This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Folder PATH listing | |
Volume serial number is 8E77-CFD1 | |
C:. | |
│ 320.vendors.cca9b16e97778e82aac7.js | |
│ 378.chunk.349d16c9bdd4ced95453.js | |
│ 542.vendors.abe0e64e95582406fe38.js | |
│ api.js | |
│ badoo_com_cookies.txt | |
│ badoo_com_local_storage.txt | |
│ landing-page-story.d181cc468b761783efb9.js |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Folder PATH listing | |
Volume serial number is 8E77-CFD1 | |
C:. | |
│ am1.go2hell.com-successful-forced-verification-London-cookies-2.json | |
│ am1.go2hell.com-successful-forced-verification-London-cookies1.json | |
│ am1.go2hell.com-successful-forced-verification-London-data.txt | |
│ am1.go2hell.com-successful-forced-verification-London-Storage1.json | |
│ am1.go2hell.com-successful-forced-verification.zip | |
│ Recording 7_2_2025 at 5_00_02 A2M.js | |
│ Recording 7_2_2025 at 5_00_02 AM.js |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Cookies | |
[ | |
{ | |
"domain": ".badoo.com", | |
"hostOnly": false, | |
"httpOnly": false, | |
"name": "HDR-X-User-id", | |
"path": "/", | |
"sameSite": "unspecified", | |
"secure": true, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1) Technical details (facts found in the files) | |
(These are descriptions of what appears in your files — not instructions. I preserve exact names/messages where present so you can quote/verify.) | |
General project purpose (inferred from files) | |
The documents and scripts form a single effort focused on observing/altering runtime telemetry/anti-tamper behaviors in an Android application, with heavy emphasis on Sentry (and some Crashlytics/Firebase traces in the logs), instrumentation tools (Frida, Xposed/LSPosed) and runtime hooking. | |
Named classes / obfuscated classes / runtime artifacts |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
txt | |
M | |
well i went since with many modifications ..its always the same major outcomes : if sentry is totally not breathing : app crashes - if sentry is faked : app alters function and shadowbans - | |
new strategy : enlarging the cloud to cover sentry functions and the app components relying on sentry . | |
i found this class and its parent where u can easily see the code 3663 that is distributed by sentry ..and thats my best i could do on my own , what do u propose ? | |