Skip to content

Instantly share code, notes, and snippets.

View micartey's full-sized avatar
🤗
A fool with a tool is still a fool

micartey

🤗
A fool with a tool is still a fool
  • 14:37 (UTC +02:00)
View GitHub Profile
@DavidBuchanan314
DavidBuchanan314 / notes.md
Last active September 4, 2025 15:05
JNIC Reversing Notes https://jnic.dev/

I looked at a JAR file protected using JNIC, version jnic.dev v3.6.0. I haven't written a full-auto deobfuscater yet, but these notes should be useful for anyone reversing it.

The first layer is a LZMA2 compressed .dat file, from which a native library is extracted into a temp dir, and then loaded using System.load.

The sample I looked at had 4 different library versions (for different platforms/architectures), and the script I wrote to extract them looks like this:

import lzma

# from JNICLoader.java
@castexyz
castexyz / drozer.md
Last active August 14, 2025 16:20
Drozer commands
  • Drozer - Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.
    • Starting a session
      • adb forward tcp:31415 tcp:31415
      • drozer console connect
      • drozer console connect --server <ip>
    • List modules
      • ls
      • ls activity
    • Retrieving package information
  • run app.package.list -f