Reverse Engineering of ViPER4Android FX
Go to file
2021-02-16 09:31:33 +01:00
src more ProcessUnit_FX stuff 2021-02-14 12:32:23 +01:00
.gitignore Initial commit 2021-02-13 15:32:09 +01:00
CMakeLists.txt Start working on ProcessUnit_FX 2021-02-13 18:06:28 +01:00
README.md Update README.md 2021-02-16 09:31:33 +01:00

ViPERFX RE

This is a project aimed to reverse-engineer ViPERFX. The version of the shared library used is the armv7 version taken from the ViPER4Android Magisk apk (2.5.0.4). It was then imported in Ghidra and analyzed.

There's a lot of code that doesn't quite make sense, and it's important to look at the bytecode if something seems strange. Liberties may be taken to write equivalent code in a mor readable way.

Contributing

Feel free to PR in a more "clean" version of various methods, or general project cleanup. You may rename fields, but ideally this is left until all methods are cleaned.