This project is used to decrypt dex strings for Promon Shield protected-apps. Making the apps easier for static analysis.
✨[NEW] More Speed. Optimised the code for 10X+ performance speed.
✨[NEW] Now it can decrypt the strings which are passed to the functions at runtime (dynamically) and almost every string in dex is getting decrypted.
Working is quite simple, just reading the smali patterns and opcodes (which I added) and then decrypts them using some logic. I request contributors to please add new features. Thank you in advance. ILY <3
Just because I couldn't bypass Frida detection because I'm a noob, so I did this.
- Me
Get the smali folder using Smali and then open the Python script and add the name of the folder at the end of the script. Save and RUN !!! Use a single classes.dex at a time.
Happy Reversing 😉