dumpDex shelling Tutorial

    dumpDex is xposed open source plug-ins on a github, it can be used to take off most of the current housing market, but also to reason this damn thing is really strange easy to use.

   First, the preparatory work

    First need root of a cell phone, I use a Huawei glory 6 (android5.1), installed Framework xposed

    dumpDex Project Address: https://github.com/WrBug/dumpDex

    You can download apk release, you can also compile your own package to apk installed to the phone, I personally prefer the second.

    After installing the apk, for 32 mobile phones, you need to copy lib / armeabi-v7a / libnativeDump.so to /data/local/tmp/libnativeDump.so, permissions set to 777

    Second, start shelling

      

       Decompile apk, according to the characteristics found to be using Bang Bang reinforcement

     Install the plug, restart the phone, open apk reinforcement, after shelling will dex / data / data / packet corresponding to the path / dump folder

    

    As shown in FIG dex after shelling, part of which is dex shell, what needs to choose their own

   Third, supplement

    Set permissions problem, there are detailed instructions on GitHub

    Compilation process there may be a problem allows you to set the signature, directly into your signature can debug

      If the reinforcement package names corresponding to the PackageInfo.java not in itself can be added in PackageInfo.java

    Applications are likely to have a jam or phone restart condition, but should be able to emerge shell, the proposed multi-off times

    

   If the source code is part of the Department of Baidu shell, and there is no direct return dump, because not encountered Baidu's case, they will not know the specific reasons

Guess you like

Origin www.cnblogs.com/CYCLearning/p/12013405.html