【免责声明】

  1. 本教程仅供学术研究及逆向工程技术探讨,使用者须确保自身行为符合所在司法管辖区法律法规
  2. 任何个人/机构不得将所述技术用于破解正版软件、侵害著作权等非法用途,由此产生的法律责任由实施者完全承担
  3. 禁止将本教程内容用于商业目的或非法牟利,禁止制作/传播破解衍生作品
  4. 实验性文件下载后须在24小时内彻底删除,不得留存副本或进行二次分发
  5. 作者不担保技术安全性,不对任何滥用行为及后果承担民事/刑事责任
  6. 如有侵权请联系<alanhays0617@gmail.com>删除。

下载

MD5: 8900217D5CC8CA008D694735009A3B92

SHA-1: 50F67CAD40B64A9B8854EC6179F244DF6A8139FB

SHA-256: F59FEB121509639C16A8A86AFA9F339E8AE5572DCDDB69500A6C2E68AD4EA7BB

JEB Decompiler PRO 3.19.1 (May 7, 2020) by PNF Software

下载地址:https://www.mirrored.to/multilinks/dojzbtvua6

激活

参考:https://bbs.kanxue.com/thread-259895-3.htm

启动对应的脚本,windows 系统是 jeb_wincon.bat其他系统应该都知道是那个文件。

接着提示输入 jeb password 则输入 ilbtcdnwiuypbzeo,然后点击 Manual Key Generation接着复制 License Data

使用 python3 执行下方代码 按要求填入 License Data计算得到 License Key

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
#https://bbs.pediy.com/
#!/usr/bin/env python3
import os, sys, struct, time, binascii, hashlib

RC4_Key2 = b'Eg\xa2\x99_\x83\xf1\x10'
def rc4(Key, inData):
buf = bytearray()
S = list(range(256))
K = (list(Key) * (256 // len(Key) + 1))[:256]
j = 0
for i in range(256):
j = (S[i] + K[i] + j) % 256
S[i], S[j] = S[j], S[i]
i, j = 0, 0
for x in inData:
i = (i + 1) % 256
j = (j + S[i]) % 256
S[i], S[j] = S[j], S[i]
buf.append(S[(S[j] + S[i]) % 256] ^ x)
return bytes(buf)

def Long2Int(longdata):
return (longdata >> 32) & 0x7FFFFFFF, longdata & 0xFFFFFFFF

def KeygenSN(LicenseSerial, MachineID):
mhi, mlo = Long2Int(MachineID)
lhi, llo = Long2Int(LicenseSerial)
hi_Key = (mhi - lhi + 0x55667788) & 0x7FFFFFFF
lo_Key = (mlo + llo + 0x11223344) & 0xFFFFFFFF
Z0, = struct.unpack('<Q', struct.pack('<LL', lo_Key, hi_Key))
Z1 = int(time.time()) ^ 0x56739ACD
s = sum(int(d, 16) for d in f"{Z1:x}") % 10
return f"{Z0}Z{Z1}{s}"

def ParsePost(buf):
Info = struct.unpack('<3L2Q4LQ3L', buf[:0x40])
flag, CRC, UserSerial, LicenseSerial, MachineID, build_type, \
Ver_Major, Ver_Minor, Ver_Buildid, Ver_Timestamp, \
TimeOffset, Kclass, Random2 = Info
SysInfoData = buf[0x40:]
assert CRC == binascii.crc32(buf[8:]) & 0xFFFFFFFF
return Info, SysInfoData

def DecodeRc4Str(buf):
buf = bytes.fromhex(buf)
return ParsePost(rc4(buf[:8] + RC4_Key2, buf[8:]))

def GetJebLicenseKey():
licdata = input("Input License Data:\n")
if licdata:
i, MachineID = DecodeRc4Str(licdata)
SN = KeygenSN(i[3], i[4])
print("JEB License Key:", SN)
return SN

GetJebLicenseKey()
input("Enter to Exit...")

License Key填入激活

其他版本

mod by CXV

JEB Decompiler 4.29.0.202304042205

https://pixeldrain.com/u/x7EYnhEV

JEB Decompiler 4.32.0.202306131555

https://pixeldrain.com/u/uttjeNgK

JEB Decompiler 5.0.0.202308071454

https://pixeldrain.com/u/pmyKsFyx
https://pixeldrain.com/u/6c9PcT7Y (Android debugger fix and native emulator) and duplicate code tabs fix NEW!

JEB Decompiler 5.14.0.202406122044

https://pixeldrain.com/u/pp6suXFe
https://pixeldrain.com/u/VJ9X1TzJ (FIX unpack to jeb folder and owerwrite)

JEB Decompiler 5.16.0.202408261745

https://pixeldrain.com/u/AsLuzdRE

JEB Decompiler 5.22.0.202412102010

https://pixeldrain.com/u/94bSPo44