# CryptoFucker **Repository Path**: dvivi_dzw8/CryptoFucker ## Basic Information - **Project Name**: CryptoFucker - **Description**: No description available - **Primary Language**: Android - **License**: AGPL-3.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-02-25 - **Last Updated**: 2021-02-26 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # CryptoFucker QQ 群:471525564 For English version of README, drag the page down Xposed框架,用于抓取javax.crypto.* 与 javax.security.* 算法参数(包括加密数据、密钥、IV、结果等数据)的工具。 ## 使用方法 - 1.安装Xposed framework - 2.安装并激活CryptoFucker - 3.运行你想测试的APP - 4./sdcard/ydsec/packgeName.txt 为数据文件 建议使用Notepad++查看数据文件。 ## 优势 - 支持 javax.crypto.* 大部分函数 - 支持 javax.security.*大部分函数 - IV向量嗅探 - 密钥嗅探 - 加密原始数据嗅探 - 加密结果嗅探 - 调用栈显示 - HEX 显示 ## 数据文件样例说明 样例数据在example目录。 # English Version starts here This is a module runs on Xposed framework, a tool for intercepting the parameter of javax.crypto.* and javax.security. Including encrypted data, key, IV and results. ## How to use - 1.Install Xposed framework - 2.Install & Activate CryptoFucker - 3.Run the application that you wish to debug on - 4.Bam. The data file will show up at /sdcard/ydsec/packgeName.txt Tip: Use Notepad++ to view file. You don't have to, but maybe you should. ## Great unique feature that no one else have becuz they are fucking awesome - Most functions of javax.crypto.* are supported - Most functions of javax.security.* are also supported - IV vector sniffer - key sniffer - Encrypted raw data sniffer - Encrypted result sniffer - Call stack view - View in HEX ## Samples There are some samples in /example Wonder why it's in /example instead of /sample? Cuz me chinese don know english