Used to decrypt and extract resource files under apicloud apk (html, js, css)
When I analyze this type of h5 app, I often need to extract html, css, js and other resource files. However, there is currently no convenient method (some extracted through xpose hooks, but it is more troublesome)
So I analyzed similar apps and also reversed the libsec.so file in it. I found that it was encrypted using rc4, and the key can be extracted statically. So I wrote this tool to facilitate and quickly extract file samples of apk and libsec.so in the resources folder of the resource file project for reference analysis.
If the subsequent encryption method is modified and becomes inapplicable, you can make an issue. I also especially welcome all aspiring people to contribute to this tool for personal research and study. The legal liability caused by other illegal uses is not related to this project.
Connect to AndroidNativeEmu, explore and try new decryption ideas
master branch supports python3.xpython2 branch supports python2.7Install the project's dependencies first
pip install -r requirements.txt
Support pycryptodome to make decryption more efficient
pip install -r optional-requirements.txt
python main.py xxx.apk
Support parameter list viewing through -h
python main.py -h
Specific use cases
Check out the rc4 key in apk
python main.py -v xxx.apk
Output information description
package : xxx.ooo.xxx ==> 应用包名
uz_version : 1.3.13 ==> apicloud engine的版本号
encrypted : False ==> 资源是否加密
rc4Key : xxxxxxxxxxxxxxxxxxxx ==> 资源加密用到的RC4密钥
Decrypt and extract all resource files (if the output path is not specified, the default output is output to the folder where the apk is located)
python main.py -o 输出路径xxx.apk
Support batch recognition and decryption to specify folders, which will automatically scan all apicloud apks under the folder and perform recognition or decryption.
python main.py -v targetFolder