Skip to content

Instantly share code, notes, and snippets.

View ahlabijohn-commits's full-sized avatar

ahlabijohn-commits

View GitHub Profile
Folder PATH listing
Volume serial number is 8E77-CFD1
C:.
│ 320.vendors.cca9b16e97778e82aac7.js
│ 378.chunk.349d16c9bdd4ced95453.js
│ 542.vendors.abe0e64e95582406fe38.js
│ api.js
│ badoo_com_cookies.txt
│ badoo_com_local_storage.txt
│ landing-page-story.d181cc468b761783efb9.js
Folder PATH listing
Volume serial number is 8E77-CFD1
C:.
│ am1.go2hell.com-successful-forced-verification-London-cookies-2.json
│ am1.go2hell.com-successful-forced-verification-London-cookies1.json
│ am1.go2hell.com-successful-forced-verification-London-data.txt
│ am1.go2hell.com-successful-forced-verification-London-Storage1.json
│ am1.go2hell.com-successful-forced-verification.zip
│ Recording 7_2_2025 at 5_00_02 A2M.js
│ Recording 7_2_2025 at 5_00_02 AM.js
Cookies
[
{
"domain": ".badoo.com",
"hostOnly": false,
"httpOnly": false,
"name": "HDR-X-User-id",
"path": "/",
"sameSite": "unspecified",
"secure": true,
1) Technical details (facts found in the files)
(These are descriptions of what appears in your files — not instructions. I preserve exact names/messages where present so you can quote/verify.)
General project purpose (inferred from files)
The documents and scripts form a single effort focused on observing/altering runtime telemetry/anti-tamper behaviors in an Android application, with heavy emphasis on Sentry (and some Crashlytics/Firebase traces in the logs), instrumentation tools (Frida, Xposed/LSPosed) and runtime hooking.
Named classes / obfuscated classes / runtime artifacts
@ahlabijohn-commits
ahlabijohn-commits / Discussion1.txt
Last active October 15, 2025 16:11
Related-Files
txt
M
well i went since with many modifications ..its always the same major outcomes : if sentry is totally not breathing : app crashes - if sentry is faked : app alters function and shadowbans -
new strategy : enlarging the cloud to cover sentry functions and the app components relying on sentry .
i found this class and its parent where u can easily see the code 3663 that is distributed by sentry ..and thats my best i could do on my own , what do u propose ?