This post has been de-listed
It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.
Here is the link: https://android.jlelse.eu/reverse-engineering-musical-y-live-ly-android-apps-part-1-a910daad2ec2
Also, I'm trying to reverse the Leviathan function in libcms.so
I think I could've found it statically but someone mentioned dumping memory and using the unicorn emulator? Any other details about how to potentially achieve this?
Edit: I've hooked RegisterNatives
with Frida to find the address of leviathan
but not having a lot of luck otherwise thus far. And yes I can see all requests with a Frida script to bypass cert pinning, could also be helpful for this sub?
Subreddit
Post Details
- Posted
- 4 years ago
- Reddit URL
- View post on reddit.com
- External URL
- reddit.com/r/tiktok_reve...