能力值:
( LV2,RANK:10 )
51 楼
LOCKLOSE
修改PY源码.把你的LICENSE DATA写死.然后到网上找Python在线运行的网站.执行就出来你的KEY了.
感谢你的热心回复,我在https://www.cnblogs.com/xiongmozhou/p/9357615.html网站上运行,成功算出了KEY,注册成功。
能力值:
( LV2,RANK:10 )
52 楼
在mac上运行,jeb_macos.sh , jeb password: 输入 ilbtcdnwiuypbzeo ,然后就会进入界面,在点击中间的按钮,拿到 LICENSE DATA ,在用Python 运行即可获取KEY
能力值:
( LV2,RANK:10 )
53 楼
LOCKLOSE
修改PY源码.把你的LICENSE DATA写死.然后到网上找Python在线运行的网站.执行就出来你的KEY了.
最后于 2020-6-12 11:26
被hehaohw编辑
,原因:
能力值:
( LV2,RANK:10 )
54 楼
LOCKLOSE
修改PY源码.把你的LICENSE DATA写死.然后到网上找Python在线运行的网站.执行就出来你的KEY了.
最后于 2020-6-12 11:24
被hehaohw编辑
,原因:
能力值:
( LV2,RANK:10 )
55 楼
这里有一篇关于最近版本的博客 (Reversing DexGuard): https://www.pnfsoftware.com/blog/reversing-dexguard/
能力值:
( LV2,RANK:10 )
56 楼
谢谢大佬分享
能力值:
( LV2,RANK:10 )
57 楼
试了一下,发觉jeb decompiler的反编译(伪c代码)输出比ida pro差好多啊
能力值:
( LV1,RANK:0 )
58 楼
感谢大佬分享,
注册上了
能力值:
( LV2,RANK:10 )
59 楼
成功注册,感谢大佬们分享
能力值:
( LV2,RANK:10 )
60 楼
kanxue
https://tool.pediy.com/index-detail-182.htm
解压密码多少
能力值:
( LV1,RANK:0 )
61 楼
Canon lbp1210 driver for windows 7 64bit. Plz help
能力值:
( LV1,RANK:0 )
62 楼
Canon lbp1210 driver for windows 7 64bit. Plz help
能力值:
( LV2,RANK:10 )
63 楼
mark
能力值:
( LV1,RANK:0 )
64 楼
class com/pnfsoftware/jeb/rcpclient/launcher not found 我的报错咋办。。。
能力值:
( LV1,RANK:0 )
65 楼
hehaohw
感谢你的热心回复,我在https://www.cnblogs.com/xiongmozhou/p/9357615.html网站上运行,成功算出了KEY,注册成功。
这个注册后的,有效期到什么时候?
能力值:
( LV1,RANK:0 )
66 楼
皇和
成功注册,感谢大佬们分享
这个注册后的,有效期到什么时候?
能力值:
( LV2,RANK:10 )
67 楼
!!!
最后于 2020-8-7 15:13
被小hanger编辑
,原因:
能力值:
( LV2,RANK:10 )
68 楼
能力值:
( LV2,RANK:10 )
69 楼
感谢大佬分享
能力值:
( LV7,RANK:117 )
70 楼
还是python的这个keygen好用,网上流传的另一个java版本的keygen生成的注册号格式都不一样。
能力值:
( LV7,RANK:117 )
71 楼
hehaohw
修改了还是不行,能帮我算个号吗?
你试试把楼上截图里的许可证密钥直接拿来用,毕竟大家用的是一个副本,离线激活数据(应该)都是一样的
能力值:
( LV3,RANK:20 )
72 楼
LOCKLOSE
修改PY源码.把你的LICENSE DATA写死.然后到网上找Python在线运行的网站.执行就出来你的KEY了. #https://bbs.pediy.com/
#!/usr/bin/env python
import os, sys, struct, time, binascii, hashlib
RC4_Key2= 'Eg\xa2\x99_\x83\xf1\x10'
def rc4(Key, inData):
Buf = ""
S = range(256)
K = (map(lambda x:ord(x), Key) * (256 / len(Key) + 1))[:256]
j = 0
for i in range(256):
j = (S[i] + K[i] + j) % 256
S[i], S[j] = S[j], S[i]
i, j = 0, 0
for x in range(len(inData)):
i = (i + 1) % 256
j = (j + S[i]) % 256
S[i], S[j] = S[j], S[i]
Buf += chr(S[(S[j] + S[i]) % 256] ^ ord(inData[x]))
return Buf
def Long2Int(longdata):
lo = longdata & 0xFFFFFFFF
hi = (longdata >> 32) & 0x7FFFFFFF
return hi, lo
def KeygenSN(LicenseSerial, MachineID):
mhi, mlo = Long2Int(MachineID)
lhi, llo = Long2Int(LicenseSerial)
hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
Z1 = int(time.time()) ^ 0x56739ACD
s = sum(map(lambda x:int(x, 16), "%x" % Z1)) % 10
return "%dZ%d%d" % (Z0, Z1, s)
def ParsePost(buf):
Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
TimeOffset, Kclass, Random2 = Info
SysInfoData = buf[0x40:]
assert CRC == binascii.crc32(buf[8:]) & 0xFFFFFFFF
return Info, SysInfoData
def DecodeRc4Str(buf):
buf = buf.decode('hex')
i, s = ParsePost(rc4(buf[:8] + RC4_Key2, buf[8:]))
return i, s
def GetJebLicenseKey():
licdata = "改成你的"
if licdata:
i, MachineID = DecodeRc4Str(licdata)
SN = KeygenSN(i[3], i[4])
print "JEB License Key:", SN
return SN
GetJebLicenseKey()
raw_input("Enter to Exit...") 在线,我用的这个https://tool.lu/coderunner/ 成功的~~
最后于 2020-9-7 07:43
被ninebell编辑
,原因:
能力值:
( LV6,RANK:97 )
73 楼
感谢分享~
能力值:
( LV2,RANK:10 )
74 楼
kanxue
https://tool.pediy.com/index-detail-182.htm 获取正确密码后OK了。
最后于 2020-10-19 10:58
被blazewater编辑
,原因:
能力值:
(RANK:10 )
75 楼
JEB 3.24 Anti-BLM Edition by DimitarSerg
地址失效。
INFO:
Maximum license type (copying, scripts, etc. work now).
Fixed all integrity checks/timebombs.
All the telemetry’s been cut out.
Removed the update checks and other shit that tries to connect to the Internet.
Added/reconstructed saving/loading project function.
Decompilation of missing opcodes for Android has been restored.
Restored display of variable values when hovering over them during debugging (Android).
Decompiling for other platforms was fixed (tested x86/x64, webAssembly, MIPS, ARM).
[BONUS]:
Added new option “Use BlueStacks adb” which allows the use of HD-Adb.exe from BlueStacks folder instead of default adb.exe for easy debugging using BlueStacks emulator.
Instruction:
Replace the original jeb.jar and jebc.jar with fixed.
Register it with Keygen (run it, serial will be copied to clipboard)
Installer (jeb-demo-3.24.0.202007280546-JEBDecompilerDemo-121820464987384330.zip)
https://www.sendspace.com/file/ucth5u 345
Fixed jeb.jar, jebc.jar and keygens (by iNVINCIBLE / by bugmenot1) :
https://www.sendspace.com/file/2qe1xv 254
https://www.upload.ee/files/12241840/Anti-BLM.7z.html 112 (Mirror)
Fixed issue with a non-debuggable app - jeb.jar (by turissssst):
https://www.upload.ee/files/12343633/jeb.jar.html 28
https://anonfiles.com/h0Oc90bap2/jeb_jar 24 (Mirror)
How To Register
In JEB’s registration window, select “Manual Key Generation”:
Generate a key.
Method 1: Get the “license id” from the file: jeb-demo-3.24.0.202007280546\bin\app\jeb-license.txt
java -jar jeb3_keygen_0.2.0b.jar you_license_id
Mehotd 2.1: In JEB’s registration window, copy the contents of the “License data” field.
python27 jebKeygen.py
Input License Data: paste_you_license_data
Method 2.2: Running the script from method 2.1 online:
https://rextester.com/DYRN51380 117
Paste the generated key into the “License key” field.
Enjoy!
FIX
Notification from: Unitname={VM},type={debug_apk} Message: This Android app is marked as non-debuggable. This demo version of JEB does not allow debugging such applications.
https://anonfiles.com/h0Oc90bap2/jeb_jar
NO TEST!