You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
zh-cn/sekiro-article/sekiro-xposed-1/
背景 现在好多android app的加密都放在了so,逆向so需要的时间成本很高,我一直在想有没有一些通用的方案。参考网上的的方案,我实践了如下三种方案。
Android上起http server Android上起http server + frp内网穿透 使用sekiro暴露 API 本文主要介绍第三种方法~
sekiro-server端配置 项目地址:https://gitee.com/maike1/sekiro.git 这个是已经打包好的jar包,可以直接使用
xposed模块编写 导入sekiro依赖包:在app的build.gradle文件dependencies标签导入 implementation 'com.virjar:sekiro-api:1.0.1' 在xposed标签的 handleLoadPackage方法中进行注册 Log.i(TAG, "connect server...."); // 服务端host String testHost = "192.168.0.106"; // 客户端标识 String clientId = UUID.randomUUID().toString(); // 接口组名称 String groupName = "addDemoTest2"; // 暴露的接口名称 String actionName = "myAdd"; // 拿classloader final ClassLoader classLoader = lpparam.classLoader; // 连接服务端并且注册处理的handler SekiroClient.start(testHost, clientId, groupName) .registerHandler(actionName, new SekiroRequestHandler(){ @OverRide public void handleRequest(SekiroRequest sekiroRequest, SekiroResponse sekiroResponse){ //当服务端分配任务时, 这里处理逻辑, 并把结果返回给服务端, 服务端再返回给调用者 // Class<?
http://154.39.149.86:5612/zh-cn/sekiro-article/sekiro-xposed-1/
Beta Was this translation helpful? Give feedback.
All reactions