NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
Warning about Smali Patcher issued in public interest

TLDR; don't use SmaliPatcher, use NanoDroid patcher, Qpatch or Haystack

Smali patcher was released a while ago, and it seemed to be a very useful tool (despite it being windows only) as it would automagically pull, deodex, patch and push sigspoof to your connected phone. Even more so since no other sigspoof patcher seems to support Q yet.

But a little research before I went to ask the "developer" to open source it revealed these posts in the thread:

- https://forum.xda-developers.com/showpost.php?p=78958124
-> f0mey (OP of thread) admitting that they don't know anything of the source code and probably don't even have access to it

- https://forum.xda-developers.com/showpost.php?p=80287799
- https://forum.xda-developers.com/showpost.php?p=80287989
- https://forum.xda-developers.com/showpost.php?p=80292041
-> A user complaining that the executable recieves incoming connections from arbitrary IPs, and f0mey nonchalantly saying that they have no idea what that is and it's probably nothing. Further down the thread, f0mey notes the IP seems to be from Russia, still confident that nothing is wrong.

Conclusion:
Still no proof that Smali Patcher does anything malicious, but a pretty big concern.
Also, its real origin is still unknown. Perhaps 4pda?


@NoGoolag
#smalipatcher #sigspoof #smali