Loading

摘要: cm1 安卓逆向 JEB 直接跟进主函数找到 ASSERT里面拿到ooo文件 直接脚本解密 k = "vn2022" with open('ooo', 'rb') as f: c = f.read() with open('123', 'wb') as wwww: for i in range(le 阅读全文
posted @ 2022-02-15 23:57 FW_ltlly 阅读(188) 评论(0) 推荐(0) 编辑