ЯevDex
2.82K subscribers
78 photos
48 videos
87 files
97 links
My GitHub - https://github.com/ispointer
Telegram Bot - @RevDexbot
Telegram Chat: @RevDexChat
RevDex Team Identity -- > Reverse Engineer & Indie H@cker
Download Telegram
Media is too big
VIEW IN TELEGRAM
smali-standalone-BETA
👀74
Media is too big
VIEW IN TELEGRAM
play integrity token simulation android binding 🤣

Google integrity gone

Non Root Also working
17😱12😍3
rkp remote key provisioning 😭 puck you google


Revenge soon 🦣 🔜

com.android.rkpdapp 🙂‍↕️
🤯13😱2
#include <stdio.h>
#include <string.h>

int main() {
int is_admin = 0;
char buffer[8];
printf("Enter your username: ");
scanf("%s", buffer);
if (is_admin == 0) {
printf("hi nigga🙊");
} else {
printf("hi smarty 🫩");
}

return 0;
}

i need output hi smarty .
no modification of code or debugger ? 🙊
🙈103👌3
Patch the Kernel

CONFIG_MODULE_SIG_FORCE=y ✖️
CONFIG_MODULE_SIG_FORCE=n ✔️

#1 Extract Get the boot.img from your phone. Use AIK Android Image Kitchen to unpack it You will get a file named boot.img-kernel

#2 Patch Use KernelPatch to remove the signature restriction from that kernel file

kptools -p -i boot.img-kernel -o boot.img-kernel -k kpimg-aarch64


#3 Repack Use AIK to repack the folders back into a new image image-new.img

#4 Flash this new image to your phone

fastboot flash boot image-new.img


Done successfully bypass all restriction you can use Kernel Driver module without any custom kernel
Please open Telegram to view this post
VIEW IN TELEGRAM
11👌2
Oreyo External Chams.zip
216.8 KB
🧑‍🔬 Undetectable Chams

Executable no need internal hooking fully external

Creator - @RevDex

Oreyo::DumpShaders("com.kiloo.subwaysurf", "libunity.so", "/data/local/tmp/shader.h");


This is A test version Only have shader dumping next version I going to add Chams , this GL Hook is Undetectable you can use in FF & PÛBG

Preview - https://t.me/RevDexChat/7401

GitHub - https://github.com/ispointer
4❤‍🔥1🥰1
can you load me.kpm
2.8 KB
😚 KernelPatch Module
Please open Telegram to view this post
VIEW IN TELEGRAM
2
NativeModMenu 2.5

Native Preferences & cast_register all classes dynamically. Theme in Java without XML 🍺 full menu theme added. Some games do not have custom themes; in this case, the mod menu is destroyed. Mod menu switch toggle button etc.. style change. This problem is solved by adding a C++ internal theme

https://github.com/ispointer/NativeModMenu
❤‍🔥9🤯21
https://github.com/ispointer/Dpt-ShellDump-Api

curl.exe -X POST "https://dexdumper.com/dpt-shell/api.php" `
-F "dex=@classes.dex" `
-F "code=@OoooooOooo"


Termux

curl -X POST https://dexdumper.com/dpt-shell/api.php \
-F "dex=@classes.dex" \
-F "code=@OoooooOooo"



Open source Project
Do you want MemTool Zygisk? If people are excited, then I will release it publicly 👋
Anonymous Poll
84%
Yees
16%
Noo
❤‍🔥122🤯1
done 1.4 ALL added
16😁5
MemTool v1.4 ♌️

We are proud to introduce two major new features in MemTool 1.4 that significantly improve runtime memory analysis and tracing capabilities.

Structure Field Tracker

MemTool can now detect exactly which field inside a structure is being accessed or modified. Instead of showing only a raw memory address, the tool now identifies the real structure field name such as Player.hp, Player.ammo, or Player.speed.

This makes reverse engineering much clearer and more efficient. You can immediately understand which internal value is being changed without manually calculating offsets. It simplifies struct layout analysis, offset mapping, and live stat monitoring during runtime.


Control Flow Tracer

MemTool now traces which function or execution path caused a memory access. This means you not only see that a value changed, but also identify the function responsible for that change. By revealing the call chain behind memory reads or writes, this feature helps in debugging unexpected behavior, analyzing logic flow, identifying antich@at routines, and understanding how the program operates internally.

Combined Capability 🔓

Structure Field Tracker tells you what changed

Control Flow Tracer tells you who changed it

Together, these features provide deep runtime visibility and advanced dynamic analysis power.

MemTool 1.4 is designed for serious reverse engineering, security research, and low-level runtime inspection.

Main interesting thing Zygisk support & KsuWebUI Good control panel is available

Thanks for staying with Revdex 🌷

Old Version Release

1.4 - ui soon - https://t.me/RevDex/347

1.3 - > https://t.me/RevDex/268

1.2 -> https://t.me/RevDex/259
Please open Telegram to view this post
VIEW IN TELEGRAM
17❤‍🔥4
Integrity pulling

Integrity bypass service loading...

Full 24h live server

Ktor based server with ultimate speed

Very soon I will sell any app integrity token bypass Service 🐕‍🦺 as a product type
😁18😍5🥰3
MemTool_release_v1.4.0-104.zip.zip
7.9 MB
Version Code: 104

Changelog:
- crash log added
- Inspector more improved
- Kitty memory upgraded & Dobby
- memory trap 🪤 more enhanced
- DexDump is still in beta. The issues will be fixed in the next version soon.
❤‍🔥149🤯4
LGL_Zygisk_RevDexLibLoader_v1.5.0.zip
1.4 MB
This is a test module for the upcoming MemTool 1.5. Anyone can try it and give me feedback on whether it works on all games or not

Send Feedback in Comment 😑
116👀3