首页
社区
课程
招聘
[分享]IDA BETA 9.0 crack
发表于: 2024-8-10 13:36 14992

[分享]IDA BETA 9.0 crack

2024-8-10 13:36
14992

IDA BETA 9.0 crack

下载链接

https://out5.hex-rays.com/beta90_6ba923

win patch方法

  1. 用010 Editor修改ida64.dll,0x342D8B 75->74
  2. 新建一个ida.hexlic,填入如下内容
1
{"header":{"version":1},"payload":{"name":"test","email":"test","licenses":[{"id":"0C-2238-4E5A-7B","product":"IDA","owner":"0C-2238-4E5A-0A","license_type":"named","seats":1,"add_ons":[{"id":"0C-2238-4E5A-01","code":"HEXX86","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-02","code":"HEXX64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-03","code":"HEXARM","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-04","code":"HEXARM64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-05","code":"HEXMIPS","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-06","code":"HEXMIPS64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-07","code":"HEXPPC","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-08","code":"HEXPPC64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-09","code":"HEXRV64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-10","code":"HEXARC","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"},{"id":"0C-2238-4E5A-11","code":"HEXARC64","owner":"0C-2238-4E5A-0A","start_date":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"}],"features":[],"start_date":"2024-08-08 08:08:08","issued_on":"2024-08-08 08:08:08","end_date":"2034-08-08 08:08:08"}]}}

来源: https://x.com/gmhzxy/status/1821962897888780446

补充

其他平台的crack脚本,自行尝试
来源: https://x.com/__alula/status/1822106728630034776

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
import json
import hashlib
import os
 
license = {
    "header": {"version": 1},
    "payload": {
        "name": "meow :3",
        "email": "hi@hex-rays.com",
        "licenses": [
            {
                "id": "48-2137-ACAB-99",
                "license_type": "named",
                "product": "IDA",
                "seats": 1,
                "start_date": "2024-08-10 00:00:00",
                "end_date": "2033-12-31 23:59:59"# This can't be more than 10 years!
                "issued_on": "2024-08-10 00:00:00",
                "owner": "cracked by alula :3",
                "add_ons": [
                    # {
                    #     "id": "48-1337-DEAD-01",
                    #     "code": "HEXX86L",
                    #     "owner": "48-0000-0000-00",
                    #     "start_date": "2024-08-10 00:00:00",
                    #     "end_date": "2033-12-31 23:59:59",
                    # },
                    # {
                    #     "id": "48-1337-DEAD-02",
                    #     "code": "HEXX64L",
                    #     "owner": "48-0000-0000-00",
                    #     "start_date": "2024-08-10 00:00:00",
                    #     "end_date": "2033-12-31 23:59:59",
                    # },
                ],
                "features": [],
            }
        ],
    },
}
 
 
def add_every_addon(license):
    platforms = [
        "W"# Windows
        "L"# Linux
        "M"# macOS
    ]
    addons = [
        "HEXX86",
        "HEXX64",
        "HEXARM",
        "HEXARM64",
        "HEXMIPS",
        "HEXMIPS64",
        "HEXPPC",
        "HEXPPC64",
        "HEXRV64",
        "HEXARC",
        "HEXARC64",
        # Probably cloud?
        # "HEXCX86",
        # "HEXCX64",
        # "HEXCARM",
        # "HEXCARM64",
        # "HEXCMIPS",
        # "HEXCMIPS64",
        # "HEXCPPC",
        # "HEXCPPC64",
        # "HEXCRV",
        # "HEXCRV64",
        # "HEXCARC",
        # "HEXCARC64",
    ]
 
    i = 0
    for addon in addons:
        i += 1
        license["payload"]["licenses"][0]["add_ons"].append(
            {
                "id": f"48-1337-DEAD-{i:02}",
                "code": addon,
                "owner": license["payload"]["licenses"][0]["id"],
                "start_date": "2024-08-10 00:00:00",
                "end_date": "2033-12-31 23:59:59",
            }
        )
    # for addon in addons:
    #     for platform in platforms:
    #         i += 1
    #         license["payload"]["licenses"][0]["add_ons"].append(
    #             {
    #                 "id": f"48-1337-DEAD-{i:02}",
    #                 "code": addon + platform,
    #                 "owner": license["payload"]["licenses"][0]["id"],
    #                 "start_date": "2024-08-10 00:00:00",
    #                 "end_date": "2033-12-31 23:59:59",
    #             }
    #         )
 
 
add_every_addon(license)
 
 
def json_stringify_alphabetical(obj):
    return json.dumps(obj, sort_keys=True, separators=(",", ":"))
 
 
def buf_to_bigint(buf):
    return int.from_bytes(buf, byteorder="little")
 
 
def bigint_to_buf(i):
    return i.to_bytes((i.bit_length() + 7) // 8, byteorder="little")
 
 
# Yup, you only have to patch 5c -> cb in libida64.so
pub_modulus_hexrays = buf_to_bigint(
    bytes.fromhex(
        "edfd425cf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93"
    )
)
pub_modulus_patched = buf_to_bigint(
    bytes.fromhex(
        "edfd42cbf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93"
    )
)
 
private_key = buf_to_bigint(
    bytes.fromhex(
        "77c86abbb7f3bb134436797b68ff47beb1a5457816608dbfb72641814dd464dd640d711d5732d3017a1c4e63d835822f00a4eab619a2c4791cf33f9f57f9c2ae4d9eed9981e79ac9b8f8a411f68f25b9f0c05d04d11e22a3a0d8d4672b56a61f1532282ff4e4e74759e832b70e98b9d102d07e9fb9ba8d15810b144970029874"
    )
)
 
 
def decrypt(message):
    decrypted = pow(buf_to_bigint(message), exponent, pub_modulus_patched)
    decrypted = bigint_to_buf(decrypted)
    return decrypted[::-1]
 
 
def encrypt(message):
    encrypted = pow(buf_to_bigint(message[::-1]), private_key, pub_modulus_patched)
    encrypted = bigint_to_buf(encrypted)
    return encrypted
 
 
exponent = 0x13
 
 
def sign_hexlic(payload: dict) -> str:
    data = {"payload": payload}
    data_str = json_stringify_alphabetical(data)
 
    buffer = bytearray(128)
    # first 33 bytes are random
    for i in range(33):
        buffer[i] = 0x42
 
    # compute sha256 of the data
    sha256 = hashlib.sha256()
    sha256.update(data_str.encode())
    digest = sha256.digest()
 
    # copy the sha256 digest to the buffer
    for i in range(32):
        buffer[33 + i] = digest[i]
 
    # encrypt the buffer
    encrypted = encrypt(buffer)
 
    return encrypted.hex().upper()
 
 
def generate_patched_dll(filename):
    if not os.path.exists(filename):
        print(f"Didn't find {filename}, skipping patch generation")
        return
 
    with open(filename, "rb") as f:
        data = f.read()
 
        if data.find(bytes.fromhex("EDFD42CBF978")) != -1:
            print(f"{filename} looks to be already patched :)")
            return
         
        if data.find(bytes.fromhex("EDFD425CF978")) == -1:
            print(f"{filename} doesn't contain the original modulus.")
            return
 
        data = data.replace(
            bytes.fromhex("EDFD425CF978"), bytes.fromhex("EDFD42CBF978")
        )
 
        patched_filename = f"{filename}.patched"
        with open(patched_filename, "wb") as f:
            f.write(data)
 
        print(f"Generated modulus patch to {patched_filename}! To apply the patch, replace the original file with the patched file")
 
 
# message = bytes.fromhex(license["signature"])
# print(decrypt(message).hex())
# print(encrypt(decrypt(message)).hex())
 
license["signature"] = sign_hexlic(license["payload"])
 
serialized = json_stringify_alphabetical(license)
 
# write to ida.hexlic
filename = "ida.hexlic"
 
with open(filename, "w") as f:
    f.write(serialized)
 
print(f"Saved new license to {filename}!")
 
generate_patched_dll("ida.dll")
generate_patched_dll("ida64.dll")
generate_patched_dll("libida.so")
generate_patched_dll("libida64.so")
generate_patched_dll("libida.dylib")
generate_patched_dll("libida64.dylib")

[课程]Android-CTF解题方法汇总!

最后于 2024-8-10 14:03 被TubituX编辑 ,原因: 修改
收藏
免费 17
支持
分享
最新回复 (24)
雪    币: 606
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
2
过年啦
2024-8-10 13:40
1
雪    币: 1737
活跃值: (2016)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
3

过年说是。打不开下载链接的用这个链接

最后于 2024-8-10 14:22 被墨穹呢编辑 ,原因:
2024-8-10 14:07
0
雪    币: 440
活跃值: (1188)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
4
Linux x86_64 0x4A2DA7: E9 CF FB FF FF => E9 84 FF FF FF
2024-8-10 16:06
0
雪    币: 31
活跃值: (638)
能力值: ( LV5,RANK:60 )
在线值:
发帖
回帖
粉丝
5
maco好用
2024-8-10 16:12
0
雪    币: 3488
活跃值: (2750)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
66666  这是提前过年了
2024-8-10 17:48
0
雪    币: 8
活跃值: (542)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
Process:               ida64 [6110]
Path:                  /Applications/IDA Professional 9.0.app/Contents/MacOS/ida64
Identifier:            com.hexrays.ida64
Version:               9.0.240807 (240807)
Code Type:             X86-64 (Native)
Parent Process:        zsh [6076]
Responsible:           Terminal [598]
User ID:               501

Date/Time:             2024-08-10 17:46:33.8302 +0800
OS Version:            macOS 13.6.9 (22G830)
Report Version:        12
Anonymous UUID:        5C160960-6E31-426D-7FFE-FDE99BC47A5B


Time Awake Since Boot: 720 seconds

System Integrity Protection: enabled

Crashed Thread:        0  Dispatch queue: com.apple.main-thread

Exception Type:        EXC_BAD_ACCESS (SIGSEGV)
Exception Codes:       KERN_INVALID_ADDRESS at 0x00007ff8a507f341
Exception Codes:       0x0000000000000001, 0x00007ff8a507f341

Termination Reason:    Namespace SIGNAL, Code 11 Segmentation fault: 11
Terminating Process:   exc handler [6110]
 有兄弟遇见这个bug吗
2024-8-10 17:49
0
雪    币: 6827
活跃值: (2977)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
8
没有插件,可惜
2024-8-10 18:00
0
雪    币: 386
活跃值: (1739)
能力值: ( LV5,RANK:70 )
在线值:
发帖
回帖
粉丝
9
有没有intelmac成功的!!!
2024-8-10 19:04
0
雪    币: 1230
活跃值: (149)
能力值: ( LV3,RANK:25 )
在线值:
发帖
回帖
粉丝
10
dextoart Process: ida64 [6110] Path: /Applications/IDA Professional 9.0.app/C ...
有解决吗?
2024-8-10 20:43
0
雪    币: 109
活跃值: (289)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
11
有人下载到 tilib90 么? 
2024-8-10 20:53
0
雪    币: 8
活跃值: (542)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
12
明丶大 有解决吗?
签名结束后,可以解决部分crash,但是有些样本加载会crash
sudo codesign --force --deep --sign - /Applications/IDA\ Professional\ 9.0.app/Contents/MacOS/libida.dylib
sudo codesign --force --deep --sign - /Applications/IDA\ Professional\ 9.0.app/Contents/MacOS/libida64.dylib
2024-8-10 20:56
1
雪    币: 1014
活跃值: (601)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
13
过年了过年了 等大佬做个整合版
2024-8-10 22:18
0
雪    币: 20
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
14
各位大佬,你们能安装使用   LazyIDA  与   keypatch 插件吗
2024-8-10 23:40
0
雪    币: 1140
活跃值: (3041)
能力值: ( LV12,RANK:385 )
在线值:
发帖
回帖
粉丝
15

2024-8-10 23:41
0
雪    币: 7028
活跃值: (4179)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
16
有哪些新功能?
2024-8-11 07:36
0
雪    币: 1408
活跃值: (4241)
能力值: ( LV6,RANK:90 )
在线值:
发帖
回帖
粉丝
17
提前过年??!
2024-8-11 08:49
0
雪    币: 1359
活跃值: (3601)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
18

签名文件合集中 signatures-bundles-9.0-beta.zip 压缩包没有解压密码。

lumina_teams90_x64linux.run 是如何使用的?创建自己的lumina服务器

最后于 2024-8-11 20:45 被方向感编辑 ,原因:
2024-8-11 20:43
0
雪    币: 14397
活跃值: (9087)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
19
下载页面竟然还能访问。。。
hex-rays不知道这是想啥呢。是不是没看x还是怎么,不会是学PortSwigger直接把BurpSuite公开下载,奢望有人买key吧。
2024-8-12 10:45
0
雪    币: 440
活跃值: (963)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
20
方向感 签名文件合集中 signatures-bundles-9.0-beta.zip 压缩包没有解压密码。lumina_teams90_x64linux.run 是如何使 ...
https://github.com/kimci86/bkcrack

bkcrack -C signatures-bundles-9.0-beta.zip -k 7d396e83 b1c59666 08ae3e65 -D signatures-bundles-9.0-beta_nopass.zip
2024-8-12 12:49
1
雪    币: 210
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
21
已经不能下载了,苦于没有linux ida pro破解
2024-8-12 15:52
0
雪    币: 8
活跃值: (542)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
22
BlackBosy 已经不能下载了,苦于没有linux ida pro破解
https://od.cloudsploit.top/tools/DAI/9.0  

2024-8-12 17:46
0
雪    币: 210
能力值: ( LV1,RANK:0 )
在线值:
发帖
回帖
粉丝
23
dextoart https://od.cloudsploit.top/tools/DAI/9.0 有
感谢
2024-8-12 23:05
0
雪    币: 1359
活跃值: (3601)
能力值: ( LV3,RANK:30 )
在线值:
发帖
回帖
粉丝
24
猫子 https://github.com/kimci86/bkcrack bkcrack -C signatures-bundles-9.0-beta.zip -k 7d396e83 b1c5966 ...
谢谢,
2024-8-12 23:46
0
雪    币: 233
活跃值: (187)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
25

pub_modulus_hexrays =   "edfd425cf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93" 

 pub_modulus_patched =   "edfd42cbf978546e8911225884436c57140525650bcf6ebfe80edbc5fb1de68f4c66c29cb22eb668788afcb0abbb718044584b810f8970cddf227385f75d5dddd91d4f18937a08aa83b28c49d12dc92e7505bb38809e91bd0fbd2f2e6ab1d2e33c0c55d5bddd478ee8bf845fcef3c82b9d2929ecb71f4d1b3db96e3a8e7aaf93" 


破解文件RSA公钥与原版秘钥区别只有一个字节怎么做到的

2024-8-13 21:03
0
游客
登录 | 注册 方可回帖
返回
//