I will so reverse analysis native code debugging
Senior Reverse Engineering Web Crawler Expert
About this Gig
Core encryption and algorithms of Android apps are usually hidden in Native layer SO files? I provide professional SO reverse services to restore key logic at the assembly level!
服务范围:
l SO file decompilation (IDA Pro/GDB debugging), ARM/x86 assembly code analysis
l Native function location, parameter parsing, call flow restoration
l Encryption/decryption algorithm reverse (AES, RSA, DES, custom encryption, etc.)
l SO file Hook script development (Frida/Substrate), function modification & repackaging
My Advantages:
l Proficient in ARM/x86 assembly language, skilled in IDA Pro, GDB and other debugging tools
l Rich experience in SO reverse engineering, expert in handling obfuscation, junk code, anti-debugging
l Deliver detailed analysis reports with assembly comments, algorithm restoration code, Hook scripts
l Support cross-platform SO analysis (Android/iOS/Linux)
您需要提供什么:
l Target SO file (or APK containing SO)
l Analysis requirements (e.g., "Restore encryption functions in SO" "Crack registration code verification logic")
l Relevant context information (e.g., function call scenario, input/output examples)
Purpose:
Chat
•
Entertainment
•
Health & fitness
Platform:
Cross-platforms
App type:
Native
Programming language:
TypeScript
•
React Native
•
Python
Frameworks:
Flutter
•
Ionic
•
Kivy
•
Beeware
•
PhoneGap
Tools:
Thunkable
•
Bubble
•
GoodBarber
•
Glide

