File tree Expand file tree Collapse file tree 3 files changed +11
-21
lines changed Expand file tree Collapse file tree 3 files changed +11
-21
lines changed Original file line number Diff line number Diff line change @@ -20,33 +20,23 @@ jobs:
20
20
git clone https://github.com/quark-engine/quark-engine.git
21
21
22
22
23
- - name : Set up Python 3.9
23
+ - name : Set up Python 3.10
24
24
uses : actions/setup-python@v4
25
25
with :
26
- python-version : 3.9
26
+ python-version : " 3.10 "
27
27
cache : pip
28
28
cache-dependency-path : quark-engine/setup.py
29
29
30
30
31
31
- name : Install dependencies
32
32
run : |
33
33
python -m pip install --upgrade pip
34
- python -m pip install pytest rzpipe meson==0.62.0 ninja coverage ciphey frida objection
35
- # Install graphviz & ninja
36
- sudo apt-get -y install graphviz ninja-build
34
+ python -m pip install frida objection importlib_resources
35
+ # Install graphviz
36
+ sudo apt-get -y install graphviz
37
37
38
- # Install Rizin
39
-
40
- sudo git clone --branch v0.3.4 https://github.com/rizinorg/rizin /opt/rizin/
41
- cd /opt/rizin/
42
- meson build
43
- ninja -C build
44
- sudo ninja -C build install
45
- sudo ldconfig -v
46
- cd -
47
-
48
- # Install click >= 8.0.0 for CLI supports
49
- python -m pip install click==8.0.3
38
+ # Install click <=8.1.7 for CLI supports
39
+ python -m pip install "click<=8.1.7"
50
40
51
41
- name : Install Quark-Engine
52
42
run : |
Original file line number Diff line number Diff line change 1
1
from quark .script .frida import runFridaHook
2
- from quark .script .ciphey import checkClearText
2
+ from quark .script .ares import checkClearText
3
3
4
4
APP_PACKAGE_NAME = "oversecured.ovaa"
5
5
23
23
print (
24
24
"The CWE-312 vulnerability is found. "
25
25
f'The cleartext is "{ secondParam } "'
26
- )
26
+ )
Original file line number Diff line number Diff line change @@ -28,12 +28,12 @@ vulnerability.
28
28
First, we designed a [ Frida] ( https://frida.re ) script ` agent.js ` to hook
29
29
the target method and get the arguments when the target method is
30
30
called. Then we hook the method ` putString ` to catch its arguments.
31
- Finally, we use [ Ciphey ] ( https://github.com/Ciphey/Ciphey ) to check if
31
+ Finally, we use [ Ares ] ( https://github.com/bee-san/Ares ) to check if
32
32
the arguments are encrypted.
33
33
34
34
``` python
35
35
from quark.script.frida import runFridaHook
36
- from quark.script.ciphey import checkClearText
36
+ from quark.script.ares import checkClearText
37
37
38
38
APP_PACKAGE_NAME = " oversecured.ovaa"
39
39
You can’t perform that action at this time.
0 commit comments