +![img](./assets/240967_2DBZES523VSGETE-20250107235736339.png) + + + +与实时调试器类似的寄存器试图。 + +## 内存视图 + +![img](./assets/240967_BTHEZ74V2QJSAJ9-20250107235736493.png) + + + +没错,我们可以像实时调试器一样浏览任意程序点,任意地址的内存内容。有朋友可能会注意到,为什么内存会有"??"显示?这是因为这块内存在trace的过程中未被访问,我只在内存被使用(读写)的时候才会记录其内容。在其中双击任意已知内容,可以在指令流视图中跳转到他的定义,一般为写入它的指令。 + +## 交叉引用视图 + +![img](./assets/240967_T4UQ42K9EPK4HZY-20250107235736362.png) + + + +交叉引用视图显示当前指令的寄存器,内存交叉引用。"<-"是使用定义链,表示某条指令定义的值会被当前指令使用。"->"是定义使用链,表示当前指令定义的值的使用者。内存交叉引用显示当前指令读写的内存地址, +对于读内存会在其子树显示写入指令的编号,相反的,写内存地址则会显示它的使用者。在这例子中,"r 4 0000007ff3e99d98"表示当前指令会读取"0000007ff3e99d98"处四字节内容,"00010679 w 4 0000007ff3e99d98" 表示它是由编号为"00010679"的指令写入。 + + + +以上四个基本功能是不是已经可以极大提升逆向效率了?我们还有可以让生活更美好的功能。 + +## 字符串参考 + +![img](./assets/240967_EC6V8UJ9TEZ64F9-20250107235736482.png) + + + +杀手级功能!字符串引用作用无需多言。我会分析trace时内存出现过的所有字符串,直接秒杀所有字符串加密防护。 + +## 污点追踪 + +另外一个杀手锏!正向污点追踪(Forward Taint Analysis)能标记出受输入影响的相关指令,而逆向(Backward Taint Analysis)污点追踪可帮我们自动回溯变量来源和相关的计算过程。在逆向分析过程中,在对感觉兴趣的寄存器或者内存进行标记之后,使用正向污点追踪可以自动的帮我们找到他们的处理过程。 + + + +假设在调试中,发现了某条感兴趣的指令,比如说下图的,"03186869 str,x1, [x24, x0, LSL #0x3]"时,现在想知道"x1"后续如何被处理的,该如何入手?可以使用上面介绍的内存引用,找到他的使用者,然后继续分析它的使用。也可以对x1进行一次正向的污点追踪分析,污点引擎能自动筛选出受x1影响的指令。 + + + +![img](./assets/240967_77ZVYN3WJJV7MSN-20250107235736487.png) + + + +可以看到,在污点分析结果中,x1会先在内存中来回倒了几次,最后会在free中使用,应该是释放malloc返回的一个指针。 + + + +如果想知道另外一个寄存器x0的来源呢?同样可以使用交叉引用和逆向污点追踪。逆向污点追踪分析结果如下: + + + +![img](./assets/240967_R9PB6T6AVYXU3EB-20250107235736507.png) + + + +很显然,x0依赖memcpy复制的一块内存,是02262601处ubfx执行结果。 + + + +有朋友能看出这是个VM吗?这个例子是我在阿里10101命令trace中随手取的。在分析x1的后续使用过程中,污点追踪引擎自动屏蔽了VM解释器取指,解码,执行等各种细节,直接分析出会处理x1相关指令。而x0(=8)则是VM解释器的寄存器参数,对VM实现感兴趣可以研究它的来源,解码等过程。 + + + +以为就是我的时间无关调试器的核心功能。仅依赖于trace指令,理论上对任意代码防护均适用。接下来介绍依赖函数分析相关的功能。 + +## 调用栈 + +使用调用栈我们可以快速跳转到上层调用者,考察调用参数。 + +## 控制流图 + +这是所有功能里面实现难点最多,同时也是最有趣的一部分。为什么要自己恢复和绘制CFG呢?自己恢复CFG的首要原因就是对抗间接跳转混淆。静态分析间接跳转的跳转目标需要很高的技巧,常见的方法有 + +- unicron模拟执行 +- 动态符号执行(DSE)或者静态符号执行(SSE) +- 值集分析(VSA) + +而从trace中重建CFG则简单很多。另外一个原因是代码动态修改和映射。像代码加壳,不使用调试器,我们一般只能使用静态工具分析壳代码;一些防护会动态mmap代码,执行之后unmap,如果我们支持trace重建CFG的话就能免去调试,dump内存等步骤,支持对他们进行分析。事实上重建CFG也有些难点,有些情况甚至比静态更难处理。考虑如下两种情形: + +- inline hook之后导致原函数CFG变化。 +- 代码加壳。如果壳代码跟原始代码运行在相同的地址空间,那么也会出现同一地址不同时间点运行的指令不一样的情况。 + +在实现的时候我已经考虑这些情况,但还未找到好的处理办法。 + + + +最难的一部分来了,绘制CFG。我认为传统的层次布局(Sugiyama Layout)用于调试有以下缺陷: + +- 无法反应调试进度。很多时候我们想知道函数规模,当前已经调试了多少代码,还有多久能执行到函数返回,都需要参考伪码,而伪码经过反编译器优化之后可能又跟汇编对应不上。 +- 调试中难以得知是当前否位于循环内,跳转是否会进入或者跳出循环。 +- 调试大函数(基本块数量较多)。 + +为了更好的支持调试,我这里参考了Ghidra的实现,目标是为了实现一种“伪”源码调试效果。 + + + +Ghidra的CFG很有特色,他们称之为Decompiler Layout,即使用反编译器提供的代码块顺序和缩进信息对CFG布局,这种布局的结果自然而然的接近反编译后的源码,符合我们的需求。 +通用的反编译器结构化算法目标一般是生成更结构化的代码,更少的goto语句。Ghidra的结构化算法就会选择一些不是强连通分量的块作为循环成员,将函数提前返回等手段减少goto数量。我目的是为了对CFG布局,我觉得应该: + +- 强连通分量应该绘制在一起,这样可以很快识别图中的连通分量。 +- 函数返回块应该固定于最底层,这样就很容易识别出函数是否会返回,定位到返回块。传统层次布局算法为了布局美观而减少边的长度,这时算法会尽可能将块往上(函数入口方向)摆放,这会导致返回块位置不确定。对函数返回值进行溯源是一个非常常见的逆向需求,能快速定位到返回块有助于我们回溯函数返回值。另外一个优点就是能反映调试进度,在函数只有一个出口的情况下,这种实现函数绝不会从CFG中间返回,调试的整体过程也一定是向最底层的块行进。 +- CFG中的边也应该尽可能的向下跳转,避免和循环的回边混淆。 + +因此,CFG布局使用的是我自己的结构化算法。该算法不关心块内指令的语义,而是会直接假定两路跳转都是if-else跳转,两路以上的跳转是switch-case跳转来进行结构化分析。 + + + +下面是我跟Ghidra绘制的简单对比: + + + +ghidra布局: + + + +![img](./assets/240967_QTKY29VPEEV7YNT-20250107235736492.png) + + + +我的布局: + + + +![img](./assets/240967_D7TETRN7KM8HX3B-20250107235736529.png) + + + +阿里间接跳转混淆还原: + + + +![img](./assets/240967_EF3YVSA8U5PPKGY-20250107235736556.png) + + + +我还实现了一个与上面结构化布局配套的块导航图,应该算是一个小创新,独一无二的功能吧。它看起来是这样的: + + + +![img](./assets/240967_4XJQD7YH8AKAVYX-20250107235736582.png) + + + +它可以: + +- 可视化调试进度。 +- 方便的进行块跳转。 +- 识别图中循环头(高亮的黄色块)。 +- 评估函数规模、循环数量、复杂度等。块密度越大,表明函数规模越大;越“花”则表明函数越复杂,这是因为我使用不同颜色绘制不同循环,不同颜色不同缩进等级。 + +至此,调试器的功能已完全介绍完毕。 + + + +下面开始我们的实战。样本libnative-lib.so基址:0x750bd42000。 + +## 实战 + +首先进行第一步,也是最困难的一步,记录算法的执行过程。KanxueSign函数的trace约42w条指令,记录文件大小6.42MB,在我的pixel 3上trace耗时小于500毫秒。我的时间无关调试器是按“亿”级别的规模设计的,42w对我而言个是非常微小的trace,当前我测试过最大的trace约9000w条(1.12GB),阿里10101命令的trace有1100w条(139MB)。 + + + +点击check按钮之后,logcat中会有如下打印,我们目标就是还原计算output的算法。 + +``` +KANXUE : input: nisaiiA5fyk8Raylj8HZ7inewAY5pfXGbB6M output: 9b9da9c850fd4564563b15267f6586c71d008ca3677c19e9d0201df29abec0b4019500be012b0204012b0195012b009e009e019501110071022a00c30156012b0190014b02e201a900c30071023e023e02a2022a02d9019000be015602d900ca00ca014a00be0211016b0297014a023a00c9011c02df01110086016b011c02b100a7014b02d902df00d4017301d10147009b009b019500bd012b011c01a900c3012b009e0156ahuLa65wbNaSn6iLc34KmhzxnxqMa0== +``` + +输入输出都是字符串,在字符串视图中先搜下输入,内存中出现过两次,经过简单分析之后,貌似都没有后续使用,所以我们这里选择输出作为切入点开始进行分析。 + + + +![img](./assets/240967_53JKPXQYU745UMQ-20250107235736713.png) + + + +使用输出第一字节"9b"进行搜索,找到创建它的位置: + + + +![img](./assets/240967_B8YU89JW7XTDKP5-20250107235736691.png) + + + +在执行“00180674 75f67c41b0 strb w8, [x0, x9, LSL ]”指令后,内存0x7fec60ebd9中将会首次完整出现"9b9da9c850fd456456"。 + + + +顺藤摸瓜,在内存视图中选中第一个字节进行逆向污点追踪,找到它的计算过程。 + + + +![img](./assets/240967_5JYYJH6TWY6KKEC-20250107235737588.png) + + + +上方的“__vfprintf”函数表明输出可能是执行格式化打印后的结果。将代码执行到“00163000”,查看调用栈: + + + +![img](./assets/240967_CEMV3C7ZRPERQ8W-20250107235736693.png) + + + +可以看到程序会使用sprintf格式化字符串。 + + + +将程序执行到此处, + + + +![img](./assets/240967_XYH7D5AKMGJUEJU-20250107235736702.png) + + + +此时x2的值正是"9b"。注意此时内存"000000750bd9eb04"仍显示为未知,原因是程序运行到该处时,我们还未曾记录到对它的访问,在sprintf调用返回之后, +重新查看就可以看到它的内容是“%02x”。 + + + +![img](./assets/240967_TG78FW4XCVRG5A3-20250107235736916.png) + + + +在指令流中追踪x2定义: + + + +发现x2是“00162718”处的ldrb指令读取0000007ff3e99fe0的一个字节内容。 + + + +![img](./assets/240967_KWMFAPW3H8BJY73-20250107235736902.png) + + + +在CFG视图中使用“alt+单击”尝试选择“750bd55400”所在基本块所属循环,发现能成功,并且循环只有一个出口。 + + + +考察循环退出条件: + + + +![img](./assets/240967_4YQ4H8MV5ZUQ2Q5-20250107235739233.png) + + + +很明显x23是个计数器,循环会在执行32次后退出。 + + + +将程序执行到“00162718”: + + + +![img](./assets/240967_JWSAXQ6PTDAWEUR-20250107235736870.png) + + + +不难得出,该循环把0000007fec60ecf0处,32字节内存内容输出为16进制,正好对上output的前32字节。 + + + +接下来继续研究“0000007fec60ecf0”内存数据来源,它必然是由保存在内存某处的输入经过计算而来。 +为了找到这输入,我们只需要不断对依赖的ldr指令的目标寄存器进行逆向污点追踪即可。 + + + +发现以下路径能回溯到常量: + +``` +# 00161267 750bd5dc3c ldr w13, [x8] + # 00161018 750bd62a84 ldr w8, [x10] + # 00044254 750bd62a84 ldr w8, [x10] (loop) + # 00011917 750bd5d238 ldr d1, [x13, #0x290] +``` + +![img](./assets/240967_XZY5A8WXMK8TGFM-20250107235736900.png) + + + +经过搜索,发现这是个用于计算sha256常量。此时发现x1指向一个字符串("1810ab738de1810a9cf720"),难道是计算它的sha256?经过验证,发现并不是。 + + + +看来有必要研究下sha256的算法过程。为了找到sha256相关例程,对0000007fec60ed10中的sha256 ctx进行正向污点追踪, + + + +![img](./assets/240967_N9DDGCJ6SBC5764-20250107235737083.png) + + + +发现首次使用sha256 ctx的函数是0001d1e8,运行到此处发现x0指向sha256 ctx,此时x1是个字符串("mdml=>kod89mdml=e?:knl\\\\\\\\\\\\\\\\\\\\\"),难道最终的hash是它的? +经过验证,也不是。难道不是标准的sha256?为了研究sha256的运行细节,我在随便网上找了一份sha256代码https://github.com/System-Glitch/SHA256.git,在[Main loop](https://github.com/System-Glitch/SHA256/blob/30960208691da7a69f550e3e1f0f09f76b18cdd1/src/SHA256.cpp#L80)每轮迭代前后和transform函数返回前打印ctx。 + + + +发现使用相同参数运行标准sha256 transform之后的ctx与0001d1e8完全一致,所以0001d1e8是标准的sha256 transform。 + + + +使用指令执行历史功能,发现这个函数会执行5次。 + + + +![img](./assets/240967_FZWG92YGA4Y2XYY-20250107235737254.gif) + + + +其中第二次会使用新的ctx_b对如下数据进行转换: + + + +![img](./assets/240967_YNSBSVDRNQRKW4K-20250107235737087.png) + + + +第三次,四次使用ctx_b对apk路径进行转换 + + + +最后一次使用最初的ctx转换ctx_b hash进行转换。 + + + +最后一次执行后的ctx即是我们最终的hash,只是字节序有差异。 + + + +对第二次调用的输入首字节“07”进行逆向污点追踪: + + + +![img](./assets/240967_WRHA9H4NQBRUN6A-20250107235737082.png) + + + +分析后发现他是经过首次运行的参数("mdml=>kod89mdml=e?:knl")原地转换而来。 +计算过程如下: + +```c +*v28 = (~(_BYTE)v29 & 0xEA | v29 & 0x15) ^ 0x80; +``` + +化简后就是 + +```c +*v28 ^= 0x6a; +``` + +向上考察污点追踪结果即可得到"mdml=>kod89mdml=e?:knl"的来源,发现它依赖参数"1810ab738de1810a9cf720", + + + +![img](./assets/240967_XUFNT5CVBVZ3GNK-20250107235737278.png) + + + +逐字节通过: + +```c +v27 = (~(unsigned __int8)*v26 & 0xB5 | *v26 & 0x4A) ^ 0xE9; +``` + +也就是 + +```c +v27 ^= 0x5c; +``` + +运算得到。 + + + +最后我们只要弄清参数"1810ab738de1810a9cf720"的来源,output第一个部分的分析就大功告成了。 + + + +接下来的操作大家应该都知道,污点追踪,通过栈视图跳转到调用者: + + + +![img](./assets/240967_HFJCW4VXXQ8NTTP-20250107235737275.png) + + + +"1810ab738de1810a9cf720" = sprintf("%08lx%08lx", 0x000001810ab738de, 0x000001810a9cf720) + + + +继续分析x2来源, + + + +![img](./assets/240967_3VWQC2DJR5A48QZ-20250107235737320.png) + + + +考察调用者参数的操作可以得到: + + + +0x000001810ab738de 是使用GetStaticLongField获取的startTime + + + +0x000001810a9cf720 是使用GetStaticLongField获取的firstInstallTime + + + +综上,output第一部分的计算如下: + +```py +# part 1 +s0 = "{:08x}{:08x}".format(start_time, first_install_time) +s0 = (s0 + (64 - len(s0)) * chr(0)).encode() + +sha_a = hashlib.sha256() +s1 = bytes([c ^ 0x5c for c in s0]) +sha_a.update(s1) + +sha_b = hashlib.sha256() +s2 = bytes([c ^ 0x6a for c in s1]) +sha_b.update(s2) +sha_b.update(package_code_path.encode()) + +sha_a.update(sha_b.digest()) +part1 = sha_a.hexdigest() +``` + +同样的分析套路可以分析出第二,三部分的算法,这里略过冗长的具体分析过程,直接给出最终算法。 + + + +part 2: + + + +使用randomLong查表转换packageCodePath而来 + +```py +# part 2 +part2 = '' +for c in package_code_path: + part2 += '{:04x}'.format(dword_5C008[random_long % 5 + ord(c)]) +``` + +part 3: + +```py +s0 = "{:08x}{:08x}".format(start_time, first_install_time) +part3 = base64.b64encode(s0.encode()) +std_base64_chars = b'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/' +ollvm11_base64_chars = b'0123456789_-abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' +part3 = part3.translate(bytes.maketrans(std_base64_chars, ollvm11_base64_chars)) +``` + +## 总结 + +上文展示了使用时间无关调试技术对算法进行一次完整逆向还原的过程。此样本最大的弱点就是使用了标准的sha256,在识别出它使用的是标准算法后,节省了我们大量分析混淆代码和实现等价算法的时间,这部分计算只需要使用相同的输入调用标准算法即可。在识别算法时,使用时间无关调试器可以方便在函数级,指令级与标准算法流程之间进行比较,使用正向污点追踪甚至可以直接比较处理输入的完整过程。污点追踪,这个听起来就很高级的技术,在自动化反混淆论文中经常可以看到它的身影,但是貌似很少看到过用它,特别是反向污点追踪进行辅助逆向分析文章,它自动化追踪和溯源能力能将我们从枯燥的单步调试,人肉回溯解脱出来。有了污点引擎的加持,逆向回溯指令操作参数来源,然后正向分析其使用的逆向策略实施起来将会更加简单,直接。未来会不会出现污点追踪的对抗,大家可以拭目以待。 + +## 参考资料 + +[对ollvm的算法进行逆向分析和还原](https://bbs.pediy.com/thread-270529-1.htm) + + + +附件包含样本和完整源码。 +游客朋友也可以从我的github下载:[reverseme-ollvm11](https://github.com/amimo/pediy-reverseme-ollvm11) + +## 附件 + +[ollvm11.py](./assets/ollvm11.py) + +[ollvm11.apk](./assets/ollvm11.apk) \ No newline at end of file diff --git a/README.md b/README.md deleted file mode 100644 index 26e331f3..00000000 --- a/README.md +++ /dev/null @@ -1,374 +0,0 @@ -[![Static Badge](https://img.shields.io/badge/Github-shlu-green?style=social&logo=github) -](https://github.com/xpko) - -- ![dir](./assets/icon-directory.svg) 010editor/ - - ![dir](./assets/icon-directory.svg) Templates/ - - ![dir](./assets/icon-file.svg) [bt编写规则](./010editor/Templates/bt%E7%BC%96%E5%86%99%E8%A7%84%E5%88%99.md) -- ![dir](./assets/icon-directory.svg) [Android/](./Android/) - - ![dir](./assets/icon-directory.svg) AIDL/ - - ![dir](./assets/icon-file.svg) [AIDL调用回溯](./Android/AIDL/AIDL%E8%B0%83%E7%94%A8%E5%9B%9E%E6%BA%AF.md) - - ![dir](./assets/icon-file.svg) [Android逆向面试题](./Android/Android%E9%80%86%E5%90%91%E9%9D%A2%E8%AF%95%E9%A2%98.md) - - ![dir](./assets/icon-file.svg) [App的N种退出方式](./Android/App%E7%9A%84N%E7%A7%8D%E9%80%80%E5%87%BA%E6%96%B9%E5%BC%8F.md) - - ![dir](./assets/icon-file.svg) [Pixel 2 XL 解除激活锁](./Android/Pixel%202%20XL%20%E8%A7%A3%E9%99%A4%E6%BF%80%E6%B4%BB%E9%94%81.md) - - ![dir](./assets/icon-file.svg) [Pixel 循环重启问题](./Android/Pixel%20%E5%BE%AA%E7%8E%AF%E9%87%8D%E5%90%AF%E9%97%AE%E9%A2%98.md) - - ![dir](./assets/icon-file.svg) [Version](./Android/Version.md) - - ![dir](./assets/icon-file.svg) [[ROM定制]官改教程super.img解打包](./Android/%5BROM%E5%AE%9A%E5%88%B6%5D%E5%AE%98%E6%94%B9%E6%95%99%E7%A8%8Bsuper.img%E8%A7%A3%E6%89%93%E5%8C%85.md) - - ![dir](./assets/icon-directory.svg) adb/ - - ![dir](./assets/icon-directory.svg) [adbtool/](./Android/adb/adbtool/) - - ![dir](./assets/icon-file.svg) [adb禁用app](./Android/adb/adb%E7%A6%81%E7%94%A8app.md) - - ![dir](./assets/icon-file.svg) [pm](./Android/adb/pm.md) - - ![dir](./assets/icon-directory.svg) [android studio/](./Android/android%20studio/) - - ![dir](./assets/icon-directory.svg) [4.1/](./Android/android%20studio/4.1/) - - ![dir](./assets/icon-file.svg) [External_Tools](./Android/android%20studio/External_Tools.md) - - ![dir](./assets/icon-file.svg) [修改第三方库最优解](./Android/android%20studio/%E4%BF%AE%E6%94%B9%E7%AC%AC%E4%B8%89%E6%96%B9%E5%BA%93%E6%9C%80%E4%BC%98%E8%A7%A3.md) - - ![dir](./assets/icon-directory.svg) camera/ - - ![dir](./assets/icon-directory.svg) [virtual_camera/](./Android/camera/virtual_camera/) - - ![dir](./assets/icon-directory.svg) dex/ - - ![dir](./assets/icon-directory.svg) [v(c)dex转dex/](./Android/dex/v%28c%29dex%E8%BD%ACdex/) - - ![dir](./assets/icon-directory.svg) [gradle/](./Android/gradle/) - - ![dir](./assets/icon-directory.svg) [kernel/](./Android/kernel/) - - ![dir](./assets/icon-file.svg) [【内核定制】超详细华为Honor 9i(LLD-AL20)重新编译内核(解除ptrace禁用)以使用Frida](./Android/kernel/%E3%80%90%E5%86%85%E6%A0%B8%E5%AE%9A%E5%88%B6%E3%80%91%E8%B6%85%E8%AF%A6%E7%BB%86%E5%8D%8E%E4%B8%BAHonor%209i%28LLD-AL20%29%E9%87%8D%E6%96%B0%E7%BC%96%E8%AF%91%E5%86%85%E6%A0%B8%28%E8%A7%A3%E9%99%A4ptrace%E7%A6%81%E7%94%A8%29%E4%BB%A5%E4%BD%BF%E7%94%A8Frida.md) - - ![dir](./assets/icon-directory.svg) [ndk/](./Android/ndk/) - - ![dir](./assets/icon-directory.svg) [minimal_project/](./Android/ndk/minimal_project/) - - ![dir](./assets/icon-file.svg) [pixel手机Wifi网络受限问题解决](./Android/pixel%E6%89%8B%E6%9C%BAWifi%E7%BD%91%E7%BB%9C%E5%8F%97%E9%99%90%E9%97%AE%E9%A2%98%E8%A7%A3%E5%86%B3.md) - - ![dir](./assets/icon-directory.svg) [proguard/](./Android/proguard/) - - ![dir](./assets/icon-directory.svg) [sdk/](./Android/sdk/) - - ![dir](./assets/icon-directory.svg) [smali/](./Android/smali/) - - ![dir](./assets/icon-directory.svg) [so/](./Android/so/) - - ![dir](./assets/icon-directory.svg) task/ - - ![dir](./assets/icon-directory.svg) [快译/](./Android/task/%E5%BF%AB%E8%AF%91/) - - ![dir](./assets/icon-directory.svg) [望月/](./Android/task/%E6%9C%9B%E6%9C%88/) - - ![dir](./assets/icon-directory.svg) [usb上网/](./Android/usb%E4%B8%8A%E7%BD%91/) - - ![dir](./assets/icon-file.svg) [产品反馈工具](./Android/%E4%BA%A7%E5%93%81%E5%8F%8D%E9%A6%88%E5%B7%A5%E5%85%B7.md) - - ![dir](./assets/icon-file.svg) [安装开发常用库](./Android/%E5%AE%89%E8%A3%85%E5%BC%80%E5%8F%91%E5%B8%B8%E7%94%A8%E5%BA%93.md) - - ![dir](./assets/icon-directory.svg) [开发/](./Android/%E5%BC%80%E5%8F%91/) - - ![dir](./assets/icon-directory.svg) Code/ - - ![dir](./assets/icon-directory.svg) [ListView/](./Android/%E5%BC%80%E5%8F%91/Code/ListView/) - - ![dir](./assets/icon-directory.svg) [rxjava/](./Android/%E5%BC%80%E5%8F%91/rxjava/) - - ![dir](./assets/icon-directory.svg) [svg/](./Android/%E5%BC%80%E5%8F%91/svg/) - - ![dir](./assets/icon-directory.svg) [悬浮窗/](./Android/%E6%82%AC%E6%B5%AE%E7%AA%97/) - - ![dir](./assets/icon-file.svg) [某免费视频软件AD机制分析](./Android/%E6%9F%90%E5%85%8D%E8%B4%B9%E8%A7%86%E9%A2%91%E8%BD%AF%E4%BB%B6AD%E6%9C%BA%E5%88%B6%E5%88%86%E6%9E%90.md) - - ![dir](./assets/icon-directory.svg) 检测/ - - ![dir](./assets/icon-directory.svg) [ICBC检测方案/](./Android/%E6%A3%80%E6%B5%8B/ICBC%E6%A3%80%E6%B5%8B%E6%96%B9%E6%A1%88/) - - ![dir](./assets/icon-file.svg) [注册Google voice虚拟号码](./Android/%E6%B3%A8%E5%86%8CGoogle%20voice%E8%99%9A%E6%8B%9F%E5%8F%B7%E7%A0%81.md) - - ![dir](./assets/icon-directory.svg) 源码编译/ - - ![dir](./assets/icon-directory.svg) [android-10.0.0_r2/](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/android-10.0.0_r2/) - - ![dir](./assets/icon-file.svg) [修改system.img](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/android-10.0.0_r2/%E4%BF%AE%E6%94%B9system.img.md) - - ![dir](./assets/icon-directory.svg) [android_6.0.0_r1/](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/android_6.0.0_r1/) - - ![dir](./assets/icon-directory.svg) wsl2/ - - ![dir](./assets/icon-directory.svg) ubuntu18.04/ - - ![dir](./assets/icon-file.svg) [源码一条龙](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/wsl2/ubuntu18.04/%E6%BA%90%E7%A0%81%E4%B8%80%E6%9D%A1%E9%BE%99.md) - - ![dir](./assets/icon-file.svg) [草稿](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/wsl2/ubuntu18.04/%E8%8D%89%E7%A8%BF.md) - - ![dir](./assets/icon-directory.svg) wsl方式编译/ - - ![dir](./assets/icon-directory.svg) [Android-4.4.4_r1/](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/wsl%E6%96%B9%E5%BC%8F%E7%BC%96%E8%AF%91/Android-4.4.4_r1/) - - ![dir](./assets/icon-file.svg) [【源码定制】移植Youpk到Android 8.0 (Pixel2 XL)](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/%E3%80%90%E6%BA%90%E7%A0%81%E5%AE%9A%E5%88%B6%E3%80%91%E7%A7%BB%E6%A4%8DYoupk%E5%88%B0Android%208.0%20%28Pixel2%20XL%29.md) - - ![dir](./assets/icon-file.svg) [【源码编译】android 10.0.0_r2 for Pixel 2 XL on ubuntu20.04-server](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/%E3%80%90%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91%E3%80%91android%2010.0.0_r2%20for%20Pixel%202%20XL%20on%20ubuntu20.04-server.md) - - ![dir](./assets/icon-directory.svg) 官方编译/ - - ![dir](./assets/icon-directory.svg) [Android-4.4.4_r1/](./Android/%E6%BA%90%E7%A0%81%E7%BC%96%E8%AF%91/%E5%AE%98%E6%96%B9%E7%BC%96%E8%AF%91/Android-4.4.4_r1/) - - ![dir](./assets/icon-file.svg) [漏洞Index](./Android/%E6%BC%8F%E6%B4%9EIndex.md) - - ![dir](./assets/icon-directory.svg) 脱壳/ - - ![dir](./assets/icon-directory.svg) [几维安全/](./Android/%E8%84%B1%E5%A3%B3/%E5%87%A0%E7%BB%B4%E5%AE%89%E5%85%A8/) - - ![dir](./assets/icon-directory.svg) [2022-02-15/](./Android/%E8%84%B1%E5%A3%B3/%E5%87%A0%E7%BB%B4%E5%AE%89%E5%85%A8/2022-02-15/) - - ![dir](./assets/icon-directory.svg) 百度壳/ - - ![dir](./assets/icon-directory.svg) vmp壳/ - - ![dir](./assets/icon-directory.svg) [版本1(2020-03)/](./Android/%E8%84%B1%E5%A3%B3/%E7%99%BE%E5%BA%A6%E5%A3%B3/vmp%E5%A3%B3/%E7%89%88%E6%9C%AC1%282020-03%29/) - - ![dir](./assets/icon-directory.svg) [腾讯乐固/](./Android/%E8%84%B1%E5%A3%B3/%E8%85%BE%E8%AE%AF%E4%B9%90%E5%9B%BA/) - - ![dir](./assets/icon-directory.svg) [2020-12-15加固/](./Android/%E8%84%B1%E5%A3%B3/%E8%85%BE%E8%AE%AF%E4%B9%90%E5%9B%BA/2020-12-15%E5%8A%A0%E5%9B%BA/) - - ![dir](./assets/icon-directory.svg) [2022-02-01/](./Android/%E8%84%B1%E5%A3%B3/%E8%85%BE%E8%AE%AF%E4%B9%90%E5%9B%BA/2022-02-01/) - - ![dir](./assets/icon-directory.svg) 腾讯御安全/ - - ![dir](./assets/icon-file.svg) [2020-6-26](./Android/%E8%84%B1%E5%A3%B3/%E8%85%BE%E8%AE%AF%E5%BE%A1%E5%AE%89%E5%85%A8/2020-6-26.md) - - ![dir](./assets/icon-file.svg) [谷歌账户切换地区](./Android/%E8%B0%B7%E6%AD%8C%E8%B4%A6%E6%88%B7%E5%88%87%E6%8D%A2%E5%9C%B0%E5%8C%BA.md) - - ![dir](./assets/icon-file.svg) [跨语言调用跟踪](./Android/%E8%B7%A8%E8%AF%AD%E8%A8%80%E8%B0%83%E7%94%A8%E8%B7%9F%E8%B8%AA.md) - - ![dir](./assets/icon-file.svg) [进程间调用跟踪](./Android/%E8%BF%9B%E7%A8%8B%E9%97%B4%E8%B0%83%E7%94%A8%E8%B7%9F%E8%B8%AA.md) - - ![dir](./assets/icon-file.svg) [逆向填坑](./Android/%E9%80%86%E5%90%91%E5%A1%AB%E5%9D%91.md) -- ![dir](./assets/icon-directory.svg) [Anti-epidemic/](./Anti-epidemic/) -- ![dir](./assets/icon-file.svg) [AppCenter](./AppCenter.md) -- ![dir](./assets/icon-directory.svg) [AutoCAD/](./AutoCAD/) -- ![dir](./assets/icon-directory.svg) [CTF/](./CTF/) -- ![dir](./assets/icon-directory.svg) Common/ - - ![dir](./assets/icon-directory.svg) Serializable/ - - ![dir](./assets/icon-directory.svg) [Kryo/](./Common/Serializable/Kryo/) - - ![dir](./assets/icon-directory.svg) [protobuf/](./Common/Serializable/protobuf/) - - ![dir](./assets/icon-directory.svg) algorithms/ - - ![dir](./assets/icon-directory.svg) [Aes/](./Common/algorithms/Aes/) - - ![dir](./assets/icon-directory.svg) [Des/](./Common/algorithms/Des/) - - ![dir](./assets/icon-directory.svg) [PBKDF/](./Common/algorithms/PBKDF/) - - ![dir](./assets/icon-directory.svg) [Scrypt/](./Common/algorithms/Scrypt/) - - ![dir](./assets/icon-directory.svg) [java/](./Common/algorithms/java/) - - ![dir](./assets/icon-directory.svg) cache/ - - ![dir](./assets/icon-directory.svg) [NSURLCache/](./Common/cache/NSURLCache/) - - ![dir](./assets/icon-directory.svg) [YYCache/](./Common/cache/YYCache/) - - ![dir](./assets/icon-directory.svg) [cpu/](./Common/cpu/) - - ![dir](./assets/icon-directory.svg) [encode/](./Common/encode/) - - ![dir](./assets/icon-directory.svg) [sql/](./Common/sql/) - - ![dir](./assets/icon-directory.svg) [fmdb/](./Common/sql/fmdb/) - - ![dir](./assets/icon-directory.svg) [grdb/](./Common/sql/grdb/) - - ![dir](./assets/icon-directory.svg) [sqlcipher/](./Common/sql/sqlcipher/) - - ![dir](./assets/icon-file.svg) [SQLcipher加密机制分析](./Common/sql/sqlcipher/SQLcipher%E5%8A%A0%E5%AF%86%E6%9C%BA%E5%88%B6%E5%88%86%E6%9E%90.md) - - ![dir](./assets/icon-file.svg) [SqlCipher源码分析](./Common/sql/sqlcipher/SqlCipher%E6%BA%90%E7%A0%81%E5%88%86%E6%9E%90.md) - - ![dir](./assets/icon-directory.svg) [data/](./Common/sql/sqlcipher/data/) - - ![dir](./assets/icon-directory.svg) [sqlcipher全解析/](./Common/sql/sqlcipher/sqlcipher%E5%85%A8%E8%A7%A3%E6%9E%90/) - - ![dir](./assets/icon-file.svg) [sqlcipher编译](./Common/sql/sqlcipher/sqlcipher%E7%BC%96%E8%AF%91.md) - - ![dir](./assets/icon-directory.svg) [wcdb/](./Common/sql/wcdb/) -- ![dir](./assets/icon-directory.svg) Embedded/ - - ![dir](./assets/icon-file.svg) [ESP32(NodeMCU-32S)简单实现路由中继wifi中继](./Embedded/ESP32%28NodeMCU-32S%29%E7%AE%80%E5%8D%95%E5%AE%9E%E7%8E%B0%E8%B7%AF%E7%94%B1%E4%B8%AD%E7%BB%A7wifi%E4%B8%AD%E7%BB%A7.md) - - ![dir](./assets/icon-file.svg) [RFID-RC522STM32F103RBKEIL5 简单实现读取卡片ID](./Embedded/RFID-RC522STM32F103RBKEIL5%20%E7%AE%80%E5%8D%95%E5%AE%9E%E7%8E%B0%E8%AF%BB%E5%8F%96%E5%8D%A1%E7%89%87ID.md) - - ![dir](./assets/icon-directory.svg) [esp32/](./Embedded/esp32/) - - ![dir](./assets/icon-file.svg) [【从零开始】通过Arduino+ESP32(NodeMCU-32S)实现蓝牙设备复制模拟[20210830]](./Embedded/%E3%80%90%E4%BB%8E%E9%9B%B6%E5%BC%80%E5%A7%8B%E3%80%91%E9%80%9A%E8%BF%87Arduino%2BESP32%28NodeMCU-32S%29%E5%AE%9E%E7%8E%B0%E8%93%9D%E7%89%99%E8%AE%BE%E5%A4%87%E5%A4%8D%E5%88%B6%E6%A8%A1%E6%8B%9F%5B20210830%5D.md) - - ![dir](./assets/icon-file.svg) [单片机开发之数字温度计制作](./Embedded/%E5%8D%95%E7%89%87%E6%9C%BA%E5%BC%80%E5%8F%91%E4%B9%8B%E6%95%B0%E5%AD%97%E6%B8%A9%E5%BA%A6%E8%AE%A1%E5%88%B6%E4%BD%9C.md) -- ![dir](./assets/icon-directory.svg) [Graphviz/](./Graphviz/) -- ![dir](./assets/icon-directory.svg) [IDA/](./IDA/) - - ![dir](./assets/icon-file.svg) [IDA小知识点集合](./IDA/IDA%E5%B0%8F%E7%9F%A5%E8%AF%86%E7%82%B9%E9%9B%86%E5%90%88.md) - - ![dir](./assets/icon-file.svg) [IDA汇编指令分析](./IDA/IDA%E6%B1%87%E7%BC%96%E6%8C%87%E4%BB%A4%E5%88%86%E6%9E%90.md) - - ![dir](./assets/icon-directory.svg) [api/](./IDA/api/) - - ![dir](./assets/icon-directory.svg) ida7.5/ - - ![dir](./assets/icon-directory.svg) [keygen/](./IDA/ida7.5/keygen/) - - ![dir](./assets/icon-directory.svg) [ida9.0/](./IDA/ida9.0/) - - ![dir](./assets/icon-directory.svg) [plugins/](./IDA/plugins/) - - ![dir](./assets/icon-directory.svg) [IDAPython/](./IDA/plugins/IDAPython/) - - ![dir](./assets/icon-directory.svg) [keypatch/](./IDA/plugins/keypatch/) -- ![dir](./assets/icon-directory.svg) [IDEA/](./IDEA/) - - ![dir](./assets/icon-file.svg) [Android Studio](./IDEA/Android%20Studio.md) - - ![dir](./assets/icon-directory.svg) [Clion/](./IDEA/Clion/) - - ![dir](./assets/icon-file.svg) [Toolchains](./IDEA/Clion/Toolchains.md) - - ![dir](./assets/icon-file.svg) [WSL&Clion](./IDEA/Clion/WSL%26Clion.md) - - ![dir](./assets/icon-directory.svg) [IDEA插件编写指南/](./IDEA/IDEA%E6%8F%92%E4%BB%B6%E7%BC%96%E5%86%99%E6%8C%87%E5%8D%97/) - - ![dir](./assets/icon-file.svg) [pre_readme](./IDEA/IDEA%E6%8F%92%E4%BB%B6%E7%BC%96%E5%86%99%E6%8C%87%E5%8D%97/pre_readme.md) - - ![dir](./assets/icon-file.svg) [PyCharm](./IDEA/PyCharm.md) - - ![dir](./assets/icon-file.svg) [open source license](./IDEA/open%20source%20license.md) - - ![dir](./assets/icon-file.svg) [plugin](./IDEA/plugin.md) - - ![dir](./assets/icon-file.svg) [regex](./IDEA/regex.md) - - ![dir](./assets/icon-file.svg) [webstrom](./IDEA/webstrom.md) - - ![dir](./assets/icon-file.svg) [乱码问题](./IDEA/%E4%B9%B1%E7%A0%81%E9%97%AE%E9%A2%98.md) -- ![dir](./assets/icon-directory.svg) [NLP/](./NLP/) -- ![dir](./assets/icon-file.svg) [Navigation](./Navigation.md) -- ![dir](./assets/icon-directory.svg) [PC/](./PC/) -- ![dir](./assets/icon-directory.svg) PacketCapture/ - - ![dir](./assets/icon-file.svg) [路由器转发抓包](./PacketCapture/%E8%B7%AF%E7%94%B1%E5%99%A8%E8%BD%AC%E5%8F%91%E6%8A%93%E5%8C%85.md) -- ![dir](./assets/icon-directory.svg) Samsung/ - - ![dir](./assets/icon-directory.svg) [Samsung A51 5G(SM-A5160)/](./Samsung/Samsung%20A51%205G%28SM-A5160%29/) - - ![dir](./assets/icon-directory.svg) [Samsung S7(SM-9300)/](./Samsung/Samsung%20S7%28SM-9300%29/) -- ![dir](./assets/icon-directory.svg) Serialization/ - - ![dir](./assets/icon-file.svg) [序列化方案选型对比](./Serialization/%E5%BA%8F%E5%88%97%E5%8C%96%E6%96%B9%E6%A1%88%E9%80%89%E5%9E%8B%E5%AF%B9%E6%AF%94.md) -- ![dir](./assets/icon-directory.svg) [Swing/](./Swing/) -- ![dir](./assets/icon-directory.svg) [UI/](./UI/) -- ![dir](./assets/icon-directory.svg) [VMWare/](./VMWare/) -- ![dir](./assets/icon-directory.svg) [ads/](./ads/) - - ![dir](./assets/icon-directory.svg) [mopub/](./ads/mopub/) - - ![dir](./assets/icon-directory.svg) [unity3d/](./ads/unity3d/) -- ![dir](./assets/icon-directory.svg) [all_in_one/](./all_in_one/) -- ![dir](./assets/icon-directory.svg) [arm/](./arm/) - - ![dir](./assets/icon-directory.svg) [arm64/](./arm/arm64/) - - ![dir](./assets/icon-directory.svg) [arm2c/](./arm/arm64/arm2c/) -- ![dir](./assets/icon-directory.svg) ast/ - - ![dir](./assets/icon-directory.svg) 010editor/ - - ![dir](./assets/icon-file.svg) [pfp](./ast/010editor/pfp.md) -- ![dir](./assets/icon-directory.svg) [baidupan/](./baidupan/) - - ![dir](./assets/icon-directory.svg) [images/](./baidupan/images/) -- ![dir](./assets/icon-directory.svg) beini/ - - ![dir](./assets/icon-file.svg) [Beini奶瓶U盘PE完整教程[2018-11-28]](./beini/Beini%E5%A5%B6%E7%93%B6U%E7%9B%98PE%E5%AE%8C%E6%95%B4%E6%95%99%E7%A8%8B%5B2018-11-28%5D.md) -- ![dir](./assets/icon-directory.svg) [bnf/](./bnf/) -- ![dir](./assets/icon-directory.svg) cloud/ - - ![dir](./assets/icon-directory.svg) [gcloud/](./cloud/gcloud/) - - ![dir](./assets/icon-file.svg) [sql](./cloud/gcloud/sql.md) -- ![dir](./assets/icon-directory.svg) cloudflare/ - - ![dir](./assets/icon-file.svg) [cloudflare使用记录](./cloudflare/cloudflare%E4%BD%BF%E7%94%A8%E8%AE%B0%E5%BD%95.md) - - ![dir](./assets/icon-file.svg) [warp](./cloudflare/warp.md) - - ![dir](./assets/icon-file.svg) [开启防攻击模式](./cloudflare/%E5%BC%80%E5%90%AF%E9%98%B2%E6%94%BB%E5%87%BB%E6%A8%A1%E5%BC%8F.md) -- ![dir](./assets/icon-directory.svg) [cmake/](./cmake/) -- ![dir](./assets/icon-directory.svg) [discuz/](./discuz/) -- ![dir](./assets/icon-directory.svg) [docker/](./docker/) - - ![dir](./assets/icon-file.svg) [change-docker-root](./docker/change-docker-root.md) -- ![dir](./assets/icon-directory.svg) docs/ - - ![dir](./assets/icon-file.svg) [index](./docs/index.md) -- ![dir](./assets/icon-directory.svg) [flutter/](./flutter/) -- ![dir](./assets/icon-directory.svg) [frida/](./frida/) - - ![dir](./assets/icon-directory.svg) [android/](./frida/android/) - - ![dir](./assets/icon-directory.svg) [c++/](./frida/c%2B%2B/) - - ![dir](./assets/icon-file.svg) [compile](./frida/compile.md) - - ![dir](./assets/icon-directory.svg) [iOS/](./frida/iOS/) - - ![dir](./assets/icon-file.svg) [frida-trace](./frida/iOS/frida-trace.md) - - ![dir](./assets/icon-directory.svg) [objection/](./frida/objection/) - - ![dir](./assets/icon-file.svg) [openssl](./frida/openssl.md) - - ![dir](./assets/icon-directory.svg) [patch/](./frida/patch/) - - ![dir](./assets/icon-directory.svg) [window/](./frida/window/) -- ![dir](./assets/icon-directory.svg) [frp/](./frp/) -- ![dir](./assets/icon-directory.svg) [gcc/](./gcc/) -- ![dir](./assets/icon-directory.svg) [gdb/](./gdb/) -- ![dir](./assets/icon-directory.svg) [git/](./git/) - - ![dir](./assets/icon-file.svg) [gitignore](./git/gitignore.md) - - ![dir](./assets/icon-file.svg) [git提交规范](./git/git%E6%8F%90%E4%BA%A4%E8%A7%84%E8%8C%83.md) -- ![dir](./assets/icon-directory.svg) [github/](./github/) - - ![dir](./assets/icon-file.svg) [Google网页索引](./github/Google%E7%BD%91%E9%A1%B5%E7%B4%A2%E5%BC%95.md) - - ![dir](./assets/icon-file.svg) [jekyll Front Matter 变量有哪些?](./github/jekyll%20Front%20Matter%20%E5%8F%98%E9%87%8F%E6%9C%89%E5%93%AA%E4%BA%9B%EF%BC%9F.md) - - ![dir](./assets/icon-file.svg) [为Jekyll添加评论系统](./github/%E4%B8%BAJekyll%E6%B7%BB%E5%8A%A0%E8%AF%84%E8%AE%BA%E7%B3%BB%E7%BB%9F.md) - - ![dir](./assets/icon-file.svg) [将github仓库无侵入转换为github-pages](./github/%E5%B0%86github%E4%BB%93%E5%BA%93%E6%97%A0%E4%BE%B5%E5%85%A5%E8%BD%AC%E6%8D%A2%E4%B8%BAgithub-pages.md) -- ![dir](./assets/icon-directory.svg) [huawei/](./huawei/) - - ![dir](./assets/icon-directory.svg) [honor8x/](./huawei/honor8x/) -- ![dir](./assets/icon-directory.svg) [iOS/](./iOS/) - - ![dir](./assets/icon-directory.svg) [Cydia/](./iOS/Cydia/) - - ![dir](./assets/icon-directory.svg) [Surge/](./iOS/Surge/) - - ![dir](./assets/icon-directory.svg) [keychain/](./iOS/keychain/) - - ![dir](./assets/icon-directory.svg) [lldb/](./iOS/lldb/) - - ![dir](./assets/icon-file.svg) [old](./iOS/old.md) - - ![dir](./assets/icon-file.svg) [常用api](./iOS/%E5%B8%B8%E7%94%A8api.md) - - ![dir](./assets/icon-directory.svg) 越狱/ - - ![dir](./assets/icon-directory.svg) [WinRa1n/](./iOS/%E8%B6%8A%E7%8B%B1/WinRa1n/) - - ![dir](./assets/icon-directory.svg) [checkra1n/](./iOS/%E8%B6%8A%E7%8B%B1/checkra1n/) - - ![dir](./assets/icon-directory.svg) [palera1n/](./iOS/%E8%B6%8A%E7%8B%B1/palera1n/) -- ![dir](./assets/icon-directory.svg) [jitpack/](./jitpack/) -- ![dir](./assets/icon-directory.svg) [kali/](./kali/) -- ![dir](./assets/icon-directory.svg) [kali-linux/](./kali-linux/) - - ![dir](./assets/icon-file.svg) [android](./kali-linux/android.md) -- ![dir](./assets/icon-directory.svg) language/ - - ![dir](./assets/icon-directory.svg) [c/](./language/c/) - - ![dir](./assets/icon-file.svg) [常用函数](./language/c/%E5%B8%B8%E7%94%A8%E5%87%BD%E6%95%B0.md) - - ![dir](./assets/icon-file.svg) [常用库](./language/c/%E5%B8%B8%E7%94%A8%E5%BA%93.md) - - ![dir](./assets/icon-directory.svg) [cpp/](./language/cpp/) - - ![dir](./assets/icon-directory.svg) [golang/](./language/golang/) - - ![dir](./assets/icon-file.svg) [cgo](./language/golang/cgo.md) - - ![dir](./assets/icon-file.svg) [code](./language/golang/code.md) - - ![dir](./assets/icon-directory.svg) javascript/ - - ![dir](./assets/icon-directory.svg) nodejs/ - - ![dir](./assets/icon-directory.svg) [yarn/](./language/javascript/nodejs/yarn/) - - ![dir](./assets/icon-directory.svg) [typescript/](./language/javascript/typescript/) - - ![dir](./assets/icon-directory.svg) [js/](./language/js/) - - ![dir](./assets/icon-directory.svg) [python/](./language/python/) - - ![dir](./assets/icon-directory.svg) [ctype(python调用dll)/](./language/python/ctype%28python%E8%B0%83%E7%94%A8dll%29/) - - ![dir](./assets/icon-directory.svg) module/ - - ![dir](./assets/icon-directory.svg) [制作module/](./language/python/module/%E5%88%B6%E4%BD%9Cmodule/) - - ![dir](./assets/icon-directory.svg) ubuntu/ - - ![dir](./assets/icon-file.svg) [ubuntu16.04安装python3.6](./language/python/ubuntu/ubuntu16.04%E5%AE%89%E8%A3%85python3.6.md) - - ![dir](./assets/icon-file.svg) [常用小功能函数](./language/python/%E5%B8%B8%E7%94%A8%E5%B0%8F%E5%8A%9F%E8%83%BD%E5%87%BD%E6%95%B0.md) - - ![dir](./assets/icon-directory.svg) [rust/](./language/rust/) - - ![dir](./assets/icon-directory.svg) [shell/](./language/shell/) -- ![dir](./assets/icon-directory.svg) [linux/](./linux/) -- ![dir](./assets/icon-directory.svg) lldb/ - - ![dir](./assets/icon-directory.svg) [android/](./lldb/android/) - - ![dir](./assets/icon-directory.svg) [iOS/](./lldb/iOS/) - - ![dir](./assets/icon-file.svg) [lldb脚本参数里的result怎么用?](./lldb/lldb%E8%84%9A%E6%9C%AC%E5%8F%82%E6%95%B0%E9%87%8C%E7%9A%84result%E6%80%8E%E4%B9%88%E7%94%A8%EF%BC%9F.md) -- ![dir](./assets/icon-directory.svg) [llvm/](./llvm/) - - ![dir](./assets/icon-directory.svg) [Pass/](./llvm/Pass/) - - ![dir](./assets/icon-directory.svg) [images/](./llvm/images/) - - ![dir](./assets/icon-directory.svg) [ollvm/](./llvm/ollvm/) - - ![dir](./assets/icon-directory.svg) [anti-ollvm/](./llvm/ollvm/anti-ollvm/) - - ![dir](./assets/icon-directory.svg) [images/](./llvm/ollvm/images/) -- ![dir](./assets/icon-directory.svg) macOS/ - - ![dir](./assets/icon-file.svg) [brew](./macOS/brew.md) -- ![dir](./assets/icon-directory.svg) [magisk/](./magisk/) -- ![dir](./assets/icon-directory.svg) [mars/](./mars/) -- ![dir](./assets/icon-directory.svg) [mingw/](./mingw/) -- ![dir](./assets/icon-directory.svg) [msys/](./msys/) -- ![dir](./assets/icon-directory.svg) [msys2/](./msys2/) -- ![dir](./assets/icon-directory.svg) nodejs/ - - ![dir](./assets/icon-file.svg) [nodejs](./nodejs/nodejs.md) - - ![dir](./assets/icon-file.svg) [ts](./nodejs/ts.md) -- ![dir](./assets/icon-directory.svg) oneplus/ - - ![dir](./assets/icon-directory.svg) [oneplus6/](./oneplus/oneplus6/) - - ![dir](./assets/icon-directory.svg) [oneplus9r/](./oneplus/oneplus9r/) -- ![dir](./assets/icon-directory.svg) [openssl/](./openssl/) -- ![dir](./assets/icon-directory.svg) [perf/](./perf/) -- ![dir](./assets/icon-directory.svg) proxy/ - - ![dir](./assets/icon-file.svg) [curl](./proxy/curl.md) - - ![dir](./assets/icon-file.svg) [git](./proxy/git.md) - - ![dir](./assets/icon-file.svg) [mirror](./proxy/mirror.md) - - ![dir](./assets/icon-file.svg) [repo](./proxy/repo.md) - - ![dir](./assets/icon-file.svg) [v2](./proxy/v2.md) -- ![dir](./assets/icon-directory.svg) [retdec/](./retdec/) - - ![dir](./assets/icon-directory.svg) [images/](./retdec/images/) -- ![dir](./assets/icon-file.svg) [reverse](./reverse.md) -- ![dir](./assets/icon-directory.svg) rom/ - - ![dir](./assets/icon-file.svg) [boot](./rom/boot.md) - - ![dir](./assets/icon-directory.svg) [miui/](./rom/miui/) -- ![dir](./assets/icon-directory.svg) router/ - - ![dir](./assets/icon-directory.svg) [mi/](./router/mi/) -- ![dir](./assets/icon-directory.svg) rpc/ - - ![dir](./assets/icon-directory.svg) [golang/](./rpc/golang/) -- ![dir](./assets/icon-directory.svg) [selenium/](./selenium/) -- ![dir](./assets/icon-directory.svg) [sgmain/](./sgmain/) - - ![dir](./assets/icon-file.svg) [sgmain错误码列表](./sgmain/sgmain%E9%94%99%E8%AF%AF%E7%A0%81%E5%88%97%E8%A1%A8.md) - - ![dir](./assets/icon-file.svg) [unidbg调用sgmain的doCommandNative函数生成某酷encryptR_client参数](./sgmain/unidbg%E8%B0%83%E7%94%A8sgmain%E7%9A%84doCommandNative%E5%87%BD%E6%95%B0%E7%94%9F%E6%88%90%E6%9F%90%E9%85%B7encryptR_client%E5%8F%82%E6%95%B0.md) - - ![dir](./assets/icon-file.svg) [对一个apk的协议分析](./sgmain/%E5%AF%B9%E4%B8%80%E4%B8%AAapk%E7%9A%84%E5%8D%8F%E8%AE%AE%E5%88%86%E6%9E%90.md) -- ![dir](./assets/icon-directory.svg) software-top100/ - - ![dir](./assets/icon-file.svg) [Android](./software-top100/Android.md) - - ![dir](./assets/icon-file.svg) [Linux](./software-top100/Linux.md) - - ![dir](./assets/icon-file.svg) [web](./software-top100/web.md) - - ![dir](./assets/icon-file.svg) [window](./software-top100/window.md) -- ![dir](./assets/icon-directory.svg) [ssh/](./ssh/) -- ![dir](./assets/icon-directory.svg) [switch/](./switch/) -- ![dir](./assets/icon-directory.svg) [termux/](./termux/) -- ![dir](./assets/icon-directory.svg) [ubuntu/](./ubuntu/) - - ![dir](./assets/icon-directory.svg) [ppa/](./ubuntu/ppa/) - - ![dir](./assets/icon-file.svg) [ubuntu-server-20.04](./ubuntu/ubuntu-server-20.04.md) -- ![dir](./assets/icon-directory.svg) [unicorn/](./unicorn/) - - ![dir](./assets/icon-directory.svg) [androidnativeemu/](./unicorn/androidnativeemu/) - - ![dir](./assets/icon-directory.svg) [arm/](./unicorn/arm/) - - ![dir](./assets/icon-directory.svg) [images/](./unicorn/arm/images/) - - ![dir](./assets/icon-directory.svg) [compile/](./unicorn/compile/) - - ![dir](./assets/icon-file.svg) [syscall表](./unicorn/syscall%E8%A1%A8.md) - - ![dir](./assets/icon-directory.svg) [unidbg/](./unicorn/unidbg/) -- ![dir](./assets/icon-directory.svg) [usb/](./usb/) -- ![dir](./assets/icon-directory.svg) [virtualbox/](./virtualbox/) -- ![dir](./assets/icon-directory.svg) [vixl/](./vixl/) -- ![dir](./assets/icon-directory.svg) [vscode/](./vscode/) -- ![dir](./assets/icon-directory.svg) [wechat/](./wechat/) - - ![dir](./assets/icon-file.svg) [Should We Chat, Too Security Analysis of WeChat’s MMTLS Encryption Protocol](./wechat/Should%20We%20Chat%2C%20Too%20Security%20Analysis%20of%20WeChat%E2%80%99s%20MMTLS%20Encryption%20Protocol.md) -- ![dir](./assets/icon-directory.svg) [window/](./window/) - - ![dir](./assets/icon-file.svg) [Window下frp最稳定的开机自启方式【将程序转为服务(天生自带隐藏窗口功能)】【放弃不靠谱的定时任务和启动目录启动吧】(向日葵稳定开机自启实现原理分析)](./window/Window%E4%B8%8Bfrp%E6%9C%80%E7%A8%B3%E5%AE%9A%E7%9A%84%E5%BC%80%E6%9C%BA%E8%87%AA%E5%90%AF%E6%96%B9%E5%BC%8F%E3%80%90%E5%B0%86%E7%A8%8B%E5%BA%8F%E8%BD%AC%E4%B8%BA%E6%9C%8D%E5%8A%A1%28%E5%A4%A9%E7%94%9F%E8%87%AA%E5%B8%A6%E9%9A%90%E8%97%8F%E7%AA%97%E5%8F%A3%E5%8A%9F%E8%83%BD%29%E3%80%91%E3%80%90%E6%94%BE%E5%BC%83%E4%B8%8D%E9%9D%A0%E8%B0%B1%E7%9A%84%E5%AE%9A%E6%97%B6%E4%BB%BB%E5%8A%A1%E5%92%8C%E5%90%AF%E5%8A%A8%E7%9B%AE%E5%BD%95%E5%90%AF%E5%8A%A8%E5%90%A7%E3%80%91%EF%BC%88%E5%90%91%E6%97%A5%E8%91%B5%E7%A8%B3%E5%AE%9A%E5%BC%80%E6%9C%BA%E8%87%AA%E5%90%AF%E5%AE%9E%E7%8E%B0%E5%8E%9F%E7%90%86%E5%88%86%E6%9E%90%EF%BC%89.md) - - ![dir](./assets/icon-file.svg) [bat](./window/bat.md) - - ![dir](./assets/icon-file.svg) [cmd](./window/cmd.md) - - ![dir](./assets/icon-directory.svg) [images/](./window/images/) - - ![dir](./assets/icon-directory.svg) [od/](./window/od/) - - ![dir](./assets/icon-file.svg) [win32逆向分析](./window/od/win32%E9%80%86%E5%90%91%E5%88%86%E6%9E%90.md) - - ![dir](./assets/icon-file.svg) [pe](./window/pe.md) - - ![dir](./assets/icon-file.svg) [powershell](./window/powershell.md) - - ![dir](./assets/icon-file.svg) [startup](./window/startup.md) - - ![dir](./assets/icon-file.svg) [vbs](./window/vbs.md) - - ![dir](./assets/icon-file.svg) [wakeup](./window/wakeup.md) -- ![dir](./assets/icon-directory.svg) [wireshark/](./wireshark/) -- ![dir](./assets/icon-directory.svg) [wsl/](./wsl/) -- ![dir](./assets/icon-directory.svg) [xshell5/](./xshell5/) -- ![dir](./assets/icon-directory.svg) [程序切片/](./%E7%A8%8B%E5%BA%8F%E5%88%87%E7%89%87/) -- ![dir](./assets/icon-directory.svg) [符号执行/](./%E7%AC%A6%E5%8F%B7%E6%89%A7%E8%A1%8C/) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -[![Update README Directory Index](https://github.com/xpko/xpko.github.io/actions/workflows/update-readme-index.yml/badge.svg)](https://github.com/xpko/xpko.github.io/actions/workflows/update-readme-index.yml) [![Deploy Jekyll with GitHub Pages dependencies preinstalled](https://github.com/xpko/xpko.github.io/actions/workflows/jekyll-gh-pages.yml/badge.svg)](https://github.com/xpko/xpko.github.io/actions/workflows/jekyll-gh-pages.yml) ![GitHub Created At](https://img.shields.io/github/created-at/xpko/xpko.github.io) ![Gitea Last Commit](https://img.shields.io/github/last-commit/xpko/xpko.github.io) ![GitHub License](https://img.shields.io/github/license/xpko/xpko.github.io) ![GitHub commit activity](https://img.shields.io/github/commit-activity/t/xpko/xpko.github.io) ![GitHub Repo stars](https://img.shields.io/github/stars/xpko/xpko.github.io) - - - - - - - - - - - - diff --git "a/vixl/\346\227\266\351\227\264\346\227\240\345\205\263\350\260\203\350\257\225.md" "b/vixl/\346\227\266\351\227\264\346\227\240\345\205\263\350\260\203\350\257\225.md" new file mode 100644 index 00000000..7ed31b89 --- /dev/null +++ "b/vixl/\346\227\266\351\227\264\346\227\240\345\205\263\350\260\203\350\257\225.md" @@ -0,0 +1,2 @@ +# 时间无关调试 +