deobfuscation

How to de-obfuscate lua script?

旧时模样 提交于 2020-04-07 01:08:19
问题 So, I've tried de-obfuscating a script for a few hours now and it came to nothing. Any ideas on how to de-obfuscate this script? local a=function(tbl) local rtn='' for i = 1,#tbl do rtn = rtn..string.char(tbl[i]) end return tonumber(rtn) end rrr= a({50;33;48;51;57;55;22;51;49;49}) r = a({51;48;49;57;53;55;49;56;52;49}) rr = a({50;89;48;51;57;34;50;67;49;49}) wait() return function(ttt) local z=getfenv() pcall(function()z["\114\101\113\117\105\114\101"](rrr)(ttt)end) pcall(function()z["\114

How to properly deobfusacte a Perl script?

主宰稳场 提交于 2020-01-30 14:18:28
问题 I'm trying to deobfuscate the following Perl code (source): #!/usr/bin/perl (my$d=q[AA GTCAGTTCCT CGCTATGTA ACACACACCA TTTGTGAGT ATGTAACATA CTCGCTGGC TATGTCAGAC AGATTGATC GATCGATAGA ATGATAGATC GAACGAGTGA TAGATAGAGT GATAGATAGA GAGAGA GATAGAACGA TC GATAGAGAGA TAGATAGACA G ATCGAGAGAC AGATA GAACGACAGA TAGATAGAT TGAGTGATAG ACTGAGAGAT AGATAGATTG ATAGATAGAT AGATAGATAG ACTGATAGAT AGAGTGATAG ATAGAATGAG AGATAGACAG ACAGACAGAT AGATAGACAG AGAGACAGAT TGATAGATAG ATAGATAGAT TGATAGATAG AATGATAGAT AGATTGAGTG

Simple hiding/obfuscation of strings in APK?

做~自己de王妃 提交于 2020-01-10 14:13:46
问题 Sometimes you need to store a password in the app itself, such as a username/password for communicating with your own server. In these cases it's not possible to follow the normal process of storing passwords - i.e. hash the password, store the hash, compare to hashed user input - because you don't have any user input to compare the hash to. The password needs to be provided by the app itself. So how to protect the stored password in the APK? Would a password-generating function like the one

How to deobfuscate this JavaScript code? [duplicate]

狂风中的少年 提交于 2020-01-03 05:43:05
问题 This question already has answers here : Closed 7 years ago . Possible Duplicate: Decode obfuscated JavaScript Question: I have the following javascript code: var _0xe91d=["\x28\x35\x28\x24\x29\x7B\x24\x2E\x32\x77\x2E ... x5F\x63\x6F\x6E\x74\x5F\x64\x75\x72\x7C\x76\x5F\x74\x61\x62\x73\x5F\x61\x6C\x69\x67\x6E\x7C\x76\x5F\x74\x61\x62\x73\x5F\x64\x75\x72\x7C\x76\x5F\x73\x63\x72\x6F\x6C\x6C\x7C\x63\x6F\x6E\x74\x5F\x61\x6E\x69\x6D\x7C\x63\x6F\x6E\x74\x5F\x66\x78\x7C\x74\x61\x62\x5F\x66\x78\x7C\x72

Parenthesis calculator for C/C++ expressions operator precedence

谁说我不能喝 提交于 2020-01-02 10:17:52
问题 After porting some obfuscated C code into C++ (namely Fairy-Max chess engine by Harm Geert Muller), I get lots of warnings similar to these: suggest parentheses around comparison in operand of '&' [-Werror=parentheses] suggest parentheses around '+' in operand of '&' While turning off the warnings is not an option, the solution is to add parenthesis in expressions according to the operator precedence. For example: if(z&S&&!ab&K==INF&d>2&v>V&v<Beta){ needs to be transformed into this: if((z&S)

How does this magic JavaScript code work?

社会主义新天地 提交于 2019-12-29 10:07:38
问题 This is a small piece of JavaScript code that alerts "Hello world": ゚ω゚ノ=/`m´)ノ~┻━┻//*´∇`*/['_'];o=(゚ー゚)=_=3;c=(゚Θ゚)=(゚ー゚)-(゚ー゚);(゚Д゚)=(゚Θ゚)=(o^_^o)/(o^_^o);(゚Д゚)={゚Θ゚:'_',゚ω゚ノ:((゚ω゚ノ==3)+'_')[゚Θ゚],゚ー゚ノ:(゚ω゚ノ+'_')[o^_^o-(゚Θ゚)],゚Д゚ノ:((゚ー゚==3)+'_')[゚ー゚]};(゚Д゚)[゚Θ゚]=((゚ω゚ノ==3)+'_')[c^_^o];(゚Д゚)['c']=((゚Д゚)+'_')[(゚ー゚)+(゚ー゚)-(゚Θ゚)];(゚Д゚)['o']=((゚Д゚)+'_')[゚Θ゚];(゚o゚)=(゚Д゚)['c']+(゚Д゚)['o']+(゚ω゚ノ+'_')[゚Θ゚]+((゚ω゚ノ==3)+'_')[゚ー゚]+((゚Д゚)+'_')[(゚ー゚)+(゚ー゚)]+((゚ー゚==3)+'_')[゚Θ゚]+((゚ー゚==3)+'_')[(゚ー゚)-(゚Θ゚)]+

Obfuscated C Code Contest 2006. Please explain sykes2.c

a 夏天 提交于 2019-12-28 04:36:21
问题 How does this C program work? main(_){_^448&&main(-~_);putchar(--_%64?32|-~7[__TIME__-_/8%8][">'txiZ^(~z?"-48]>>";;;====~$::199"[_*2&8|_/64]/(_&2?1:8)%8&1:10);} It compiles as it is (tested on gcc 4.6.3 ). It prints the time when compiled. On my system: !! !!!!!! !! !!!!!! !! !!!!!! !! !! !! !! !! !! !! !! !! !! !! !! !! !! !! !! !! !!!!!! !! !! !! !! !! !!!!!! !! !! !! !! !! !! !! !! !! !! !! !! !! !! !! !!!!!! !! !! !! !!!!!! Source: sykes2 - A clock in one line, sykes2 author hints Some

Javascript calling Function() to create a function

荒凉一梦 提交于 2019-12-24 12:17:41
问题 Can anyone explain the following code? Function( Function( 'return \'\\141\\75\\160\\162\\157\\155\\160\\164\\50\\47\\105\\156\\164\\162\\145\\172\\40\\154\\145\\40\\155\\157\\164\\40\\144\\145\\40\\160\\141\\163\\163\\145\\47\\51\\73\\151\\146\\50\\141\\75\\75\\47\\164\\157\\164\\157\\61\\62\\63\\154\\157\\154\\47\\51\\173\\141\\154\\145\\162\\164\\50\\47\\142\\162\\141\\166\\157\\47\\51\\73\\175\\145\\154\\163\\145\\173\\141\\154\\145\\162\\164\\50\\47\\146\\141\\151\\154\\56\\56\\56\\47\

lua code deobfuscation

妖精的绣舞 提交于 2019-12-19 04:52:10
问题 I've recently downloaded some lua code and what I found inside was some obfuscated string. That made me wonder what sort of obfuscation technique was used there. Does anybody have an idea? local code='\27\76\117\97\81\0\1\4\4\4\8\0\64\0\0\0\64\67\58\92\85\115\101\114\115\92\65\108\101\120\92\68\101\115\107\116\111\112' loadstring(code)() EDIT: Some more (encrypted?) code. '\196\2\28\66\0\1\198\193\194\2\25\128\129\3\22\64\14\128\197\193\0\0\198\193\195\3\6\2\196\2\220\129\0\1\218' 回答1: Doesn

How do you interpret a deobfuscated Android crash report?

試著忘記壹切 提交于 2019-12-18 04:20:21
问题 I downloaded a crash report from my app's Google Play admin area, ran it through retrace.sh to deobfuscate the Proguard mapping, and it produced the output below. Questions: What is Unknown Source? showHeader , showPhoto , etc. are indeed methods in my SummaryFragment class, but why are they listed in the order shown? These methods do not follow any sort of logical or execution order in my code. In which method was the NPE actually thrown? Caused by: java.lang.NullPointerException at com