Skip to content

Latest commit

 

History

History
65 lines (42 loc) · 1.57 KB

README.md

File metadata and controls

65 lines (42 loc) · 1.57 KB

CryptoFucker

QQ 群:471525564

For English version of README, drag the page down

Xposed框架,用于抓取javax.crypto.* 与 javax.security.* 算法参数(包括加密数据、密钥、IV、结果等数据)的工具。

使用方法

  • 1.安装Xposed framework
  • 2.安装并激活CryptoFucker
  • 3.运行你想测试的APP
  • 4./sdcard/ydsec/packgeName.txt 为数据文件

建议使用Notepad++查看数据文件。

优势

  • 支持 javax.crypto.* 大部分函数
  • 支持 javax.security.*大部分函数
  • IV向量嗅探
  • 密钥嗅探
  • 加密原始数据嗅探
  • 加密结果嗅探
  • 调用栈显示
  • HEX 显示

数据文件样例说明

样例数据在example目录。

English Version starts here

This is a module runs on Xposed framework, a tool for intercepting the parameter of javax.crypto.* and javax.security. Including encrypted data, key, IV and results.

How to use

  • 1.Install Xposed framework
  • 2.Install & Activate CryptoFucker
  • 3.Run the application that you wish to debug on
  • 4.Bam. The data file will show up at /sdcard/ydsec/packgeName.txt

Tip: Use Notepad++ to view file. You don't have to, but maybe you should.

Great unique feature that no one else have becuz they are fucking awesome

  • Most functions of javax.crypto.* are supported
  • Most functions of javax.security.* are also supported
  • IV vector sniffer
  • key sniffer
  • Encrypted raw data sniffer
  • Encrypted result sniffer
  • Call stack view
  • View in HEX

Samples

There are some samples in /example

Wonder why it's in /example instead of /sample?

Cuz me chinese don know english