Advanced Android Reverse Engineering

Замовник: AI | Опубліковано: 08.12.2025
Бюджет: 1500 $

I’m looking for a seasoned Android reverse engineer who can dismantle a heavily protected Chinese mobile-app, reconstruct its logic, and deliver a clean, server-side implementation that runs without any client dependencies. What you’ll tackle First, break through aggressive OLLVM and LLVM-Pass obfuscation: control-flow flattening, virtual dispatch, data-flow mangling—all of it must be unraveled into readable code or pseudocode. Next, dive deep into the ARM64 native .so: work at register level, follow JNI bridges, and reproduce each core routine with clear, in-line commentary. Any storage-coupled logic needs refactoring into pure computation so the final build runs headless on Linux. The app communicates over secure WebSocket (wss) binary frames. I need an exact, field-by-field specification, complete (de)serialization rules, encryption steps, and working parser/packer code that mirrors the client’s behaviour bit-for-bit. You’re free to use Ghidra, IDA Pro, Frida, Xposed, JEB—whatever gets the job done—so long as you document decisions and keep me updated. Mandatory deliverables • Detailed deobfuscation report and reconstructed logic • Fully commented ARM64 algorithm source • Stand-alone “pure algorithm” code ready to execute • Comprehensive protocol document with sample packets and parsing code • Final build proven to run on your own server before hand-off Timeline Everything must be finished within 10 days. If you can’t commit to that, please don’t bid. I expect daily or near-daily progress notes and an open line for technical discussion. To bid Share anonymised examples of past reversing projects, note your strongest areas (OLLLVM, ARM64, protocol analysis, algorithm work), outline your initial plan for this project, and confirm you can hit the 10-day deadline. You’ll also need to install and run mainstream mainland-China apps for testing. If you have the skill and the speed, I’m ready to work with you immediately.