去混淆Lua脚本吗? [英] Deobfuscate Lua scripts?

查看:121
本文介绍了去混淆Lua脚本吗?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

有人知道我如何对使用xfuscator隐藏它的lua脚本进行反模糊处理?混淆看起来像这样.如果有人能给我指出正确的方向,我将如何做到这一点真是太棒了!我没有分享消息源,因为我想帮助弄清楚如何消除自己的困惑,并且不希望得到答案! https://gyazo.com/d2a9a2bcc602d1a1146491158271e3e6

Does anyone know how I can deobfuscate a lua script that uses xfuscator to hide it? The obfuscation looks like this. If anyone could give me a point into the right direction on how I can get this done that would bne awesome! I didnt share the source because I wanted help figuring out how to deobfusate myself and didnt want the answer! https://gyazo.com/d2a9a2bcc602d1a1146491158271e3e6

推荐答案

看到那张长桌吗?那才是真正的代码.在混淆器中,您经常会看到这种模式.除此之外,请记住 _ __ 0 等都是有效的Lua标识符,因为您可以使用这样的变量来命名.

See that long table? That's the real code. It's a pattern you see quite often with obfuscators. Other than that, keep in mind that _, __0 and such are all valid Lua identifiers, to you can have variables named like that.

_ 是一个将数字转换为字符的函数; __ 0 是包含一些标准功能的表.除此之外,没有什么特别的事情.如果看到 __ 0 [1]("Hello"),则与 print("Hello")相同;它看起来很奇怪,因为它们将 print 放入索引为 1 __ 0 表中.

_ is a function that turns a number into a character; __0 is a table that contains some standard functions. There's nothing special going on beyond that. If you see a __0[1]("Hello"), that'd be the same as print("Hello"); it just looks weird, because they put print into the __0 table at index 1.

最终,混淆器只是利用了人们通常对Lua的了解不足以了解正在发生的事情.如果您知道该语言,那全都是烟和镜子.

Ultimately, the obfuscator just makes use of Lua features that people often don't understand well enough to understand what's going on. If you know the language though, it's all just smoke and mirrors.

这篇关于去混淆Lua脚本吗?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆