Extraction and unpacking of game archives and compression, encryption, obfuscation, decoding of unknown files
-
jessijung
- Posts: 20
- Joined: Thu Aug 23, 2018 5:44 pm
Post
by jessijung »
APK:
https://drive.google.com/file/d/1aS343gvl_1pmXNNojRG0cBouL8dzS005i found key xxtea : "b81a1dd7-625d-43" but bms script not work
please help me ^^
Code: Select all
get NAME basename
comtype deflate_noerror
get SIZE asize
clog MEMORY_FILE 0 SIZE SIZE
comtype base64
get SIZE asize MEMORY_FILE
clog MEMORY_FILE 0 SIZE SIZE MEMORY_FILE
set KEY string "b81a1dd7-625d-43"
encryption xxtea KEY "0x9e3779b9 0" 0 16 # cocos2d
get SIZE asize MEMORY_FILE
log NAME 0 SIZE MEMORY_FILE
Can you help me decrypt assets\src\project.jsc? and .png file
Thanks for all
-
jessijung
- Posts: 20
- Joined: Thu Aug 23, 2018 5:44 pm
Post
by jessijung »
please help me, thank you very much!
-
Ekey
- Posts: 1383
- Joined: Sat Aug 09, 2014 2:34 pm
Post
by Ekey »
Code: Select all
# One Piece (Android) JSC decryptor
# script for QuickBMS http://quickbms.aluigi.org
set SUFFIX string "_decrypt"
get NAME basename
get EXT extension
string NAME p "%s%s.%s" NAME SUFFIX EXT
get SIZE asize
log MEMORY_FILE 0 SIZE
set KEY string "b81a1dd7-625d-43"
encryption xxtea KEY "0x9e3779b9 0" 0 16 MEMORY_FILE # cocos2d
comtype gzip
clog NAME 0 SIZE SIZE MEMORY_FILE
-
chrrox
- Posts: 388
- Joined: Thu Aug 07, 2014 10:28 pm
Post
by chrrox »
games name
《冒险草帽归来》