Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

https://github.com/P4nda0s/CryptoFucker

A xposed plugin for intercepting crypto parameters from apk files.
https://github.com/P4nda0s/CryptoFucker

Last synced: 22 days ago
JSON representation

A xposed plugin for intercepting crypto parameters from apk files.

Lists

README

        

# CryptoFucker

QQ 群:471525564

For English version of README, drag the page down

Xposed框架,用于抓取javax.crypto.* 与 javax.security.* 算法参数(包括加密数据、密钥、IV、结果等数据)的工具。

## 使用方法

- 1.安装Xposed framework
- 2.安装并激活CryptoFucker
- 3.运行你想测试的APP
- 4./sdcard/ydsec/packgeName.txt 为数据文件

建议使用Notepad++查看数据文件。

## 优势

- 支持 javax.crypto.* 大部分函数
- 支持 javax.security.*大部分函数
- IV向量嗅探
- 密钥嗅探
- 加密原始数据嗅探
- 加密结果嗅探
- 调用栈显示
- HEX 显示

## 数据文件样例说明

样例数据在example目录。

# English Version starts here

This is a module runs on Xposed framework, a tool for intercepting the parameter of javax.crypto.* and javax.security. Including encrypted data, key, IV and results.

## How to use

- 1.Install Xposed framework
- 2.Install & Activate CryptoFucker
- 3.Run the application that you wish to debug on
- 4.Bam. The data file will show up at /sdcard/ydsec/packgeName.txt

Tip: Use Notepad++ to view file. You don't have to, but maybe you should.

## Great unique feature that no one else have becuz they are fucking awesome

- Most functions of javax.crypto.* are supported
- Most functions of javax.security.* are also supported
- IV vector sniffer
- key sniffer
- Encrypted raw data sniffer
- Encrypted result sniffer
- Call stack view
- View in HEX

## Samples

There are some samples in /example

Wonder why it's in /example instead of /sample?

Cuz me chinese don know english