worawit / blutter

Flutter Mobile Application Reverse Engineering Tool
MIT License
964 stars 152 forks source link

error: expected: insn.id() == ARM64_INS_BL, on Dart 3.1.3 #22

Closed mragonias closed 10 months ago

mragonias commented 10 months ago

Same issue as https://github.com/worawit/blutter/issues/11, but this time on dart 3.1.3.

Dart version: 3.1.3, Snapshot: 7dbbeeb8ef7b91338640dca3927636de, Target: android arm64 libapp is loaded at 0x7f100c3b8000 Dart heap at 0x7f0f00000000 Analyzing the application Analysis error at line 1140 ILResult FunctionAnalyzer::processLoadInt32FromBoxOrSmiInstr(AsmInstruction): insn.id() == ARM64_INS_LDUR 0xe6f578: ldr x30, [x21, x30, lsl #3] 0xe6f57c: blr x30 0xe6f580: sbfx x1, x0, #1, #0x1f 0xe6f584: tbz w0, #0, #0xe6f590

lib: https://www.mediafire.com/file/p2myxj33cfhcmho/arm64-v8a.zip/file

mragonias commented 10 months ago

Thanks again. This tool is incredible. It's like a 10000 thousands time better than the "other" tool for reversing flutter apps.